R13: 0000000020000100 R14: 00007fe500f5e000 R15: 0000000020013b00 [ 1409.704444] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 1409.707373] EXT4-fs (loop5): get root inode failed [ 1409.707969] EXT4-fs (loop5): mount failed [ 1409.724836] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:02:54 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = getpgrp(0x0) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) pidfd_open(r3, 0x0) pidfd_send_signal(r1, 0x5, &(0x7f00000001c0)={0x14, 0x5286c68a, 0x1}, 0x0) pidfd_open(r2, 0x0) prlimit64(r2, 0xa, 0x0, &(0x7f0000000000)) r4 = getpgid(r3) prlimit64(r4, 0x2, &(0x7f0000000400)={0x4, 0x9}, &(0x7f0000000440)) vmsplice(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="47afa612857c0005650995c095c79e672dacf5a9f89b0e8c135e14cadee704dab3b6f4506aa8de35c12e4aabfa86ab1daab0974483e1016218f1a7266e2a3e2de5c9c4715f51c35cccce62e803a388eadba4fbf0eed2b06660cb4eb38668b85ea2c20503841fae8a7a8e41b9c646326e7d9e03122a886b2b8f2849c09f1304be3a571516ff476ad906f86d8ebd71e177ddc74923490278c58b956b1af80bfbd4394079ae491bb1f2403f9a74d1fc1144948d15bc185bad3056f80f466c00bece5af8", 0xe3}, {&(0x7f0000000140)="001bc55dcbeb19e4092f5586d5202f1ef392a5a467a16c3236a065c7273a0e2c49b0fb1417d64155812b48877272f4b7e2e282d9150f", 0x36}], 0x2, 0x1) 19:02:54 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:02:54 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:02:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:02:54 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:02:54 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) (fail_nth: 51) 19:02:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000010f00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x2800}, {0x0, 0x0, 0x6000}], 0x0, &(0x7f0000013c00)) 19:02:54 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x0, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) [ 1423.045374] mmap: syz-executor.1 (9504): VmData 37515264 exceed data ulimit 4. Update limits or use boot option ignore_rlimit_data. [ 1423.055645] device syz_tun entered promiscuous mode [ 1423.056965] device syz_tun left promiscuous mode [ 1423.073893] FAULT_INJECTION: forcing a failure. [ 1423.073893] name failslab, interval 1, probability 0, space 0, times 0 [ 1423.076228] CPU: 0 PID: 9515 Comm: syz-executor.6 Not tainted 5.10.205 #1 [ 1423.077617] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1423.079462] Call Trace: [ 1423.080084] dump_stack+0x107/0x167 [ 1423.080926] should_fail.cold+0x5/0xa [ 1423.081782] ? getname_flags.part.0+0x50/0x4f0 [ 1423.082828] should_failslab+0x5/0x20 [ 1423.083705] kmem_cache_alloc+0x5b/0x310 [ 1423.084622] ? __switch_to+0x572/0xf70 [ 1423.085507] ? __switch_to_asm+0x3a/0x60 [ 1423.086435] getname_flags.part.0+0x50/0x4f0 [ 1423.087442] getname_flags+0x9a/0xe0 [ 1423.088296] do_mkdirat+0x8f/0x2b0 [ 1423.089121] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 1423.090308] ? user_path_create+0xf0/0xf0 [ 1423.091431] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1423.092784] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1423.094093] do_syscall_64+0x33/0x40 [ 1423.095030] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1423.096332] RIP: 0033:0x7fe5039e7c27 [ 1423.097268] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1423.101676] RSP: 002b:00007fe500f5dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1423.103381] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe5039e7c27 [ 1423.104977] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1423.106580] RBP: 00007fe500f5e040 R08: 0000000000000000 R09: ffffffffffffffff [ 1423.108168] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1423.109713] R13: 0000000020000100 R14: 00007fe500f5e000 R15: 0000000020013b00 19:02:54 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x0, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:02:54 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:02:54 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r2, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_FSYNC={0x3, 0x1, 0x0, @fd=r2, 0x0, 0x0, 0x0, 0x1, 0x1}, 0xb84) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r3, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_FSYNC={0x3, 0x1, 0x0, @fd=r3, 0x0, 0x0, 0x0, 0x1, 0x1}, 0xb84) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) clone3(&(0x7f00000001c0)={0x100000, &(0x7f0000000040)=0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), {0x11}, &(0x7f0000000100)=""/7, 0x7, &(0x7f0000000140)=""/62, &(0x7f0000000180)=[r0, r0], 0x2}, 0x58) r6 = dup2(r1, r1) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000001840)=@flushsa={0x14, 0x1c, 0x100, 0x70bd2b, 0x25dfdbff, {0x3c}}, 0x14}, 0x1, 0x0, 0x0, 0x44040}, 0x0) sendmsg$nl_xfrm(r7, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0x158, 0x1a, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@local, 0x0, 0x33}, @in=@private, {0x0, 0x0, 0x6}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}}]}, 0x158}}, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000001840)=@flushsa={0x14, 0x1c, 0x100, 0x70bd2b, 0x25dfdbff, {0x3c}}, 0x14}, 0x1, 0x0, 0x0, 0x44040}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000003c0)=@IORING_OP_WRITE={0x17, 0x0, 0x2007, @fd=r3, 0x8, &(0x7f0000000380)="a13c9c51201d30364d9ea14f43a00b59eb53905ed0251654981ea36ba76bcf89ef840d2ac47cf20570ccef61673cc1e2e11ff50630", 0x35, 0x4, 0x1}, 0x9) sendmsg$nl_xfrm(r8, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0x158, 0x1a, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@local, 0x0, 0x33}, @in=@private, {0x0, 0x0, 0x6}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}}]}, 0x158}}, 0x0) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000240)={0x74, 0x2, 0x9, 0x0, 0x0, [{{r3}, 0xf86f}, {{r4}}, {{}, 0x10001}, {{r5}, 0xf3}, {{r6}, 0xfffffffffffffffd}, {{r1}, 0x80000000}, {{r1}, 0x100000000}, {{r7}, 0x7}, {{r8}, 0x8}]}) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) [ 1423.160293] EXT4-fs warning (device loop5): read_mmp_block:114: Error -117 while reading MMP block 12 19:02:54 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) (fail_nth: 52) 19:02:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:02:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000010f00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x2800}, {0x0, 0x0, 0x6000}], 0x0, &(0x7f0000013c00)) [ 1423.268728] device syz_tun entered promiscuous mode [ 1423.289042] device syz_tun left promiscuous mode [ 1423.396572] kauditd_printk_skb: 43 callbacks suppressed [ 1423.396589] audit: type=1400 audit(1703444575.151:93): avc: denied { checkpoint_restore } for pid=9529 comm="syz-executor.1" capability=40 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 19:02:55 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:02:55 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x0, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) [ 1423.462667] FAULT_INJECTION: forcing a failure. [ 1423.462667] name failslab, interval 1, probability 0, space 0, times 0 [ 1423.465857] CPU: 0 PID: 9541 Comm: syz-executor.6 Not tainted 5.10.205 #1 [ 1423.467357] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1423.469313] Call Trace: [ 1423.469932] dump_stack+0x107/0x167 [ 1423.470801] should_fail.cold+0x5/0xa [ 1423.471724] ? __d_alloc+0x2a/0x990 [ 1423.472577] should_failslab+0x5/0x20 [ 1423.473479] kmem_cache_alloc+0x5b/0x310 [ 1423.474418] ? __d_lookup+0x3bf/0x760 [ 1423.475320] __d_alloc+0x2a/0x990 [ 1423.476154] d_alloc+0x46/0x1c0 [ 1423.476930] __lookup_hash+0xcc/0x190 [ 1423.477825] filename_create+0x186/0x4a0 [ 1423.478773] ? filename_parentat+0x570/0x570 [ 1423.479693] ? getname_flags.part.0+0x1dd/0x4f0 [ 1423.480658] do_mkdirat+0xa2/0x2b0 [ 1423.481406] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 1423.482551] ? user_path_create+0xf0/0xf0 [ 1423.483421] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1423.484544] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1423.485636] do_syscall_64+0x33/0x40 [ 1423.486426] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1423.487513] RIP: 0033:0x7fe5039e7c27 [ 1423.488309] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1423.492184] RSP: 002b:00007fe500f5dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1423.493785] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe5039e7c27 [ 1423.495277] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1423.496803] RBP: 00007fe500f5e040 R08: 0000000000000000 R09: ffffffffffffffff [ 1423.498314] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1423.499822] R13: 0000000020000100 R14: 00007fe500f5e000 R15: 0000000020013b00 [ 1423.522385] EXT4-fs warning (device loop5): read_mmp_block:114: Error -117 while reading MMP block 12 19:02:55 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) (fail_nth: 53) [ 1423.669934] device syz_tun entered promiscuous mode [ 1423.684483] device syz_tun left promiscuous mode [ 1423.796202] FAULT_INJECTION: forcing a failure. [ 1423.796202] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1423.798670] CPU: 0 PID: 9553 Comm: syz-executor.6 Not tainted 5.10.205 #1 [ 1423.800065] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1423.801791] Call Trace: [ 1423.802341] dump_stack+0x107/0x167 [ 1423.803102] should_fail.cold+0x5/0xa [ 1423.803908] strncpy_from_user+0x34/0x470 [ 1423.804777] getname_flags.part.0+0x95/0x4f0 [ 1423.805691] getname_flags+0x9a/0xe0 [ 1423.806467] do_mkdirat+0x8f/0x2b0 [ 1423.807195] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 1423.808330] ? user_path_create+0xf0/0xf0 [ 1423.809190] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1423.810271] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1423.811340] do_syscall_64+0x33/0x40 [ 1423.812110] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1423.813159] RIP: 0033:0x7fe5039e7c27 [ 1423.813922] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1423.817706] RSP: 002b:00007fe500f5dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1423.819270] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe5039e7c27 [ 1423.820754] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1423.822214] RBP: 00007fe500f5e040 R08: 0000000000000000 R09: ffffffffffffffff [ 1423.823666] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1423.825127] R13: 0000000020000100 R14: 00007fe500f5e000 R15: 0000000020013b00 19:03:11 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:03:11 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:03:11 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:03:11 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x0, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:03:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000010f00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x2800}, {0x0, 0x0, 0x6000}], 0x0, &(0x7f0000013c00)) 19:03:11 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x0, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:03:11 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) (fail_nth: 54) 19:03:11 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x9, 0x8, 0x40, 0x9, 0x0, 0x8, 0x80, 0xa, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x5}, 0x20, 0x3, 0xfffffc01, 0x8, 0xfffffffffffffffd, 0x6, 0x87c, 0x0, 0x4, 0x0, 0xfffffffffffffff7}, r2, 0x2, 0xffffffffffffffff, 0x1) [ 1439.968901] FAULT_INJECTION: forcing a failure. [ 1439.968901] name failslab, interval 1, probability 0, space 0, times 0 [ 1439.971416] CPU: 1 PID: 9575 Comm: syz-executor.6 Not tainted 5.10.205 #1 [ 1439.972878] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1439.974629] Call Trace: [ 1439.975202] dump_stack+0x107/0x167 [ 1439.975995] should_fail.cold+0x5/0xa [ 1439.976808] ? ext4_alloc_inode+0x1a/0x670 [ 1439.977712] should_failslab+0x5/0x20 [ 1439.978515] kmem_cache_alloc+0x5b/0x310 [ 1439.979387] ? security_compute_validatetrans.part.0+0x960/0x960 [ 1439.980701] ? ext4_init_journal_params+0x350/0x350 [ 1439.981772] ext4_alloc_inode+0x1a/0x670 [ 1439.982631] ? ext4_init_journal_params+0x350/0x350 [ 1439.983687] alloc_inode+0x63/0x240 [ 1439.984477] new_inode+0x23/0x250 [ 1439.985204] __ext4_new_inode+0x32c/0x5370 [ 1439.986090] ? avc_has_extended_perms+0xf40/0xf40 [ 1439.987125] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 1439.988140] ? dquot_initialize_needed+0x290/0x290 [ 1439.989136] ? selinux_determine_inode_label+0x1ab/0x340 [ 1439.990259] ext4_mkdir+0x32c/0xb10 [ 1439.991020] ? ext4_rmdir+0xf70/0xf70 [ 1439.991811] vfs_mkdir+0x493/0x700 [ 1439.992551] do_mkdirat+0x150/0x2b0 [ 1439.993299] ? user_path_create+0xf0/0xf0 [ 1439.994151] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1439.995223] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1439.996303] do_syscall_64+0x33/0x40 [ 1439.997062] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1439.998105] RIP: 0033:0x7fe5039e7c27 [ 1439.998866] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1440.002615] RSP: 002b:00007fe500f5dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1440.004220] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe5039e7c27 [ 1440.005726] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1440.007210] RBP: 00007fe500f5e040 R08: 0000000000000000 R09: ffffffffffffffff [ 1440.008747] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1440.010272] R13: 0000000020000100 R14: 00007fe500f5e000 R15: 0000000020013b00 [ 1440.026596] device syz_tun entered promiscuous mode [ 1440.038758] EXT4-fs warning (device loop5): read_mmp_block:114: Error -117 while reading MMP block 12 [ 1440.041807] device syz_tun left promiscuous mode 19:03:11 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x0, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:03:11 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000001840)=@flushsa={0x14, 0x1c, 0x100, 0x70bd2b, 0x25dfdbff, {0x3c}}, 0x14}, 0x1, 0x0, 0x0, 0x44040}, 0x0) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x4010, 0xffffffffffffffff, 0x8000000) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x31f, &(0x7f0000000240)={'wlan1\x00'}) r6 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x1a3, 0x0, r5}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000000)=@IORING_OP_WRITE_FIXED={0x5, 0x4, 0x0, @fd=r4, 0x0, 0x0, 0x120ea6a2, 0x0, 0x0, {0x1, r9}}, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) r10 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r6, 0x0) syz_io_uring_submit(r10, r8, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(r3, r8, &(0x7f0000000180)=@IORING_OP_READ_FIXED={0x4, 0x1, 0x2007, @fd_index=0x6, 0x48d, 0x7, 0x7ff, 0x15, 0x0, {0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0x158, 0x1a, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@local, 0x0, 0x33}, @in=@private, {0x0, 0x0, 0x6}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}}]}, 0x158}}, 0x0) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000340)={0x2, {0x2, 0x9fa, 0x9, 0x5, 0x1, 0x3}}) io_uring_enter(r5, 0x3425, 0xe3ea, 0x1, &(0x7f00000001c0)={[0x6]}, 0x8) tee(r1, r2, 0x1, 0x4) 19:03:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000010f00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x2800}, {&(0x7f0000011600), 0x0, 0x6000}], 0x0, &(0x7f0000013c00)) 19:03:11 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x0, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:03:11 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) (fail_nth: 55) 19:03:11 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) [ 1440.209371] device syz_tun entered promiscuous mode [ 1440.220325] device syz_tun left promiscuous mode 19:03:12 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x0, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) [ 1440.314416] EXT4-fs warning (device loop5): read_mmp_block:114: Error -117 while reading MMP block 12 [ 1440.328200] device syz_tun entered promiscuous mode [ 1440.329591] device syz_tun left promiscuous mode 19:03:12 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x0, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:03:26 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:03:26 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:03:26 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x0, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:03:26 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f000001ef40)=ANY=[@ANYBLOB="500100001300000228bd7000fbdbdf250381fc804e234e2232f3000000020000130f000003000000010000000b0000000900000007000000c2a859b851a44791c7fa22a65dbfd0ad5fe172ca5f2961418911f3c570dc388812567b4cdac87cdeff026a1f1bab2f912868aadfcc4273be0592543354985ca89f06dfc286387995b4f5a6acac2552eaa0b35a65ce823442", @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x4000080}, 0x1) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000001840)=ANY=[@ANYBLOB="140000001c00dd012bbd7000ffdb000000"], 0x14}, 0x1, 0x0, 0x0, 0x44040}, 0x0) syz_io_uring_setup(0x57c3, &(0x7f00000002c0)={0x0, 0xa5a0, 0x20, 0x0, 0x4a, 0x0, r2}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000340)=0x0, &(0x7f0000000380)) syz_io_uring_submit(r4, 0x0, &(0x7f00000003c0)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x1) r5 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x31f, &(0x7f0000000240)={'wlan1\x00'}) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x1a3, 0x0, r5}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200), &(0x7f0000000140)) statx(0xffffffffffffffff, 0x0, 0x100, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r6, r7, 0x1000) recvmmsg$unix(r2, &(0x7f0000005680)=[{{&(0x7f00000005c0)=@abs, 0x6e, &(0x7f0000000ac0)=[{&(0x7f0000000640)=""/173, 0xad}, {&(0x7f0000000700)=""/73, 0x49}, {&(0x7f0000000780)=""/192, 0xc0}, {&(0x7f0000000840)=""/193, 0xc1}, {&(0x7f0000000940)=""/249, 0xf9}, {&(0x7f0000000a40)=""/90, 0x5a}], 0x6, &(0x7f0000000b40)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}}, {{&(0x7f0000000bc0), 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000400)=""/36, 0x24}, {&(0x7f0000000c80)=""/104, 0x68}], 0x2, &(0x7f0000000d40)=[@cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x108}}, {{&(0x7f0000000e80)=@abs, 0x6e, &(0x7f0000000fc0)=[{&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000000f00)=""/1, 0x1}, {&(0x7f0000000f40)=""/103, 0x67}], 0x3}}, {{&(0x7f0000001000), 0x6e, &(0x7f00000010c0)=[{&(0x7f0000001080)=""/12, 0xc}], 0x1, &(0x7f0000005ac0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000474396acdfc2086d87915325189c1e1b02ffe4394f108f4b99bbcb35e428d0c03690b15105b57dd9886c3e598f211eb7ad6f01c6e65804ad685fc7e21709", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x88}}, {{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000005f40)=""/102400, 0x19000}, {&(0x7f0000001240)=""/93, 0x5d}, {&(0x7f00000012c0)=""/126, 0x7e}, {&(0x7f0000001340)=""/183, 0xb7}, {&(0x7f0000001400)=""/123, 0x7b}, {&(0x7f0000001480)=""/67, 0x43}], 0x6, &(0x7f0000001580)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}}, {{&(0x7f0000001680)=@abs, 0x6e, &(0x7f0000001600)=[{&(0x7f0000001700)=""/141, 0x8d}, {&(0x7f00000028c0)=""/76, 0x4c}], 0x2, &(0x7f0000002880)=[@cred={{0x1c}}], 0x20}}, {{0x0, 0x0, &(0x7f0000002f00)=[{&(0x7f0000004100)=""/169, 0xa9}, {&(0x7f0000002980)=""/233, 0xe9}, {&(0x7f0000002a80)=""/176, 0xb0}, {&(0x7f0000002b40)=""/105, 0x69}, {&(0x7f0000002bc0)=""/245, 0xf5}, {&(0x7f0000002cc0)=""/226, 0xe2}, {&(0x7f0000002e40)=""/180, 0xb4}], 0x7, &(0x7f0000002f80)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x90}}, {{&(0x7f0000003040)=@abs, 0x6e, &(0x7f00000040c0)=[{&(0x7f00000030c0)=""/4096, 0x1000}], 0x1, &(0x7f0000005bc0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00001c00f0ffff90be49ee3f2aff2e4d9da11b80f0c5a9ec52538d0fb20a0aff0e146d9da566ffffff00000000020000000b04834e597283baacf9065319", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=r4, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x130}}, {{&(0x7f0000004240)=@abs, 0x6e, &(0x7f00000044c0)=[{&(0x7f00000042c0)=""/84, 0x54}, {&(0x7f0000004340)=""/177, 0xb1}, {&(0x7f0000004400)=""/46, 0x2e}, {&(0x7f0000004440)=""/65, 0x41}], 0x4}}, {{&(0x7f0000004500), 0x6e, &(0x7f0000005580)=[{&(0x7f0000004580)=""/4096, 0x1000}], 0x1, &(0x7f00000055c0)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xb8}}], 0xa, 0x40000041, &(0x7f0000005900)) statx(0xffffffffffffffff, 0x0, 0x100, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r9, r10, 0x1000) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x20000a0, &(0x7f0000005d40)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r5, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',cache=none,cachetag=sha256\x00,cache=fscache,fscache,noextend,version=9p2000.u,nodevmap,access=', @ANYRESDEC=r6, @ANYBLOB=',nodevmap,uname=sha256\x00,euid=', @ANYRESDEC=r8, @ANYBLOB=',hash,audit,fowner>', @ANYRESDEC, @ANYBLOB=',rootcontext=system_u,rootcontext=system_u,fowner<', @ANYRESDEC=r9, @ANYBLOB="30ebb8fd520233245cb090d152e0ede699701de7abb1ed6bb755dd8640369be19ea602ce69d61ff014a14ad70dfb3b8086a5b6af1d7ebbdd4506c0584c54c3f90bc8d2d82b68d52c5b51e4570423b78dcca4cd6004bedad9f2417964c7b05cf0f1a9bfa99aead1cda03728b7cb83f96530dfde1149fe734dd5b6fcb54d5d1bf37c1e8da8c44a7d27c23d7f3fab507a42faa4d1c9715d75d42117ad44e6098805166d62d0b43de2e21f8ab4f733e480b5e9e93d"]) sendmsg$nl_xfrm(r3, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0x158, 0x1a, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@local, 0x0, 0x33}, @in=@private, {0x0, 0x0, 0x6}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}}]}, 0x158}}, 0x0) fcntl$dupfd(r1, 0x406, r3) 19:03:26 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x0, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:03:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000010f00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x2800}, {&(0x7f0000011600), 0x0, 0x6000}], 0x0, &(0x7f0000013c00)) 19:03:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:03:26 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1455.267277] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1455.272921] device syz_tun entered promiscuous mode [ 1455.295178] device syz_tun left promiscuous mode [ 1455.330697] EXT4-fs warning (device loop5): read_mmp_block:114: Error -117 while reading MMP block 12 19:03:27 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x0, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:03:27 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:03:27 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$netlink(0x10, 0x3, 0x10) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040), &(0x7f0000000080)=0x4) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x34, &(0x7f0000001f00)=ANY=[], 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000000240)=""/95, 0x5f}], 0x2}, 0x4}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000300)=""/207, 0xcf}], 0x1, &(0x7f0000000480)=""/185, 0xb9}, 0x5}, {{&(0x7f0000000540)=@nfc_llcp, 0x80, &(0x7f0000000bc0)=[{&(0x7f00000005c0)=""/1, 0x1}, {&(0x7f0000000600)=""/138, 0x8a}, {&(0x7f00000006c0)=""/215, 0xd7}, {&(0x7f00000007c0)=""/244, 0xf4}, {&(0x7f00000008c0)=""/238, 0xee}, {&(0x7f00000009c0)=""/171, 0xab}, {&(0x7f0000000a80)=""/100, 0x64}, {&(0x7f0000001680)=""/4096, 0x1000}, {&(0x7f0000000b00)=""/164, 0xa4}], 0x9}}], 0x4, 0x40010023, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) write$tun(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="00000a010301320d060d00040fbf4635aaaa5ee9b8a7e8fe7cffc47fb22fe0ffffffffffff95e03c70bac98c669c5785ffdcbf9b00"], 0x35) write$tun(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000400)={0xffffffffffffffff}, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x6, 0x80, 0xaf, 0x7f, 0x6, 0x7, 0x0, 0xffff, 0x800, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x200000, 0x4, @perf_config_ext={0x45, 0x1}, 0x582a0, 0x8, 0x7f, 0x5, 0x2, 0x3, 0x7, 0x0, 0x552, 0x0, 0x8}, r2, 0x7, 0xffffffffffffffff, 0x5) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) vmsplice(r4, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) 19:03:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:03:27 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:03:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000010f00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x2800}, {&(0x7f0000011600), 0x0, 0x6000}], 0x0, &(0x7f0000013c00)) [ 1455.525611] device syz_tun entered promiscuous mode [ 1455.531828] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1455.535133] device syz_tun left promiscuous mode [ 1455.559681] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:03:27 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x0, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) [ 1455.660358] EXT4-fs warning (device loop5): read_mmp_block:114: Error -117 while reading MMP block 12 19:03:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:03:27 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) [ 1455.729728] device syz_tun entered promiscuous mode [ 1455.743562] device syz_tun left promiscuous mode [ 1455.829635] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1455.862535] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:03:42 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:03:42 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$netlink(0x10, 0x3, 0x10) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040), &(0x7f0000000080)=0x4) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x34, &(0x7f0000001f00)=ANY=[], 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000000240)=""/95, 0x5f}], 0x2}, 0x4}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000300)=""/207, 0xcf}], 0x1, &(0x7f0000000480)=""/185, 0xb9}, 0x5}, {{&(0x7f0000000540)=@nfc_llcp, 0x80, &(0x7f0000000bc0)=[{&(0x7f00000005c0)=""/1, 0x1}, {&(0x7f0000000600)=""/138, 0x8a}, {&(0x7f00000006c0)=""/215, 0xd7}, {&(0x7f00000007c0)=""/244, 0xf4}, {&(0x7f00000008c0)=""/238, 0xee}, {&(0x7f00000009c0)=""/171, 0xab}, {&(0x7f0000000a80)=""/100, 0x64}, {&(0x7f0000001680)=""/4096, 0x1000}, {&(0x7f0000000b00)=""/164, 0xa4}], 0x9}}], 0x4, 0x40010023, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) write$tun(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="00000a010301320d060d00040fbf4635aaaa5ee9b8a7e8fe7cffc47fb22fe0ffffffffffff95e03c70bac98c669c5785ffdcbf9b00"], 0x35) write$tun(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000400)={0xffffffffffffffff}, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x6, 0x80, 0xaf, 0x7f, 0x6, 0x7, 0x0, 0xffff, 0x800, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x200000, 0x4, @perf_config_ext={0x45, 0x1}, 0x582a0, 0x8, 0x7f, 0x5, 0x2, 0x3, 0x7, 0x0, 0x552, 0x0, 0x8}, r2, 0x7, 0xffffffffffffffff, 0x5) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) vmsplice(r4, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) 19:03:42 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x0, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:03:42 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:03:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000010f00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x2800}, {&(0x7f0000011600)='PMM\x00', 0x4, 0x6000}], 0x0, &(0x7f0000013c00)) 19:03:42 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x3ff, 0x404100) r3 = getpgrp(r0) pidfd_open(r3, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000040)={'\x00', 0x0, 0x7, 0x6, 0x6, 0x90da, r3}) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) 19:03:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:03:42 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) [ 1470.472768] device syz_tun entered promiscuous mode [ 1470.482040] device syz_tun left promiscuous mode [ 1470.488957] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:03:42 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x0, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1470.528483] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:03:42 executing program 1: r0 = getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) r2 = pidfd_open(r0, 0x0) vmsplice(r2, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) 19:03:42 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x0, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:03:42 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:03:42 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:03:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) [ 1470.690723] device syz_tun entered promiscuous mode [ 1470.695005] device syz_tun left promiscuous mode 19:03:42 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x0, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:03:42 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000180)={0x38, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}]}]}, 0x38}}, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x2f, 0x100, 0x70bd2d, 0x25dfdbfb, {0x8}, [@typed={0x14, 0x3a, 0x0, 0x0, @ipv6=@empty}, @typed={0x8, 0x83, 0x0, 0x0, @u32=0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x8894}, 0x8891) sendfile(r2, r4, &(0x7f0000000100)=0x9, 0x80) 19:03:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) [ 1470.742727] device syz_tun entered promiscuous mode [ 1470.744996] device syz_tun left promiscuous mode [ 1470.803026] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1470.868204] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1471.288421] EXT4-fs warning (device loop5): ext4_multi_mount_protect:340: MMP startup interrupted, failing mount [ 1471.288421] 19:03:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:03:56 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:03:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000010f00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x2800}, {&(0x7f0000011600)='PMM\x00', 0x4, 0x6000}], 0x0, &(0x7f0000013c00)) 19:03:56 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x0, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:03:56 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:03:56 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x0, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:03:56 executing program 1: r0 = getpgrp(0x0) r1 = gettid() capget(&(0x7f0000000000)={0x19980330, r1}, &(0x7f0000000040)={0x42, 0x5b1, 0x1, 0x34a, 0x8, 0xfc82}) r2 = pidfd_open(r0, 0x0) vmsplice(r2, &(0x7f0000001640), 0x0, 0x0) 19:03:56 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) [ 1484.594202] capability: warning: `syz-executor.1' uses 32-bit capabilities (legacy support in use) [ 1484.607397] device syz_tun entered promiscuous mode [ 1484.634984] device syz_tun left promiscuous mode 19:03:56 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x0, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1484.674883] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:03:56 executing program 1: r0 = getpgrp(0x0) pidfd_open(r0, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) r2 = socket(0x1a, 0x5, 0x2) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x6, 0x3, r2, &(0x7f0000000000)="7ab1f271c2c59e34e895e0b9086447ae6a29917ce11b1edcbb02c299e5cd2f5129c4dfc9ab8473f7a5b1c9f0ad4f48aac87e6403e0d980f67808c3706d9fd67d025dc2d1c2d38993313eadaba23ad347e7c2d468a97118cf7a3940e5e396c8ea", 0x60, 0x7}, &(0x7f00000000c0)) r3 = getpgrp(r0) r4 = pidfd_open(r3, 0x0) vmsplice(r4, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) 19:03:56 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:03:56 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:03:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:03:56 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x0, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1484.918860] device syz_tun entered promiscuous mode [ 1484.921025] device syz_tun left promiscuous mode [ 1485.013930] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1485.403531] EXT4-fs warning (device loop5): ext4_multi_mount_protect:340: MMP startup interrupted, failing mount [ 1485.403531] 19:04:10 executing program 1: r0 = getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) r2 = syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/net\x00') r3 = pidfd_open(r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="0100000000000000180000004c34b9da61ee37a673bb38a68a0808bae8b1545810a6360f0003f2ffffda3ecd006f4f68ed7b21686d47ae90cd8c3a38f05595264c26c9dd677676", @ANYRES32=r3, @ANYBLOB="000000400000005ff234df0e96052300"]) connect$bt_l2cap(r4, &(0x7f0000000100)={0x1f, 0x7fff, @any, 0x1f, 0x2}, 0xe) ioctl$VFAT_IOCTL_READDIR_SHORT(r2, 0x82307202, &(0x7f00000001c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) vmsplice(r3, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) 19:04:10 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x0, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:04:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000010f00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x2800}, {&(0x7f0000011600)='PMM\x00', 0x4, 0x6000}], 0x0, &(0x7f0000013c00)) 19:04:10 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x0, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:04:10 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:04:10 executing program 0: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x0, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:04:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:04:10 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) [ 1498.374105] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1498.386550] device syz_tun entered promiscuous mode [ 1498.389900] device syz_tun left promiscuous mode [ 1498.434547] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:04:10 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x0, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:04:10 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:04:10 executing program 1: r0 = getpgrp(0x0) getpgrp(r0) r1 = pidfd_open(r0, 0x0) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) 19:04:10 executing program 0: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x0, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:04:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:04:10 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) [ 1498.610705] device syz_tun entered promiscuous mode [ 1498.635272] device syz_tun left promiscuous mode [ 1498.737295] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:04:10 executing program 1: r0 = getpgrp(0x0) pidfd_open(0xffffffffffffffff, 0x0) r1 = pidfd_open(r0, 0x0) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) 19:04:10 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x0, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:04:10 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x0, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1498.806871] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1498.934236] device syz_tun entered promiscuous mode [ 1498.943789] device syz_tun left promiscuous mode [ 1499.176191] EXT4-fs warning (device loop5): ext4_multi_mount_protect:340: MMP startup interrupted, failing mount [ 1499.176191] 19:04:23 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x0, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:04:23 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:04:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000010f00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x2800}, {&(0x7f0000011600)='PMM\x00PM', 0x6, 0x6000}], 0x0, &(0x7f0000013c00)) 19:04:23 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000100)=""/158, &(0x7f00000000c0)=0x9e) 19:04:23 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xa, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:04:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:04:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x0, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:04:23 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x0, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1512.129839] device syz_tun entered promiscuous mode [ 1512.140822] device syz_tun left promiscuous mode [ 1512.175980] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:04:23 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) vmsplice(r1, &(0x7f0000001140)=[{&(0x7f0000000000)="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", 0x1000}, {&(0x7f0000001000)="3d177e8f4050332e87c648b0c7d6853fdf0d8f8dcca6c8f6b16b4c1a0c203f5787a016b0ddfd1a68e26059181203772dc1944b9c5634809321b9904b083fd67e83952e453bb98066da2089879ab14194422ac2650460fa180be356761b925ede1d2a63392392ef1fc2881bb234e11f6d2510a1eecd99273f32bdaef9aec3b3154449158f5d14621cd2376d032b177e9b85ef5b529838f76ba3da758e79e0e24e3df69926d4e5002db14d91fada5ec793c37a9ff150d2bf66434f0469e2bf4792702f9bf60f762524cce43bd5844368f234661bffffe34754029347a414f6f1ad9580b7d4d8f8fbb7613474033d94380450bbd117c919d1b9", 0xf8}, {&(0x7f0000001100)="8fa9f4fc934af5c7d204621af8c40455d31c8ca4023cd97b2db3960d497a9bd83abdb99410c8b0ffb60f4797d2210be89a6fb9dea836b58adeaa928d5b81864b", 0x40}], 0x3, 0x5) 19:04:23 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x0, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1512.263197] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:04:24 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x0, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:04:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:04:24 executing program 0: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1512.362310] device syz_tun entered promiscuous mode [ 1512.383808] device syz_tun left promiscuous mode 19:04:24 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xb, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:04:24 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000001c0), &(0x7f0000001680)={0x0, 0xfb, 0x1015, 0x5, 0x1, "d54f9614e0d9f133ddf47add2cc7ec73", "6262d0ddf847c64b438f95af6f03fe7ebc8ab304a18875ea72d3ca514e9543b89fd3ea0e45d1820d88eda9ffab678a2513a64a795710e4db43aa147934f48711e790c248281e9e557a15decaacaeae9f83aae789996b55c88edc4e4cc40b16fef3302f0b8acdb66d8edb8abb524933589b40d0e1a5fd2cabc373db67c881fc95a1be7a2d000769cb2f71a07b0290e9ccbb3390084c1c2856465de24297e0e5d7dd77fbe08b42265b8854683397a646f6a47563eb3f2350f097425c52a6772f18fa5a3e7c1119ccf7ddef8e26e471361aca2cab057032a76f7ee4a0ac8aa10b0e048b6d5a31430eb6caf3c1cd4e8c622fd05092b298ac2bbc25c5902e7b3574d65d379f52d8a6ab8cbb2bcf7e3d4c6488773a659453ac628accf63f8f31795c4362b353a9b4831b9bece05e9789abd984e43a1da46df0008304aa4eedad1228c6d602b07d25a4e5ed9935a33accf62fbebd1c92f9ad649aec53f0f1f3465b451e0b1a15047f90f6c61cbce1e6752d5824c09ae06a482a1ac48b9e0657aa196b01690a2000bb950ae9f395b37e950be7d663d3a36328abc4861b703df8ea69de03bd42696946c3db972a475f2d637f71c85054b306e3ed26ae5b407a2041a2b4f5da5da4b4a4f3af6b22637bc9ae39c126ace2528a3372e2530adb129065fb9618ff275c6c49d516307973bcdfc52da24441fa6aa44e2436fe5fb7fddf46981ec701586a155c8f3b7a224d0a27342dd14e28c4568db86c829c6be8545ed46a7dde99a4054e5a3d2d070de418c4ec3fc900e27732b862115889d6ba9b72a956dedc104ec35f018dacfe4e24ad3c158261bfdab6dba2b1039960cac5fd90ad272c91218dfa8b4174b0dd7ce99f61f645d902a8bf1fb78cf57a699ae60d307bb8e6f7f7aaa8253cca37a3b2359eb1be343e7ea8b48378109f704d93080fe7731c1dce66251bcc81c7003e9bfa3aeaa7990862aea4cb02d59c8b6a7478942338797e65f880603ed3995ab489e6fccd6975fb5035aa3f4ab1d09f72defeca434baace63e4270f53929c3d11c5aa5614204ec7524c8f30a988712c5d8e5cb554bfab057fbb3ddaf6e67580be53c8ea95858d8fc23c6444a939ac7fd3bd7f9fb09f6346cba8664067a685635f8bf90e39cf0b84470b44aa768001acabebae90a366f74ece8b50d263fc70c7227c9887eafe0c86af2da3015b0c2d4ad2c4df5328728a58bef67a08b4485d8f548c9a443bdc11afa4cc86224e38a3fe7cd4bc78d1db52883cb6fb69d33aa8906749f87d96db553cca32144f16163c4e3c4d00224bc4e7fa14805831a91cf58c0a833742dcdea3dbdaebf91fc9301bb4542e8ded8146edb7137cc4a84b93cb62a726565f0951919d3effd9eba869ee5de652903da6e6d577655b55abfae0bbb99208927d604f32803236888a38fe5623598203a3417dfe528494b5f8776c630856a5ed8918d3317456d46f43bde30c23dcffcde92b383a836a20e019e89ce818a23738494eea618af2aefbf173d988d86e3a9e8973346624836f67b0f34c9732251fa88d56d1083c8fc8f6f42188326f27d97a77ce831dd3870897b95eea47a86c1fce07875644d881824c07c020caf9fb3ce0f819a55af04848d2d47c8b65ab0c60ed806510a4536bb3e8b4cbe493316621e46b27edba324d19f57451a4c23b9d60fb3c38cd26a6d5ca5cfbe3acb65557d080c7f0030b35fc68e584603de0f9303eceefe3c620ef60d29b7b35400d34fc8d3386dbc1378895e9a8fe2773a092101bf042fbda24541f19dfcdbb9a51094d9b177af07c6d01e75752540cffff94be53bced4bda8660012960b8cd13f7ce7ccf3911c19151966cd734ae16573ec1adc2fb9b52a0338ab8155f2bcbb83b5af7a0027c94f8b9c46f1abd4e8410179a9e1891b2a9c1fbb870139f10396478f5c082d5fc4d01d688f8cca3ecda9609f0c3f0c30ffc5c12df10ec4c41f20b6a1a65ecbe7fa6eb9c0f81e8c3b3ad46842a85f44a19c8252aa2fb8df348557d381197bbf090e75d5e72debb854cb03cacb5adffa9cf693473695ff01a51807eee94ff7cb424afc226e49c4fd31043403b0ae1f114bba302b3af01838a33bd043c5dcdedb79fca364f5ca55c3b6eb6ddd0747df50bca6230fe01bbaa39be1463c1dce0103e3b06e3d539d4784b88eab1275b8c84ddf459935847ece0761c8528b354c34c413d3338929addc5d1ab4b98769ef4d22f4262522f909645c2dc1705b524133e00a181281898e60ec05a0b8672ce62891d62ccc779ebfbf7a4f64cda33711ca1bcd330a814804d250b167c9d6dce9aae0bedd07e752d5c670f60cfe7bae5ef91d9ef4736df7c00f10634dddb230d519e350d6a07758fbd7cda368d361ff264237ebe4e2f49ad11633ee794ecb05e303f484761ef99ee3bd4b0a7d4e2acd48f287678528608fb71f7aa793cc7275bb3cd833c7bf39ba867e85794310e3a3646c2ea2d61fef2fcf8d35706bf22af49bdba6d1cb06f89ba108e100753490e3796626032b71c634c1ab11e8a63d79e5f3ddb4d76092d89aa0431732e34a0077f2b0c4bcef765c855b0d265d75a6521e492923b25045327f26d784007ec59cd732b28590a0499dbc57a3f44ea50b897c53f0480fb7ba67c37b1c5dc7bf55c90bf697a040edf39c961434d4cb1f54c6ff1c4d88f07aeb70915a9added92a746bea9ed4bfcd7f2215e204911626b80ea868a8eb2c2c907bc19891601cd1ec19361aad541aca0523cce4a97bcb5e46a5d0bd0bf6d6287f4ae8b9c0b174784c0ce271e0053c9648387891badec08a3dddd36fc4523772d4656618e8be389c84a6e28d48724d2a2718031c902a9c05dab638c02b91dcb3528ba0ee89eb1cad84f7334604ae4a55790fe1687696dac144ffffbc373f32ca662b86c23d35029e09516c9edbf100fc39301126fad741b76f70abe97040c8efd0ab14cad83a0522db97c2eed14932055c53b0cd4ea9e7f7e4bdcd4a6937f2bb3b039b976fb3fe594e119577d57d4087df50e051b0fc4dc62c1cb81c43476e5da23781b641b96ad1d9a9a0323e0616c33f4052e6da7b582a71a01260bdce162220afb3ab28c76e2d2b6d32bca6a88cae54a813a7a652ba28585fe898a4cbb6e6927f0fc7dc4e7118387916ec5fc8ca07d094ca35dfccc8f115b9db7c20ebf30d14be65d5f9c93f9072f8c3c3009e427fa9b3e26709eef21678a7b4342b7e7fb7329da8c0996a612a3bf9a89de3a94f2ae29c39b251c8d3b19a355564864df5ac4412fd1c3d263daea4f1d38ee5adb784516f26f8bae7ae3e6630ad206c5f2e7cefd4d9790f516b72c5aaa6f1ab5b6e29edc3a70d9d3040c5458ae080a93f66e374e50ec05c5fb13a41f3f463adc969a9d89e4fb5488e3d6130ed71d35322f44ab468fbe482232b8167339be3298f1666c26b8d3188a790c437fa8e33c5792b1a176733c05f1b8244833f133e8816d81bbbfc742deb6cb1bee5c33272c126a40855d0e0c56c82cdb084e81f5213a9da95205ce0521428ff6764a76bdbc5efcf78bedaa973e2bda5f26580a37a50dfb973302aa069660ff0f79e1b606bae2dcad3fa6a4c73c726bfdf30aec26288464885dafe82523c64c9a8cf0cb7b494b9d2cf74ca55fa63c5401fbd7ca6356ac3e43ee4bda4b7fafeb17a8c786098e11c1f8be9b8870fb6f28332e549bdf593b98a5594f2f169a4ab564628fe6ad282870fc1b48eb131f9baddc4bc79d1e52ef494dff2564e85563621f53940b02ba3df94d0d45e618cea4b2d46b29d8b4cc5541f2d7bc68ef5bbc4db9bf2121d0c24f27ee611d735666b8eca6c5bf9e9607cf87f876ec735826946136701518a7c757ad2141e5793e4e0e9c600d07b3b08f001ae8359352290c2ba49facc3c05639a82067ccda112220c7ff9d91104daaae1dcb20fb911c084ee3be8179377e161486702d922e3d6c830d43c1c64d1d806133bdb1f7b0d11f2c6824e173e1847672e3e2ddb05eac55ea0ae7c0122e6f9167c5ec0a2633e0034c62bb755d899f8c6215dd1f8fc49929d81398e24734f3c6136239bc83fcb1f90fea809fbda997de9731270bcf33cb38ad406d6923fd19c4d7cd2b2f15dee4002f9cc6b78f911dd583324a0d9f2f0738bac94e5c6e60dce95d95b64e63ffb571c73998a94775fbdf7acf3d00e0254409e462736a1459804c868921b6ca9b9e4d397ab530ff73c7a939fe3dbf46d7c8891e21b80545af6b53746df24aab36d0cdc731e4af7ed414e8f2be54b63eb5419a4b4ee3cb12e68202ff2b0e8c9e75bd29ac99d4331d49f37a0240cf6ca77ecd11fa071806b56a7b569772182bed69711c135e29322df9744992db74330f05bd37e759332d3005e6b5a1008d44d37e63cda86a015e0a98ec1be054cd67f7d0db2e3f26c1e1cd67c1449a6dbd002239cb2f8ad72312d40d3bbea8e01f696338b3fe7b7bd8839aa9dfc0630bb984bba758eefee9daea69ef68630074ea127bcb2e8a3c83aeb29f4a047481c1762849797a86e895d0e723e47a5afb1f8e74e9ec70b0d0ef7cb6fdd355450b036486500f3bee5499d6d5f9fb06b87507753d0fa5beade8d75700f89c821a88734c2ce4bbb02dfc80311b9940a225817dbaff80915faf727a164fd94798e13e34a12c7297a4ad5688f892ec44b7544217197faa01dc13d2994099f2abdffb498a3936591ad6e3b66b3d881bce0232be34a36a115697cf2aafce2649e1a9f349adb3a9c6612ec9538bf8eff0f05c105dc1785a1ee4a084959807926e58438a29bb85c8f903e91a11edb83b194b7dd5cb0a9b4f3e6f965e3cde98e95ff18d9ce256a2172a3447e056905d5c752f1042a455d979d3580d32f9d6a9fd18c970d028ec8f10466bde7aecf8090c4c2ec6769a6ee105ece29342aa8188282c27aa9dbd34dc1261abe5809b618f2a6095b1ec86321f33ba1b47d92eb202fad313bfee7590369b0be3a5ee4aaf8ed6a21662155cd280eb5bebe47ae73adc9f8c662a0fbb37cc1eff460316d90b135dc5d51703b06b358151b6a1891fd9f31cfc7c814ddd73dde41b485f059e97ca400dba4519f97739801e11a3e5056e607327871186a0a07f4ea0f2146ef10f5f3cfa5eca9cb19e63f26f180b7a0837471bd673034b3b6c5e06cfcc1e4d2e69db14ec51d245caf9282d47c615e31129e46d9584a21557e33678b8af7bb9bc5600c6d2d43b10686699a11ce76c2f4999cd8d625bd4b153219aacf84725a5ad0b34b495f4e56134f65476e1118a0da1aed9c6741d6360e4476f033fb8121e19cd946c2557d6537ddcae3f4b259a50fc73f519d4305614f83fb6cadb130a36b309ac6cda4b76c0535fb2a2663a6de271e9621e10a69af3e6c2fada54c672cd10b821f083f6c1252f49aca60b7ff6e40645c211311b2a221714f185908d94f622e6affd07f325064552a0dd89c9e647dce5a8c2dc9fd4dd8d45a41e3bce3f9075467a09b3d9bca2f46ba00feff09196d9175f3874834ff8d152cad69a13b5520300ca33508dc7556254dc0818abefe0d66f03cdc0bc5d2bd0043f71481eb9cc4e4ea2003ba7c75049fb5d57cf407e96697a7c4aa88cd784be2c0050024ba0cfbb4289be8dce6c3282cb7ba99198cbcb3db4ada30ce98f1f1ccabf5d8aca3babeb59e9e301f1f33e6b7f96ad62d6164efcb2a6f45da2e4b8ba1fe3c8739315f0f149d06a48e482fa7ac1b99a22d846041d6d06b5365b1baface260090e44b55ada7ae5be4ce72d3552c7d8e7bcf8191d4e98e04e283e848e59fb6c1e41e0f082558"}, 0x1015, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2, {0xee01, 0xffffffffffffffff}}, './file0\x00'}) sendmsg$nl_xfrm(r2, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=@delsa={0x300, 0x11, 0x200, 0x70bd27, 0x25dfdbfd, {@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x4d3, 0x2, 0x6c}, [@coaddr={0x14, 0xe, @in=@multicast1}, @sa={0xe4, 0x6, {{@in6=@local, @in6=@local, 0x4e21, 0x0, 0x4e22, 0xa7, 0x2, 0x80, 0x20, 0xff, 0x0, r3}, {@in6=@mcast1, 0x4d6, 0xff}, @in=@multicast1, {0xffffffffffffffc0, 0x3, 0x80, 0x6, 0x0, 0xfffffffffffffff7, 0xffff, 0x200}, {0x1, 0x4, 0x1, 0x9}, {0x5, 0x3ff, 0x80}, 0x70bd26, 0x3507, 0x2, 0x2, 0x80, 0x2}}, @algo_crypt={0x74, 0x2, {{'cbc-des3_ede-asm\x00'}, 0x160, "666301feaff9bce2e0ed98b29ad8a549e285fe3f1d94681cadffb5e7ce45b2dd555af58586ff937950629d4e"}}, @mark={0xc, 0x15, {0x35075b, 0x8}}, @address_filter={0x28, 0x1a, {@in6=@local, @in6=@dev={0xfe, 0x80, '\x00', 0xb}, 0x2, 0xff, 0x9}}, @replay_thresh={0x8, 0xb, 0x200}, @policy_type={0xa}, @algo_comp={0xa8, 0x3, {{'deflate\x00'}, 0x300, "44ad67c13cb0ee0933ac4cd508bef1f92552c23b37ab350237653b7b4efe75dc147cae97706b966b1cf6f68a71542d059828684d0ec2a6b03a3c9f4d0d1e102acceec622cd116edf2fdaef0cbc47d240a32e4365dace31e5e8fbabbd1c5040cc"}}, @sec_ctx={0x7b, 0x8, {0x77, 0x8, 0x0, 0x4, 0x6f, "d401024a21e791e378763c0a0262e387ffb726b70e0b0eaee3b92f50b8b48b1b32cb386c5b934af794e7f84cb660c88713fd23013e1625e1e45d2fc04364e4890af4d83e19a3003932f5df36f4f3f2f0a9ed0a1d79499164d1871982aaf78e4e6627459705b29bd952661eed6693db"}}]}, 0x300}, 0x1, 0x0, 0x0, 0x44040}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0x158, 0x1a, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@local, 0x0, 0x33}, @in=@private, {0x0, 0x0, 0x6}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}}]}, 0x158}}, 0x0) vmsplice(r2, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) pidfd_open(r0, 0x0) [ 1512.550598] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1512.570851] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1512.935404] EXT4-fs warning (device loop5): ext4_multi_mount_protect:340: MMP startup interrupted, failing mount [ 1512.935404] 19:04:37 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x0, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:04:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:04:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000010f00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x2800}, {&(0x7f0000011600)='PMM\x00PM', 0x6, 0x6000}], 0x0, &(0x7f0000013c00)) 19:04:37 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x0, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:04:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:04:37 executing program 1: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x4, 0x8, 0x8, 0x6, 0x0, 0x7, 0x8000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000000), 0x4}, 0x4000, 0x4, 0x1, 0x6, 0x4, 0x2, 0x7, 0x0, 0x10000, 0x0, 0x5}, r0, 0x7, 0xffffffffffffffff, 0x1) r1 = pidfd_open(r0, 0x0) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) 19:04:37 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xd, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:04:37 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x0, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) [ 1526.118884] device syz_tun entered promiscuous mode [ 1526.132380] device syz_tun left promiscuous mode 19:04:37 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x0, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1526.161796] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1526.203491] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:04:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xf, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:04:38 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x0, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:04:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:04:38 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)='\x00', 0x1}, {&(0x7f0000000080)="8e67c0c7ad8eae75590cc6938d69a46520aff5e37a62015dd7ceb9b77dff3173f0441467ef9b79fcb74e95d11583216a02d71892fa3d34c60bf7da2146d54f1225028a197bf104aad13cb97acf52e86392ac91b555ee42b56343db0e397434bbeeeb381136f3deec60e02f581d762b88ab74c223ec0be4a69dd3336c6a4e828e60772c1a9b5240c04bf3c86d409c916da2735176a422c98ac9a0c851007c6c42ea98553cd92958dff9a3bf2cf3b6aa881bf6cf42da5b8770fdf3c932076c48947d811e46e015d5d10f5d9f59d5ef3fd9b6f7e9cf526df025967a6ea208c4cc", 0xdf}], 0x2, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x20000000, 0x141180) pidfd_getfd(r2, r1, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r3, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_FSYNC={0x3, 0x1, 0x0, @fd=r3, 0x0, 0x0, 0x0, 0x1, 0x1}, 0xb84) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0xd0100, 0x0) dup3(r3, r4, 0x0) dup(0xffffffffffffffff) 19:04:38 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x0, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) [ 1526.398795] device syz_tun entered promiscuous mode 19:04:38 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x0, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1526.404725] device syz_tun left promiscuous mode 19:04:38 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x0, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) [ 1526.498668] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1526.542343] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1526.591639] device syz_tun entered promiscuous mode [ 1526.607931] device syz_tun left promiscuous mode [ 1526.913412] EXT4-fs warning (device loop5): ext4_multi_mount_protect:340: MMP startup interrupted, failing mount [ 1526.913412] 19:04:54 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x0, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:04:54 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x0, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:04:54 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x11, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:04:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:04:54 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x0, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:04:54 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x0, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:04:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000010f00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x2800}, {&(0x7f0000011600)='PMM\x00PM', 0x6, 0x6000}], 0x0, &(0x7f0000013c00)) 19:04:54 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) fcntl$lock(r1, 0x25, &(0x7f0000000000)={0x2, 0x0, 0x80, 0x0, r0}) r2 = fork() r3 = getpgrp(r2) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_FSYNC={0x3, 0x1, 0x0, @fd=r4, 0x0, 0x0, 0x0, 0x1, 0x1}, 0xb84) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x9, 0x2, 0x5, 0x0, 0x6, 0x30404, 0x5, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000040), 0xa}, 0x44000, 0x5, 0xf3a6, 0x4, 0x8, 0x6, 0x7, 0x0, 0x7fff, 0x0, 0x9}, r2, 0xe, r4, 0x2) r5 = pidfd_open(r3, 0x0) vmsplice(r5, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) [ 1542.479549] device syz_tun entered promiscuous mode [ 1542.487754] device syz_tun left promiscuous mode 19:04:54 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x0, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) [ 1542.561537] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:04:54 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x0, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:04:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:04:54 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x2e, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) [ 1542.719890] device syz_tun entered promiscuous mode [ 1542.734672] device syz_tun left promiscuous mode 19:04:54 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r2, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup(r2) sendfile(r2, r4, 0x0, 0x3) readv(r3, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_FSYNC={0x3, 0x1, 0x0, @fd=r3, 0x0, 0x0, 0x0, 0x1, 0x1}, 0xb84) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x3f, 0x7, 0x8, 0x0, 0x0, 0x1000, 0x40204, 0xa, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x8041, 0x800, 0x1000, 0x1, 0x3ff, 0x0, 0xfe00, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0x9, r3, 0x2) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_FSYNC={0x3, 0x1, 0x0, @fd=r2, 0x0, 0x0, 0x0, 0x1, 0x1}, 0xb84) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x3, 0x82, 0x2, 0x1f, 0x0, 0x9, 0x4000, 0x9, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x39f, 0x1}, 0x3450, 0xffff, 0x101, 0x5, 0x6, 0x3, 0x6, 0x0, 0x7, 0x0, 0x7}, 0x0, 0x9, r2, 0x2) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) 19:04:54 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x0, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:04:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:04:54 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x60, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) [ 1542.996411] device syz_tun entered promiscuous mode [ 1543.008961] device syz_tun left promiscuous mode [ 1543.061757] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1543.100543] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1543.327806] EXT4-fs warning (device loop5): ext4_multi_mount_protect:340: MMP startup interrupted, failing mount [ 1543.327806] 19:05:08 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x0, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:05:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000010f00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x2800}, {&(0x7f0000011600)='PMM\x00PMM', 0x7, 0x6000}], 0x0, &(0x7f0000013c00)) 19:05:08 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00'}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000180)={0x38, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}]}]}, 0x38}}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) sendmsg$nl_generic(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000015c0)={&(0x7f0000000080)={0x14, 0x2a, 0x2, 0x70bd27, 0x25dfdbff, {0x13}}, 0x14}, 0x1, 0x0, 0x0, 0x40000d4}, 0x20000180) vmsplice(r1, &(0x7f0000000080), 0x0, 0x0) r5 = fork() ptrace(0x8, r5) 19:05:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:05:08 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x0, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:05:08 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:05:08 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:05:08 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x0, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) [ 1557.246012] device syz_tun entered promiscuous mode [ 1557.255457] device syz_tun left promiscuous mode [ 1557.302185] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1557.375519] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:05:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:05:09 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x0, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:05:09 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:05:09 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x410, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:05:09 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0xe) [ 1557.592951] device syz_tun entered promiscuous mode [ 1557.601222] device syz_tun left promiscuous mode [ 1557.702214] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:05:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:05:09 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:05:09 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x0, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1557.808883] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1557.903802] device syz_tun entered promiscuous mode [ 1557.923905] device syz_tun left promiscuous mode [ 1558.056177] EXT4-fs warning (device loop5): ext4_multi_mount_protect:340: MMP startup interrupted, failing mount [ 1558.056177] 19:05:24 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r2, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r2}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r3) 19:05:24 executing program 1: r0 = getpgrp(0x0) r1 = perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0xff, 0x3, 0xfb, 0x8, 0x0, 0x24, 0x4e040, 0x6, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x80000001, 0x1, @perf_bp={&(0x7f0000000400), 0x7}, 0x8008, 0xf70, 0x3, 0x3, 0x6, 0x7, 0x8, 0x0, 0x4, 0x0, 0x3}, r0, 0x3, 0xffffffffffffffff, 0x2) r2 = pidfd_open(r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000), 0x6e, &(0x7f0000000240), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="e718fe6a09b038280000c165031132de7e0c0533852a30cae4d0bca196872d8c6cd25519783873", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000001000000", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xf0}, 0x40000040) syz_open_procfs(r3, &(0x7f00000003c0)='io\x00') vmsplice(r2, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000001840)=@flushsa={0x14, 0x1c, 0x100, 0x70bd2b, 0x25dfdbff, {0x3c}}, 0x14}, 0x1, 0x0, 0x0, 0x44040}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000600)={0x0, 0x1, 0x4, 0xfffffffffffffffe, 0x100, 0x2b2}) r6 = syz_open_dev$vcsn(&(0x7f00000002c0), 0x7, 0x10001) pidfd_send_signal(r6, 0xc, &(0x7f0000000300)={0x38, 0x5, 0x9}, 0x0) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000640), 0x20103, 0x0) fcntl$setstatus(r7, 0x4, 0x6000) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="580100001a0001000000000000000000fc020000000000000000000000000001ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="ac1414aa0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000016c84f66ed66fb4000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000000000004c0014007368613235360000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c001700000000000000000000000000000000000000000000000080"], 0x158}}, 0x0) close_range(r4, r5, 0x0) 19:05:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:05:24 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x0, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:05:24 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x0, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:05:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:05:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000010f00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x2800}, {&(0x7f0000011600)='PMM\x00PMM', 0x7, 0x6000}], 0x0, &(0x7f0000013c00)) 19:05:24 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) [ 1573.308291] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1573.372455] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:05:25 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r2, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r2}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r3) 19:05:25 executing program 0: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x0, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:05:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:05:25 executing program 1: r0 = getpgrp(0x0) prlimit64(r0, 0x7, &(0x7f0000000080)={0x1, 0x8}, &(0x7f00000000c0)) r1 = pidfd_open(r0, 0x0) syz_open_procfs(r0, &(0x7f0000000040)='net/fib_triestat\x00') r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) dup(r2) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x31f, &(0x7f0000000240)={'wlan1\x00'}) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x1a3, 0x0, r3}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200), &(0x7f0000000140)) ioctl$TUNSETLINK(r3, 0x400454cd, 0x336) 19:05:25 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x0, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:05:25 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:05:25 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r2, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r2}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r3) 19:05:25 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000001840)=@flushsa={0x14, 0x1c, 0x100, 0x70bd2b, 0x25dfdbff, {0x3c}}, 0x14}, 0x1, 0x0, 0x0, 0x44040}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0x158, 0x1a, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@local, 0x0, 0x33}, @in=@private, {0x0, 0x0, 0x6}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}}]}, 0x158}}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x7, 0x0, 0x2}) kcmp(r0, r0, 0x4, r2, r3) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) [ 1573.681558] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:05:25 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x0, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:05:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) [ 1574.095606] EXT4-fs warning (device loop5): ext4_multi_mount_protect:340: MMP startup interrupted, failing mount [ 1574.095606] 19:05:41 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x0, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:05:41 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x0, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:05:41 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x0, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:05:41 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={0x0, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r3) 19:05:41 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:05:41 executing program 1: getpgrp(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000100)=""/104, 0x68}, {&(0x7f0000000180)=""/240, 0xf0}], 0x2, &(0x7f00000002c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x98}, 0x10000) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000003c0)) getpgrp(r0) getpgid(r0) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) r3 = pidfd_open(r2, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x3, 0x0, 0x6, 0x4, 0x0, 0x2, 0x8, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xffff, 0x0, @perf_bp, 0x4000, 0x1, 0x8, 0x1, 0x2, 0x10001, 0x31, 0x0, 0x8000}, 0x0, 0x3, 0xffffffffffffffff, 0x19) vmsplice(r3, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) r4 = syz_io_uring_complete(0x0) pidfd_send_signal(r4, 0x3a, &(0x7f0000000400)={0x2a, 0x4, 0xffffff60}, 0x0) 19:05:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp={0x0}, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:05:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000010f00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x2800}, {&(0x7f0000011600)='PMM\x00PMM', 0x7, 0x6000}], 0x0, &(0x7f0000013c00)) [ 1589.804952] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:05:41 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={0x0, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r3) [ 1589.899824] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:05:41 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x0, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:05:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp={0x0}, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:05:41 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x900, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:05:41 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={0x0, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r3) [ 1590.135869] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1590.156235] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:05:41 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xa00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) [ 1590.361387] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1590.385622] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1590.582374] EXT4-fs warning (device loop5): ext4_multi_mount_protect:340: MMP startup interrupted, failing mount [ 1590.582374] 19:05:59 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x0, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:05:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp={0x0}, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:05:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x0, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:05:59 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) r4 = dup(r3) pidfd_send_signal(r3, 0x12, &(0x7f0000000000)={0x2a, 0x0, 0x70f5}, 0x0) r5 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r4, 0xc020f509, &(0x7f00000010c0)={0xffffffffffffffff, 0x1, 0x6, 0x2}) r7 = epoll_create(0x7ffd) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000002c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_WAIT_SYNC(r7, 0x40089416, &(0x7f00000001c0)=r8) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r6, 0xc0c89425, &(0x7f0000001100)={"247ea73c482bb1e0baff60b83562ac9f", 0x0, r8, {0x3, 0x5bb9}, {0x3, 0x9bf}, 0x4, [0x664, 0x8, 0x9, 0x81, 0x7, 0x101, 0x200, 0x6706, 0x40, 0x0, 0x3, 0x7, 0x8, 0x3f, 0x11, 0x8]}) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x31f, &(0x7f0000000240)={'wlan1\x00'}) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x1a3, 0x0, r5}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r9 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r9, 0x31f, &(0x7f0000000240)={'wlan1\x00'}) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x1a3, 0x0, r9}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200), &(0x7f0000000140)) ioctl$SNDRV_TIMER_IOCTL_INFO(r9, 0x80e85411, &(0x7f0000001200)=""/141) getsockopt$inet6_tcp_buf(r5, 0x6, 0x1f, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) vmsplice(r1, &(0x7f0000001640), 0x0, 0x0) 19:05:59 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x0, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:05:59 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000100)={r2, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r2}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r3) 19:05:59 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xb00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:05:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000010f00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x2800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000013c00)) 19:05:59 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000100)={r2, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r2}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r3) [ 1607.584752] EXT4-fs warning (device loop5): read_mmp_block:114: Error -117 while reading MMP block 12 [ 1607.585392] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1607.626896] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:05:59 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x0, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:05:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0x0, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:05:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000010f00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x2800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000013c00)) 19:05:59 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xd00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:05:59 executing program 1: r0 = pidfd_open(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) dup(r1) vmsplice(r0, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) 19:05:59 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000100)={r2, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r2}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r3) [ 1607.851162] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1607.863681] EXT4-fs warning (device loop5): read_mmp_block:114: Error -117 while reading MMP block 12 19:05:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0x0, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) [ 1607.927244] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:06:15 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xe7a, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:06:15 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x0, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:06:15 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x0, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:06:15 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:06:15 executing program 1: getpgrp(0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)=[{{&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000080)=""/7, 0x7}, {&(0x7f00000000c0)=""/247, 0xf7}, {&(0x7f00000001c0)=""/219, 0xdb}, {&(0x7f00000002c0)=""/251, 0xfb}, {&(0x7f00000003c0)=""/3, 0x3}, {&(0x7f0000000400)=""/65, 0x41}], 0x6}}, {{&(0x7f0000000500)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000580)=""/31, 0x1f}], 0x1, &(0x7f0000000600)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}], 0x2, 0x40002021, &(0x7f0000000740)={0x0, 0x989680}) r0 = getpgrp(0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x31f, &(0x7f0000000240)={'wlan1\x00'}) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x1a3, 0x0, r1}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200), &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000780)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x79, 0x2}}, './file0\x00'}) r2 = pidfd_open(r0, 0x0) r3 = fcntl$getown(r2, 0x9) r4 = pidfd_open(r3, 0x0) vmsplice(r4, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x6) 19:06:15 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0x0, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:06:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000010f00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x2800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000013c00)) 19:06:15 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1623.454800] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1623.491067] EXT4-fs warning (device loop5): read_mmp_block:114: Error -117 while reading MMP block 12 [ 1623.537498] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:06:15 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:06:15 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x0, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:06:15 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:06:15 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000002c0)="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", 0x185}, {&(0x7f0000000100)="d6aa5ea31cec9d32ed3d818b87fdb8bee9091f3e252ac4a5ebff55e29468fd6f9745cb83eb234d9caaffe36f137d55a4745e161d2b3a13126f55e1e8ab68c86f2ca3e58e219b54ae97e6a3dae7888f1386e6229fd9dfdbf3268496092aadb027719389a1a4f71207496ea93911049cd85d1e0e8d87ef310a4d658d068879a5cc361e2034a3abad3cf66ec1def40b488fd9d99522f1890cb5f208fd2518f9b2e55f26ccd27b4b97a140", 0xa9}, {&(0x7f0000002700)="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", 0x1089}, {&(0x7f00000011c0)="e8bfb70d4d9cb8afc5e9a66b1d884417db36f39a02a0ec6780528a0c45e1fe5cc022689274257d1432f6db1b44e7bcd33c396a23921f07544245a9ed5c65f94360e4a3a4ee56a5bf2a8b096c1271d0e2b77a8ab956d2f2ce12e1d25de02a28e61cc412270f7f72896360e50fecbf831223c086a7cc8ecd27bfb2cf851f545932d23110", 0x83}, {&(0x7f0000001280)="1e46d99c59f4fbeb96eb3d9ecb9a32a3d9b482243c862c4939db4a1c2889b0b249305332284d0a222c3b34f2e22e7d3b409b38b3eea483ce028c60cfe6059e0e20781924edb1428422ddf932ce8c38ca46fab3ed45afe1dcea22ce12b3936f24d90abd51bd2e1d771513a4815bf73076e2136c5f545cc9d673426ff8b46a8722fe0e115d7852", 0x86}, {&(0x7f00000001c0)="d6440ef5d67b76636c5dd0a500abdcdf5835905874f0cc682d7115bd9fbdee3b02b20343a61bf1e58c88a3c18be81b0d706ea76be14e5598bc5a3b0d49b03cacba111a92b496db2177e131f60c742b48eccd61d65aac328f63258f99b9c19ccb218e10b53dcbee22472cc9d5b2b8b3ffd97c853018a43200eee437adc2221017a96578f1ee6c94838aff10709376024628f1ed586d4f4c2b554032fd83d515da36a9bd4adfda79e599944f44068c52a0fe6c05b0d4aa809fcd9b1d82d31bc96322f3f2e0814fd7cb7535c69b577648f5c3f4ff5e", 0xd4}, {&(0x7f0000001440)="1ff4ed5fa8537367122c236931f36a85c989d45fecfa49d1fb1cb8680e3407fdf7b4a86587e968ed422eaa901e1c6517bcc9fb95469d36d84c37cc602ee6f8ed8ce51260186495aa9374889bbfa862adfab4f5cbe084feacd5164d6348838893a7249e297a4af85489dc5101a2d7b3d060b4adb94abb3bbdc09479c928e0514e8ae761879d1395b8422423c0fcd9fb99990fb5b09bdf9ac0f88b44f7a22a624903553d07e41a9975863c12e7a9c237ab8642348e250a271c54788d081ce0451253ae16097d82", 0xc6}, {&(0x7f0000000480)="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", 0x281}, {&(0x7f00000037c0)="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", 0x1000}], 0x9, 0x8) 19:06:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}], 0x0, &(0x7f0000013c00)) 19:06:15 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xf00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) [ 1623.893122] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:06:15 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:06:15 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) ptrace$getregset(0x4204, r2, 0x2, &(0x7f0000000100)={&(0x7f0000000040)=""/137, 0x89}) [ 1623.923890] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 1623.942162] EXT4-fs (loop5): get root inode failed [ 1623.943456] EXT4-fs (loop5): mount failed [ 1624.002441] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:06:15 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:06:30 executing program 0: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x0, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:06:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {0x0, 0x0, 0x6000}], 0x0, &(0x7f0000013c00)) 19:06:30 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:06:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x0, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:06:30 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={0x0, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:06:30 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x1004, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:06:30 executing program 1: r0 = getpgrp(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x2, 0x7, 0x6b, 0x70, 0x0, 0x10001, 0x80000, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x81cc, 0xfffffffffffffff7}, 0x11, 0x35, 0x7f, 0x7, 0x5, 0x8, 0xff, 0x0, 0x90, 0x0, 0x100000000}, r0, 0x8, 0xffffffffffffffff, 0x2) r2 = pidfd_open(r0, 0x0) r3 = getpgrp(0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000100)=0x5, 0x7fffffff) pidfd_open(r3, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_FSYNC={0x3, 0x1, 0x0, @fd=r4, 0x0, 0x0, 0x0, 0x1, 0x1}, 0xb84) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x5582, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r5, &(0x7f0000000140)={0xc0000003}) dup(r7) dup2(r5, r7) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x4, 0x7, 0x8, 0xf9, 0x0, 0x9, 0x8000, 0x7, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0x6, 0x7ff}, 0x800, 0x2, 0x401, 0x3, 0x8, 0x4, 0x9, 0x0, 0x800}, r3, 0xc, r4, 0x1) vmsplice(r2, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) 19:06:30 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1638.416129] EXT4-fs warning (device loop5): read_mmp_block:114: Error -117 while reading MMP block 12 [ 1638.443623] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:06:30 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={0x0, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) [ 1638.507445] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:06:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x0, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:06:30 executing program 0: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:06:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {0x0, 0x0, 0x6000}], 0x0, &(0x7f0000013c00)) 19:06:30 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:06:30 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={0x0, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:06:30 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) getpgrp(r0) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000000000)="ff0ed7c6786eb80096985e7a4ba1d4b4d0ffc26b376f7828830c9d646be15a263656d3d0b54f0c20479b417d57e489703d23ad28e0a853568b73f650e8a8dfc748a9d48304633aa3a26251e9ed7897ee575d1895610127f1db7edecc49681957fb27a6d31efd3193fc", 0x69}], 0x1, 0x0) 19:06:30 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x1020, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) [ 1638.742763] EXT4-fs warning (device loop5): read_mmp_block:114: Error -117 while reading MMP block 12 19:06:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x0, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:06:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) [ 1638.909923] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1638.992345] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:06:45 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:06:45 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:06:45 executing program 0: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:06:45 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:06:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x0, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:06:45 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x1100, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:06:45 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) pidfd_getfd(r3, 0xffffffffffffffff, 0x0) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) 19:06:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {0x0, 0x0, 0x6000}], 0x0, &(0x7f0000013c00)) [ 1653.567144] device syz_tun entered promiscuous mode [ 1653.577599] device syz_tun left promiscuous mode [ 1653.598673] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1653.613869] EXT4-fs warning (device loop5): read_mmp_block:114: Error -117 while reading MMP block 12 [ 1653.645119] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:06:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x0, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:06:45 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:06:45 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:06:45 executing program 0: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x40010, 0xffffffffffffffff, 0x8000000) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x100000e, 0x10, 0xffffffffffffffff, 0x10000000) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000001840)=@flushsa={0x14, 0x1c, 0x100, 0x70bd2b, 0x25dfdbff, {0x3c}}, 0x14}, 0x1, 0x0, 0x0, 0x44040}, 0x0) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0x158, 0x1a, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@local, 0x0, 0x33}, @in=@private, {0x0, 0x0, 0x6}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}}]}, 0x158}}, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x31f, &(0x7f0000000240)={'wlan1\x00'}) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x1a3, 0x0, r6}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000000)=@IORING_OP_WRITE_FIXED={0x5, 0x4, 0x0, @fd=r5, 0x0, 0x0, 0x120ea6a2, 0x0, 0x0, {0x1, r9}}, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r10, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000001840)=@flushsa={0x14, 0x1c, 0x100, 0x70bd2b, 0x25dfdbff, {0x3c}}, 0x14}, 0x1, 0x0, 0x0, 0x44040}, 0x0) sendmsg$nl_xfrm(r10, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0x158, 0x1a, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@local, 0x0, 0x33}, @in=@private, {0x0, 0x0, 0x6}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}}]}, 0x158}}, 0x0) sendmsg$nl_xfrm(r10, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x686e2274d2fb3b7a}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=@getsadinfo={0x10c, 0x23, 0x200, 0x70bd2a, 0x25dfdbff, 0x0, [@sec_ctx={0xef, 0x8, {0xeb, 0x8, 0x0, 0x4, 0xe3, "9180172628d91967c4b5aab8d584160fe5a60f0f5cbc32c8c8a44ec83c5ccf940bcab319b749e53701848886147835a627e4d98959b75ded619a673008bb04ef063c33a22895e4f13301b3e988a8d53ca86e42915d9e137623ee30604dc39f5895359bd9c572476a626f89ead113eb9328a04e8395f8b07488fa8cd3c89ad51e83219576345ec524c3aeba0f4eb6f62d233e2f1f4b3fdfb1d9bf4ba0f1575cc5f65c52c1c9bfc0606fe1e8fa37637376d5c91cd84222cb8eb8fc0aff2d59f1dc1f58a9651e31b11652a1ce51fdc3e9c870246e14684450a1dd7e71ef3776474c75377a"}}, @XFRMA_IF_ID={0x8}]}, 0x10c}}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4, 0x2004, @fd=r4, 0x10000, 0x0, 0x0, 0x10, 0x0, {0x3, r9}}, 0x3) 19:06:45 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:06:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000011600), 0x0, 0x6000}], 0x0, &(0x7f0000013c00)) 19:06:45 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x31f, &(0x7f0000000240)={'wlan1\x00'}) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x1a3, 0x0, r2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200), &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="800000f4ffffff002e2f66006c653000"]) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r3, 0xc00c620f, &(0x7f0000000040)={r0}) r4 = openat$cgroup_int(r3, &(0x7f0000000280)='hugetlb.2MB.rsvd.failcnt\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) r5 = getpgrp(0x0) pidfd_open(r5, 0x0) rt_tgsigqueueinfo(r0, r5, 0x17, &(0x7f0000000180)={0x24, 0x1, 0x7}) r6 = getpgrp(0x0) pidfd_open(r6, 0x0) prlimit64(r6, 0xa, &(0x7f0000000080)={0xfffffffffffff000, 0x100}, &(0x7f00000000c0)) 19:06:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x0, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) [ 1653.848393] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1653.861759] device syz_tun entered promiscuous mode [ 1653.873446] EXT4-fs warning (device loop5): read_mmp_block:114: Error -117 while reading MMP block 12 [ 1653.876741] device syz_tun left promiscuous mode 19:07:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x2010, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:07:00 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:07:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000003d40)={{0x1, 0x1, 0x18, r0, {0x81}}, './file0\x00'}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000003d80)={0x0, 0x2, 0x4, 0x40}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000003b80), &(0x7f0000003bc0)={0x0, 0xfb, 0x63, 0x5, 0x0, "eaad22d2a471fab378e9243c2a46a177", "22176d3f242116a4b015d396b513d6b17a2c9578356b0a0288469895192806e6a7882d5aa352e1e006af3bcd89c8dfd917368afd6ddd24f252db1ec68f700d884b85e30530e0c999182b26189a41"}, 0x63, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000003d00)={{0x1, 0x1, 0x18, r2, {0x7}}, './file0\x00'}) perf_event_open(&(0x7f0000003c80)={0x2, 0x80, 0x2d, 0x4, 0x1, 0x7, 0x0, 0x80000000, 0x84094, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000003c40), 0x4}, 0x705, 0x4, 0x9, 0x3, 0x6, 0x1, 0x7, 0x0, 0xd, 0x0, 0x100000000}, 0x0, 0x10, r4, 0x8) vmsplice(r2, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000062c0)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000080)=""/28, 0x1c}, {&(0x7f00000000c0)=""/41, 0x29}, {&(0x7f0000000100)=""/191, 0xbf}, {&(0x7f00000001c0)=""/172, 0xac}, {&(0x7f0000000280)=""/210, 0xd2}, {&(0x7f0000000380)=""/187, 0xbb}], 0x6, &(0x7f00000004c0)=""/233, 0xe9}, 0x7f}, {{0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000005c0)=""/147, 0x93}, {&(0x7f0000000680)=""/238, 0xee}, {&(0x7f0000000780)=""/17, 0x11}, {&(0x7f00000007c0)=""/250, 0xfa}, {&(0x7f0000001680)=""/4096, 0x1000}, {&(0x7f00000008c0)=""/14, 0xe}, {&(0x7f0000000900)=""/140, 0x8c}, {&(0x7f00000009c0)=""/45, 0x2d}, {&(0x7f0000000a00)=""/21, 0x15}, {&(0x7f0000000a40)=""/25, 0x19}], 0xa, &(0x7f0000000b40)=""/215, 0xd7}, 0xe555}, {{0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000c40)=""/104, 0x68}, {&(0x7f0000000cc0)=""/124, 0x7c}, {&(0x7f0000000d40)=""/55, 0x37}], 0x3}, 0x5}, {{0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000dc0)=""/177, 0xb1}, {&(0x7f0000000e80)=""/133, 0x85}, {&(0x7f0000000f40)=""/221, 0xdd}, {&(0x7f0000001040)=""/35, 0x23}, {&(0x7f0000001080)=""/202, 0xca}, {&(0x7f0000001240)=""/153, 0x99}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001300)=""/13, 0xd}, {&(0x7f0000001340)=""/73, 0x49}], 0x9, &(0x7f0000001480)=""/46, 0x2e}, 0x7d1}, {{0x0, 0x0, &(0x7f0000003800)=[{&(0x7f0000002680)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/215, 0xd7}, {&(0x7f00000015c0)=""/68, 0x44}, {&(0x7f0000003680)=""/50, 0x32}, {&(0x7f00000036c0)=""/225, 0xe1}, {&(0x7f00000037c0)=""/56, 0x38}], 0x6, &(0x7f0000003880)=""/71, 0x47}, 0x400}, {{&(0x7f0000003900)=@ethernet={0x0, @local}, 0x80, &(0x7f0000003dc0)=[{&(0x7f0000003980)=""/164, 0xa4}, {&(0x7f0000003a40)=""/17, 0x11}], 0x2, &(0x7f0000003ac0)=""/151, 0x97}, 0x5}, {{0x0, 0x0, &(0x7f0000005cc0)=[{&(0x7f00000064c0)=""/4102, 0x1006}, {&(0x7f0000004b80)=""/4096, 0x1000}, {&(0x7f0000005b80)=""/115, 0x73}, {&(0x7f0000005c00)=""/113, 0x71}, {&(0x7f0000005c80)=""/19, 0x13}], 0x5}, 0x1}, {{&(0x7f0000005d40)=@phonet, 0x80, &(0x7f0000006240)=[{&(0x7f0000005dc0)=""/42, 0x2a}, {&(0x7f0000005e00)=""/21, 0x15}, {&(0x7f0000005e40)=""/182, 0xb6}, {&(0x7f0000005f00)=""/130, 0x82}, {&(0x7f0000005fc0)=""/242, 0xf2}, {&(0x7f00000060c0)=""/125, 0x7d}, {&(0x7f0000006140)=""/205, 0xcd}], 0x7}, 0x80000000}], 0x8, 0x2020, 0x0) dup2(r0, r5) 19:07:00 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:07:00 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:07:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x0, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:07:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000011600), 0x0, 0x6000}], 0x0, &(0x7f0000013c00)) 19:07:00 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x0, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) [ 1668.426388] device syz_tun entered promiscuous mode [ 1668.457887] device syz_tun left promiscuous mode [ 1668.468596] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1668.475985] EXT4-fs warning (device loop5): read_mmp_block:114: Error -117 while reading MMP block 12 [ 1668.539379] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:07:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000011600), 0x0, 0x6000}], 0x0, &(0x7f0000013c00)) 19:07:00 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r2, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_FSYNC={0x3, 0x1, 0x0, @fd=r2, 0x0, 0x0, 0x0, 0x1, 0x1}, 0xb84) fchdir(r2) 19:07:00 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:07:00 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:07:00 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x0, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:07:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x2e00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:07:00 executing program 0: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1668.769615] device syz_tun entered promiscuous mode [ 1668.808416] device syz_tun left promiscuous mode [ 1668.811432] EXT4-fs warning (device loop5): read_mmp_block:114: Error -117 while reading MMP block 12 [ 1668.874918] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1668.924074] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:07:15 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:07:15 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000000)=""/249, 0xf9}], 0x1) 19:07:15 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:07:15 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x0, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:07:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000011600)='PMM\x00', 0x4, 0x6000}], 0x0, &(0x7f0000013c00)) 19:07:15 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:07:15 executing program 0: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:07:15 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1684.030292] device syz_tun entered promiscuous mode [ 1684.045460] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:07:15 executing program 0: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1684.068672] device syz_tun left promiscuous mode [ 1684.095355] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:07:15 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:07:15 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x5011c2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100), 0x121400, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000140)={0x2000}) r4 = syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/time\x00') bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e23, 0x5, @remote, 0x3}, 0x1c) r5 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x220000, 0x0) close_range(r5, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="02002f07695e653024"]) ioctl$NS_GET_USERNS(r6, 0xb701, 0x0) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'lo\x00'}) accept$inet6(r7, &(0x7f00000000c0)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c) 19:07:15 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:07:16 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x0, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:07:16 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:07:16 executing program 0: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1684.373492] device syz_tun entered promiscuous mode [ 1684.377361] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1684.401465] device syz_tun left promiscuous mode [ 1684.408565] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1684.836735] EXT4-fs warning (device loop5): ext4_multi_mount_protect:340: MMP startup interrupted, failing mount [ 1684.836735] 19:07:30 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:07:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000011600)='PMM\x00', 0x4, 0x6000}], 0x0, &(0x7f0000013c00)) 19:07:30 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:07:30 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x0, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:07:30 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x6000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:07:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x0, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:07:30 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={0x0, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r2) 19:07:30 executing program 1: r0 = getpgrp(0x0) pidfd_open(r0, 0x0) getpid() r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) vmsplice(r2, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) dup(r4) r5 = getpgrp(0x0) pidfd_open(r5, 0x0) fcntl$setown(r4, 0x8, r5) [ 1698.411482] device syz_tun entered promiscuous mode [ 1698.423117] device syz_tun left promiscuous mode [ 1698.453451] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:07:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x0, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:07:30 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x0, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1698.551825] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:07:30 executing program 0: rt_sigaction(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000100)) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x8, &(0x7f0000000180)={[0x1f]}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x1000003) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000000), &(0x7f0000000080)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f00000000c0)={0x1, 0x1, {0x0, 0x24, 0x1, 0x3, 0x2, 0xfe2d, 0x0, 0x1d, 0x1}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x10001, 0x0) r3 = syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x0, 0x3, 0xffffffff}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000100)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r3, 0x0) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x10080, 0x0) ioctl$RTC_WKALM_SET(r4, 0x4028700f, &(0x7f0000000200)={0x1, 0x0, {0x38, 0x13, 0x5, 0x17, 0xb, 0x1000, 0x0, 0x135, 0x1}}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r3, 0x8000000) io_uring_enter(r3, 0x58ab, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x3) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@private1={0xfc, 0x1, '\x00', 0x6}, 0x1000000, 0x2, 0x3, 0x0, 0x5e9e}, 0x20) unshare(0x48020200) 19:07:30 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x0, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:07:30 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) pidfd_open(r2, 0x0) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r5, 0x660c) pidfd_getfd(r5, 0xffffffffffffffff, 0x0) dup(r4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) fcntl$lock(r4, 0x4d, &(0x7f0000000080)={0x2, 0x0, 0xffff, 0x80000000, r6}) 19:07:30 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x7a0e, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:07:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x0, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) [ 1698.790379] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1698.793767] device syz_tun entered promiscuous mode [ 1698.815028] device syz_tun left promiscuous mode [ 1698.827658] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:07:30 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x0, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1699.234414] EXT4-fs warning (device loop5): ext4_multi_mount_protect:340: MMP startup interrupted, failing mount [ 1699.234414] 19:07:44 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:07:44 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x0, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:07:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000011600)='PMM\x00', 0x4, 0x6000}], 0x0, &(0x7f0000013c00)) 19:07:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x0, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:07:44 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x0, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:07:44 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x202, 0x8) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400003, 0x184) r1 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[]) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000180), 0x24, 0x0) mkdirat(r1, &(0x7f0000000240)='./file2\x00', 0x0) 19:07:44 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:07:44 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20200, 0x144) vmsplice(r1, &(0x7f0000001640), 0x0, 0x0) [ 1712.824040] device syz_tun entered promiscuous mode [ 1712.844481] device syz_tun left promiscuous mode 19:07:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x20000001) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000018c0)={0x0, {{0xa, 0x0, 0x0, @remote}}, 0x0, 0x2, [{{0xa, 0x4e21, 0x20, @mcast1, 0xbfed}}, {{0xa, 0x4e22, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}}]}, 0x190) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8034e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000017c0)=""/244, 0xf4, 0x40010041, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @loopback, 0x8001}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000240)={'syz_tun\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="02000000000000000000000000000000000000000000000000000000000000000000000000000000000000007c669fd78266d53ecbb016b40866fb640b08cd4c4c53a4010000008ec2281e541e7f81a4b0e7cee8db82ef7a3af95502c383310265d42817f0a4032af15d232a26d8e2e7a6013f75ae9e4289e7c512e429e33a61e2496627c997c050b7d83c6908cbb4"]}) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000000)=0x1) socket$inet6_tcp(0xa, 0x1, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000), &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300)}, 0x0) execveat(0xffffffffffffffff, &(0x7f00000014c0)='./file0\x00', &(0x7f0000001680)=[&(0x7f0000001500)=':$\\&/\xb6%{]-!\x00', &(0x7f0000001540)='}\xb9!(\x00', &(0x7f0000001580)='^\x00', &(0x7f00000015c0)='nl80211\x00', &(0x7f0000001600)=']-\x00', 0x0], &(0x7f0000001780)=[&(0x7f00000016c0)='nl80211\x00', &(0x7f0000001700)='\x00', &(0x7f0000001740)='\x00'], 0x1000) [ 1712.894332] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1712.944957] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:07:44 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x31f, &(0x7f0000000240)={'wlan1\x00'}) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x1a3, 0x0, r3}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200), &(0x7f0000000140)) clone3(&(0x7f00000001c0)={0x205000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x3f}, &(0x7f00000000c0)=""/26, 0x1a, &(0x7f0000000100)=""/123, &(0x7f0000000180)=[r2], 0x1, {r3}}, 0x58) 19:07:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x0, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:07:44 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:07:44 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x0, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:07:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000000)=0x4, 0x4) sendmsg$SMC_PNETID_DEL(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x74, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'sit0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14}]}, 0x74}, 0x1, 0x0, 0x0, 0x4000}, 0x800) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000040)={0x81, 0x1, 0x40, 0xcc}, 0x10) [ 1713.094437] device syz_tun entered promiscuous mode 19:07:44 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xff0f, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) [ 1713.124612] device syz_tun left promiscuous mode 19:07:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x0, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) [ 1713.660681] EXT4-fs warning (device loop5): ext4_multi_mount_protect:340: MMP startup interrupted, failing mount [ 1713.660681] 19:07:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000011600)='PMM\x00PM', 0x6, 0x6000}], 0x0, &(0x7f0000013c00)) 19:07:59 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:07:59 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) pidfd_open(r0, 0x0) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) 19:07:59 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:07:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x0, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:07:59 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x0, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:07:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:07:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x0, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) [ 1727.819211] device syz_tun entered promiscuous mode [ 1727.826131] device syz_tun left promiscuous mode [ 1727.860271] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:07:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:07:59 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) pidfd_open(r0, 0x0) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000000)) 19:07:59 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:07:59 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:07:59 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x0, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:07:59 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) [ 1728.038274] device syz_tun entered promiscuous mode [ 1728.041352] device syz_tun left promiscuous mode [ 1728.112554] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1728.132915] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:07:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:07:59 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) [ 1728.285849] device syz_tun entered promiscuous mode [ 1728.287736] device syz_tun left promiscuous mode [ 1728.642237] EXT4-fs warning (device loop5): ext4_multi_mount_protect:340: MMP startup interrupted, failing mount [ 1728.642237] 19:08:14 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x0, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:08:14 executing program 0: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000380)=0x800, 0x4) sendto(r0, &(0x7f00000001c0)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@file={0x0, './file0\x00'}, 0x80) signalfd4(r0, &(0x7f0000000040)={[0x2]}, 0x8, 0x800) r1 = socket$inet(0x2, 0x5, 0x4d) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @rand_addr=0x64010100}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x31f, &(0x7f0000000240)={'wlan1\x00'}) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x1a3}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200), &(0x7f0000000140)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)=0x5, 0x4) 19:08:14 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:08:14 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:08:14 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xe0ffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:08:14 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:08:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000011600)='PMM\x00PM', 0x6, 0x6000}], 0x0, &(0x7f0000013c00)) 19:08:14 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = getpgid(r0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000001840)=@flushsa={0x14, 0x1c, 0x100, 0x70bd2b, 0x25dfdbff, {0x3c}}, 0x14}, 0x1, 0x0, 0x0, 0x44040}, 0x0) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0x158, 0x1a, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@local, 0x0, 0x33}, @in=@private, {0x0, 0x0, 0x6}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}}]}, 0x158}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000001840)=@flushsa={0x14, 0x1c, 0x100, 0x70bd2b, 0x25dfdbff, {0x3c}}, 0x14}, 0x1, 0x0, 0x0, 0x44040}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000340)=@updsa={0x1c4, 0x1a, 0x1, 0x0, 0x0, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@local, 0x0, 0x33}, @in=@private, {0x0, 0x0, 0x6}, {}, {}, 0x0, 0x0, 0xa, 0x4}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}}, @sec_ctx={0x6a, 0x8, {0x66, 0x8, 0x0, 0x2, 0x5e, "e29b1a0979a7edd0a687888ab1247fd78e468614e31042795f63e26ecc448ce2798f952c5b7fbff31d0e79d1ce8dffc468dddff10b9eea65a4be0ec76c1adf543f35c1561eea42c1779bb9d4cc1cf6d764592d442fc714fd3bbc72baf93f"}}]}, 0x1c4}}, 0x0) kcmp(r4, r0, 0x0, r5, r6) sendmsg$nl_xfrm(r3, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000001c0000012bbd7000ffdbdf039fe6c7af39253c0000007175577180e7611796e4acc659ad895ba9ce0ab9bc9ef048f732c570aef50b7851c08933f5efe65c9e791628490ccc6ff5c8d691ff1bbf9863bad17bfb78659b8da3e2219db2"], 0x14}, 0x1, 0x0, 0x0, 0x44040}, 0x0) sendmsg$nl_xfrm(r3, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0x158, 0x1a, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@local, 0x0, 0x33}, @in=@private, {0x0, 0x0, 0x6}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}}]}, 0x158}}, 0x0) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x34, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x18}]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x28, 0x0, 0x800, 0x70bd26, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe45, 0x58}}}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) r7 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000300)=0x1c) dup2(r3, r7) close_range(r2, r3, 0x0) [ 1742.696192] device syz_tun entered promiscuous mode [ 1742.702850] device syz_tun left promiscuous mode 19:08:14 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:08:14 executing program 1: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r0, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x81}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x4c880) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) vmsplice(r2, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) 19:08:14 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x0, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1742.755731] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:08:14 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:08:14 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) [ 1742.912494] device syz_tun entered promiscuous mode [ 1742.922909] device syz_tun left promiscuous mode 19:08:14 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/time\x00') fsetxattr$trusted_overlay_redirect(r1, &(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x8, 0x6) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) lseek(r2, 0x0, 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000180)={0xdb, 0x8, 0x6, "c8f19245279c6033e3809e26da250d23b8f1fd773dfe6f8463519f1147609d7922d62761cd669f9a614e3c806f852dcd865a220695875e6452f13851cf677230eb8af6bfba608f0c19bf48530fff5bc1c6b0e7b7ad4f2c2baa159773c00e2c1ba024e8c251a56551f3256afb0b1cd257367a72d1ce37893810d1c140f940bb04f11e6e3fbe37f8af1164f4cd006440eda981f8c21fe40db39be2accf7eb0c988a47d728f394a7d4d5172f441dacbfdace1f270e99f08f58ca56a7a924a31b0520f7443157a6a95b17454a5d3499b8aa7d04767816c1267035b11cd"}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x1000000000000000) pwrite64(r3, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) pwrite64(r0, &(0x7f0000000280)="dc9ab5876f74da541b351a6bb0e72db9a11ff9522c8dde0cceb5b2debe097edd0f0c2a7b21a6241d1cba4fb29527ff0f590e1219f4eada3801a54c8c4b9fce83b6332db9305b17321cacc2496ebed364e3ebe300d182b6a0831c89a78ff7b1d4a7502cf325f2b4103d", 0x69, 0x9) 19:08:14 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:08:14 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x0, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1743.105062] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1743.160094] device syz_tun entered promiscuous mode [ 1743.178621] device syz_tun left promiscuous mode [ 1743.198554] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1743.531899] EXT4-fs warning (device loop5): ext4_multi_mount_protect:340: MMP startup interrupted, failing mount [ 1743.531899] 19:08:28 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:08:28 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:08:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:08:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000011600)='PMM\x00PM', 0x6, 0x6000}], 0x0, &(0x7f0000013c00)) 19:08:28 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x0, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:08:28 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/time\x00') fsetxattr$trusted_overlay_redirect(r1, &(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x8, 0x6) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) lseek(r2, 0x0, 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000180)={0xdb, 0x8, 0x6, "c8f19245279c6033e3809e26da250d23b8f1fd773dfe6f8463519f1147609d7922d62761cd669f9a614e3c806f852dcd865a220695875e6452f13851cf677230eb8af6bfba608f0c19bf48530fff5bc1c6b0e7b7ad4f2c2baa159773c00e2c1ba024e8c251a56551f3256afb0b1cd257367a72d1ce37893810d1c140f940bb04f11e6e3fbe37f8af1164f4cd006440eda981f8c21fe40db39be2accf7eb0c988a47d728f394a7d4d5172f441dacbfdace1f270e99f08f58ca56a7a924a31b0520f7443157a6a95b17454a5d3499b8aa7d04767816c1267035b11cd"}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x1000000000000000) pwrite64(r3, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) pwrite64(r0, &(0x7f0000000280)="dc9ab5876f74da541b351a6bb0e72db9a11ff9522c8dde0cceb5b2debe097edd0f0c2a7b21a6241d1cba4fb29527ff0f590e1219f4eada3801a54c8c4b9fce83b6332db9305b17321cacc2496ebed364e3ebe300d182b6a0831c89a78ff7b1d4a7502cf325f2b4103d", 0x69, 0x9) 19:08:28 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) r4 = pidfd_open(r2, 0x0) r5 = getpgrp(0x0) r6 = pidfd_open(r5, 0x0) r7 = dup(r6) fcntl$lock(r6, 0x24, &(0x7f0000000040)={0x0, 0x2, 0x20, 0x1f, r2}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x1000) r8 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r8, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_FSYNC={0x3, 0x1, 0x0, @fd=r8, 0x0, 0x0, 0x0, 0x1, 0x1}, 0xb84) r9 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_FSYNC={0x3, 0x1, 0x0, @fd=r9, 0x0, 0x0, 0x0, 0x1, 0x1}, 0xb84) r10 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000002800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r11 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002900)=[{{&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000140)="e0af1c3baafcbf97e77783004b95a0364bb2714bf8ff28ac6a333e72a9d5c6220cb571cbafc7b79113f9883e34b7a3dad232145056333ae9d2758f7fa85623b0fd802365", 0x44}, {&(0x7f0000000f80)="875ee494eea91290c47b42f769db4bb1bba5c186688f3089a782cdf502be296a88896aaa99ef0289ff524105088fa841c5365eff27503de55fa19f43de6ad53d20dbf1175ce9c19b260dd618b35ef799e32d477f72a8b1d1cabb7717cd6d1228543e8f21e1ca8c8c2f1430f827037607cced1f81c0b70b9607b0dbbfafcec24fa4bf5c7f71265b", 0x87}, {&(0x7f0000000280)="9342769c8d28cf3918ccb74e2e9ed0a9aacf337c6fc4cef674284f3c37607830965f7c83614d58fc18b0a16c665721990ec28725de7a38c6c464c089290e1697025edf5a8347e5865f166eb2536067ec105f27e2d0abca346a1d29968635984884e5c27dd1355980e74fbef5e4b88ed06ffa09d31597a5942391df776637a75e9d9d12f0ef8b8ceff4ba3a1c90b4b287db7d0fc9b045d01d41864ca8f67838c2a16d1b1a464d9c82d426a9bde4", 0xad}, {&(0x7f0000000340)="eb570a5611e897f70ad3d580385b877c175249dac5dad5796e871250843bca95ab8ea0bbff1d293ff887179008139da8437e4c29ee9b29cf9ed741f070dd4de432df7f67c22759ff9fa19e520321cc3ee2792e35252ce27cf8e3568cb323826c6f7790d62c31752e890ff9e3bb9baa65b46d98fbcee49917ca173c0062c856ad3aa709fb36c31cf226f2bfb986bf0fb4de9d03094f6bf1686cc2dca7a762dc500af372774dadc5e0a26a3cf788f60addf31193fd5c66e6eb0ae70ecf8a0cc06c4a97169d103b3d16a796709f73533b1e7cf80a140b45bf", 0xd7}, {&(0x7f0000000440)="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", 0xfa}, {&(0x7f0000000540)="55c64902d7f794ec4ae1031ee98f430c84edd084c8ae71431ab55a33cb57940dd21ae0a7582f24b311c4200945babd911a21854ab6570762", 0x38}, {&(0x7f0000000580)="eaef182b5848e6c9083f1aef8fdfd4f40ec3d63690de9e6602e2634b47f5a5b26db7bbee3b2e734779c0da93d0918a9dde1a313ed9047212080dc0527237d9b96083c330f9faba24f5ace122461ae6f5918010407f698bd4462b37bfdfdabeca9caade47bf775aa6a45052f270dce725dfd5a599505643c68cc0bf512e9a9fc9abc9474df3c1007a9c52a5db760f6625c96ca75c0350dd133aadeb1dcc5364a2c291f33a7023313d6a9d5b8a097fe62257bc31164b71eda73d74063fbf532246225de65b432772515a870e86b177fed5c2513c075b5f48860288970649cbe7e40d6d5580ab7847ca782c2b8bc24e0d28d281791c75af", 0xf6}, {&(0x7f0000000680)="304f3a02a722571e65aca0a99b022f55d5c21774aca0e894fa2a564100de57687b92550e0bd7df091a0996bfa0d93d065d8e7ba2c3cfedc21d3e2ff2ae2379173688daf8c8b8ffacd177e14235b8a2347726453fa5a4f69c325c24c6040d1585566b50fc31559433227ccc4d06f40601ea1490c77f5786fbfef71801cdd48bcc859908fffdf151104d91688416b75a0ea77055bdcce0dd403e3f6ce16ef9c8be16c1d56a614ad54d71f406140116d0ef720faf894e1448a635d7fb0e0478fd5492778ce28da3bcaac6cd90d3fa6ca652f1fb5c613cd5fdf2", 0xd8}, {&(0x7f0000000780)="847cd25519e719eb0d", 0x9}], 0x9, &(0x7f0000001140)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r7, @ANYRES32=r4, @ANYRES32=r3, @ANYRES32, @ANYRES32=r1, @ANYRES32=r3, @ANYRES32=r4, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000d60ae9650dcd3de2b2fa9ab995eb297e354e618a5662c2a425d964ad7762458fc921aeab848cd622d83bdc21ab8cee9153cc857508d3d0825a9bd1784e"], 0x90, 0x20000000}}, {{&(0x7f0000000980)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000ec0)=[{&(0x7f0000000a00)="0ca671a4350e4c2cfe80e6227a71060e8ebe45c254c1f370a2460bf34dba6c21d4fb76425fd068f8b8fbbceffd9edd3ebf61b0b6e75eaa7c781ea2b4c5d9554e9ee6c06fff26c5105505c998d2bb64a46cec14b474", 0x55}, {&(0x7f0000000a80)="6e14f15af5d08c1b77f1eb1b5971e85cbbf877424498905fe8dda98fbe8221c4706ba659660ebacb33a9db8cd8a2374d8786df596e2deaec6833920c8971cd5e50f21029d9f619c6d37f24ac00faadd4c5485a1d75ddd7c2590c71180b83929d1a1c5774a102f1492ac4986cdb06c982d2119bd43dd12cd31698708f4304a21c424b5e2b76beca3d6d5ecfa5baa7072d833e0c4391ab0b9c27abd20e8b23244992d66490be22fdb25f87f6d2b500bd", 0xaf}, {&(0x7f0000000b40)="7d9d267d26cbb2563d24c085a68be586b41692f65c78f9233eeb976f7f3491b6cffd16df0b54723bc4aff1955ce8358de25b691085acf71718bccbac9bb24e901fd6e113e4218166dd1a7a66adc664c79a73dd2ea44422e143b6bc79bfade35d2b91ebce34c30a9a9f04", 0x6a}, {&(0x7f0000000bc0)="087f59910c1ece6b784004ce6a266d75af043eec5cf78471997d0f6bb245e1b65c1a9cf1ed777ad1d7a8b507cbbb7e46b0e2a0a724a6af403fc05c7e68cb1d956f18cfc6b97af9f54b997bc64aeb943b7acda66eb1d0021ab88c49672d90ddbb2fa4189618b125db9ce58236acd9eb0ddd717a8598087546", 0x78}, {&(0x7f0000000c40)="1a64618fa931faec3903019d0846b7612be9a9532684555ca93e821b025b67d9a101d4c61a715d0d5e69258fd783222b6f71281c8f00141e93e2882468b4f508ba95e98c6ba254ac1b4bd34339b55258fd6de79b46d916b992b944fa77e516bb9af66cb36b8acc176233cdb768f1c7f30a1228c692ab474be915e5e43d320268a39777b0e962f4ef51784b57ef08be81dcfed4078931043b498eabfc0c2adaf0bab5c9d0e9eecea7f3b1364cd3107f3e7f6bd90bf10b61e334c3a9dc1f3ec4bd6a7cb6902db5c4d4fb9df5", 0xcb}, {&(0x7f0000001680)="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", 0x1000}, {&(0x7f0000000d40)="07a13a642372f433f24db58a2a66f7810cc163b338dbac82b4c25247ccacaae242dfe95e5bc427c8bc58633c0c351e8fe43a4ba979e0219021e71be417686f540115f2", 0x43}, {&(0x7f0000000dc0)="d625492f871083a99075a1cc441bf9c65f40a6fb29221b19f89028eb3fb2a28797c3387904c596173b90d1e454f124d83ba02067f7807ad789a0c49ac0edd967ffcc15b7d7317094a8d9365f9103442ed09c09225d74eee7e4d1eee315a6cfd68f4a4a2e929d70622e", 0x69}, {&(0x7f0000000e40)="ac57ed4cfe72ac8ee4a7680f4e4fe0b46127994475d6b4e24b4156bb477c40a545a58690668b9a8cdf2bb50e25324686b2354b199b70d33a5accd0dad39dd12fb65ec7e1a7a0aeeb0b6b902eb811681970221e81713c9e4797c935", 0x5b}], 0x9, &(0x7f0000001240)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r4, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100e388afd53f69948f7e26c6771bca4f000002000000", @ANYBLOB="a6007e31b7e209e4d0acc6cdc14d51856aaf63b315b01fead6879370d5fe6dde6de8535a5d156543dc33b5fcb5183fdefec460e3be3e4cf07f1e324c98d4da17f4afc1a772fef587e42b532b9b10d142a8e9c5dbf6f13a93afa71218a3dd5bb1b6965b82a7e646367b864279c92877699a18f6136aba954204dd514552d615d6603fa2649cd812f7f3fb2f37cdaa629251f58574741166bc75fdeaa8a9a08af8d8f71270fe5ef42b0401dae9f3bec5", @ANYRES32, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xd0, 0x4}}, {{&(0x7f0000002680)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000001600)=[{&(0x7f0000002700)="8688ed91f352929139d78d49eddb2d8ce2ca2f6834c7b57eb1da16c8e5bfcb161ae8831e89612a59262a0c79eca2cf9e8d8e5efb8373ba51461a04e1ca8ab14e82f396240e9a66a8fd3f00fd2a12341986debcbc5dd934502d99d1330fb4135d8c23033c0f3c842a0b70d9dcbeb60df1e938e0ed4907d1d2d911a65d424b8ba782bff618d3b18da066a294d69033c9b2aacb40e7239c569f17f2de2132c3a2c5dd8975253cce7b2d2b28c4e2b54764a23aeb74e0ebc9a3e4f884ebca1e1e7e98529d0db1c0fce46f360cf732f525711453bd70f4f16368002a5151b079972f25234282f0c4368b2c4883df13e7d5f0ed9fb76fff75feaee5", 0xf8}], 0x1, &(0x7f0000002840)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r0, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="0000000034000000000100000000000001000000", @ANYRES32=r4, @ANYRES32=r6, @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r6, @ANYRES32=r10, @ANYRES32=r6, @ANYRES32=r7, @ANYRES32=r11, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x8d1}}], 0x3, 0x10) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000000000)='G', 0x1}], 0x1, 0x0) 19:08:28 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) [ 1757.029287] device syz_tun entered promiscuous mode [ 1757.040889] device syz_tun left promiscuous mode [ 1757.061793] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:08:28 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:08:28 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x0, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1757.155188] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:08:28 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:08:29 executing program 1: r0 = getpgrp(0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r1, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_FSYNC={0x3, 0x1, 0x0, @fd=r1, 0x0, 0x0, 0x0, 0x1, 0x1}, 0xb84) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x3f, 0xb5, 0x9, 0x7, 0x0, 0x6, 0x82, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0xc52, 0x8, 0x7, 0x5, 0x220b, 0x6, 0x5, 0x0, 0xd332, 0x0, 0x4}, r0, 0xd, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x5, 0x1f, 0x80, 0xff, 0x0, 0x80000000, 0x4000, 0xb, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfff, 0x0, @perf_bp={&(0x7f0000000000), 0xe}, 0x100, 0xffffffffffffa3c0, 0x5, 0x2, 0x3, 0x7, 0x7, 0x0, 0x3add, 0x0, 0x2}, r0, 0x4, 0xffffffffffffffff, 0x3) r2 = pidfd_open(r0, 0x0) vmsplice(r2, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) 19:08:29 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) [ 1757.332300] device syz_tun entered promiscuous mode [ 1757.348762] device syz_tun left promiscuous mode 19:08:29 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$incfs_metadata(&(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, 0x0, 0x0) 19:08:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:08:29 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x0, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:08:29 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, 0x0, 0x0) dup2(r0, r4) [ 1757.509490] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:08:29 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) [ 1757.619864] device syz_tun entered promiscuous mode [ 1757.628145] device syz_tun left promiscuous mode [ 1757.763450] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1757.794503] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1757.846826] EXT4-fs warning (device loop5): ext4_multi_mount_protect:340: MMP startup interrupted, failing mount [ 1757.846826] 19:08:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:08:43 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:08:43 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000001840)=ANY=[@ANYBLOB="140006001c0000012bbd7000ffdbdf253c000000"], 0x14}, 0x1, 0x0, 0x0, 0x44040}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0x158, 0x1a, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@local, 0x0, 0x33}, @in=@private, {0x0, 0x0, 0x6}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}}]}, 0x158}}, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) vmsplice(r3, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000001840)=@flushsa={0x14, 0x1c, 0x100, 0x70bd2b, 0x25dfdbff, {0x32}}, 0x14}, 0x1, 0x0, 0x0, 0x44040}, 0x0) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0x158, 0x1a, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@local, 0x0, 0x33}, @in=@private, {0x0, 0x0, 0x6}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}}]}, 0x158}}, 0x0) pidfd_getfd(r1, r4, 0x0) 19:08:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000011600)='PMM\x00PMM', 0x7, 0x6000}], 0x0, &(0x7f0000013c00)) 19:08:43 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, 0x0, 0x0) dup2(r0, r4) 19:08:43 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0x0, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:08:43 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:08:43 executing program 0: mq_unlink(&(0x7f0000000000)='\'\\@\x00') r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = eventfd2(0x0, 0x800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000006, 0x100010, r0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4303, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_NOP={0x0, 0x3}, 0xfff) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) [ 1771.719348] device syz_tun entered promiscuous mode [ 1771.728710] device syz_tun left promiscuous mode [ 1771.752277] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:08:43 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) getpgrp(r0) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) [ 1771.777361] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:08:43 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, 0x0, 0x0) dup2(r0, r4) 19:08:43 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0x0, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:08:43 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:08:43 executing program 0: mq_unlink(&(0x7f0000000000)='\'\\@\x00') r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = eventfd2(0x0, 0x800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000006, 0x100010, r0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4303, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_NOP={0x0, 0x3}, 0xfff) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) 19:08:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1771.982870] device syz_tun entered promiscuous mode 19:08:43 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r2, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x31f, &(0x7f0000000240)={'wlan1\x00'}) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x1a3, 0x0, r4}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_WRITE_FIXED={0x5, 0x4, 0x0, @fd=r3, 0x0, 0x0, 0x120ea6a2, 0x0, 0x0, {0x1, r7}}, 0x0) r8 = signalfd(r2, &(0x7f0000000080)={[0x2]}, 0x8) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, 0x0, &(0x7f0000000100)=@IORING_OP_STATX={0x15, 0x2, 0x0, r8, &(0x7f00000001c0), &(0x7f00000000c0)='./file0\x00', 0x2, 0x400, 0x0, {0x0, r9}}, 0x5349) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_FSYNC={0x3, 0x1, 0x0, @fd=r2, 0x0, 0x0, 0x0, 0x1, 0x1}, 0xb84) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x7}}, './file0\x00'}) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x10010, r10, 0xffffffffb949d36b) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) r11 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x20800, 0x0) tee(r11, r2, 0x206, 0x6) [ 1772.007590] device syz_tun left promiscuous mode [ 1772.100782] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1772.124586] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1772.529918] EXT4-fs warning (device loop5): ext4_multi_mount_protect:340: MMP startup interrupted, failing mount [ 1772.529918] 19:09:01 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:09:01 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(0xffffffffffffffff, r4) 19:09:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000011600)='PMM\x00PMM', 0x7, 0x6000}], 0x0, &(0x7f0000013c00)) 19:09:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:09:01 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0x0, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:09:01 executing program 0: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0x0, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:09:01 executing program 1: r0 = pidfd_open(0x0, 0x0) vmsplice(r0, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) 19:09:01 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) [ 1790.165069] device syz_tun entered promiscuous mode [ 1790.167345] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1790.184579] FAULT_INJECTION: forcing a failure. [ 1790.184579] name failslab, interval 1, probability 0, space 0, times 0 [ 1790.187277] CPU: 0 PID: 10851 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1790.188699] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1790.190393] Call Trace: [ 1790.190971] dump_stack+0x107/0x167 [ 1790.191730] should_fail.cold+0x5/0xa [ 1790.192542] ? __do_sys_memfd_create+0xfb/0x450 [ 1790.193512] should_failslab+0x5/0x20 [ 1790.194308] __kmalloc+0x72/0x390 [ 1790.195030] __do_sys_memfd_create+0xfb/0x450 [ 1790.195952] ? ksys_write+0x1a9/0x260 [ 1790.196785] ? memfd_file_seals_ptr+0x170/0x170 [ 1790.197765] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1790.198862] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1790.199919] do_syscall_64+0x33/0x40 [ 1790.200705] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1790.201770] RIP: 0033:0x7f43d3d63b19 [ 1790.202545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1790.206439] RSP: 002b:00007f43d12d8e98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1790.208025] RAX: ffffffffffffffda RBX: 0000000020001900 RCX: 00007f43d3d63b19 [ 1790.209498] RDX: 000000000000fffe RSI: 0000000000000000 RDI: 00007f43d3dbd0fb [ 1790.210973] RBP: 0000000000000001 R08: 0000000000007fff R09: 0000000000000000 [ 1790.212462] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1790.213932] R13: 00007ffd6ecae0cf R14: 000000000000fffe R15: 0000000000022000 [ 1790.223974] device syz_tun left promiscuous mode [ 1790.248918] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:09:02 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(0xffffffffffffffff, r4) 19:09:02 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:09:02 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) pidfd_open(0x0, 0x0) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)="476c667bc1ed7484d138ef20da3d2ee87d4550133ad5cecbc8d5522b633565ac0e98c0b661911e9a32c5a3157cb4e106a3c2f3a2ee5622d15e461a60e0207f44e52233e3ecf964e4993826d01aeb39346fa8be40cff1f46cde7c32df251551e713356aa03a84bf87fbb25036d7dec5e976adb68101a67cd71e4b4d28d73088e75f6b6204", 0x84}], 0x1, 0x0) 19:09:02 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:09:02 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:09:02 executing program 0: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0x0, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1790.442061] device syz_tun entered promiscuous mode [ 1790.459648] device syz_tun left promiscuous mode [ 1790.565758] FAULT_INJECTION: forcing a failure. [ 1790.565758] name failslab, interval 1, probability 0, space 0, times 0 [ 1790.568534] CPU: 0 PID: 10875 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1790.570015] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1790.571702] Call Trace: [ 1790.572269] dump_stack+0x107/0x167 [ 1790.573021] should_fail.cold+0x5/0xa [ 1790.573800] ? create_object.isra.0+0x3a/0xa20 [ 1790.574733] should_failslab+0x5/0x20 [ 1790.575523] kmem_cache_alloc+0x5b/0x310 [ 1790.576382] create_object.isra.0+0x3a/0xa20 [ 1790.577295] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1790.578356] __kmalloc+0x16e/0x390 [ 1790.579103] __do_sys_memfd_create+0xfb/0x450 [ 1790.580032] ? ksys_write+0x1a9/0x260 [ 1790.580817] ? memfd_file_seals_ptr+0x170/0x170 [ 1790.581781] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1790.582869] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1790.583947] do_syscall_64+0x33/0x40 [ 1790.584721] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1790.585789] RIP: 0033:0x7f43d3d63b19 [ 1790.586564] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1790.590391] RSP: 002b:00007f43d12d8e98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1790.591974] RAX: ffffffffffffffda RBX: 0000000020001900 RCX: 00007f43d3d63b19 [ 1790.593467] RDX: 000000000000fffe RSI: 0000000000000000 RDI: 00007f43d3dbd0fb [ 1790.594950] RBP: 0000000000000001 R08: 0000000000007fff R09: 0000000000000000 [ 1790.596444] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1790.597926] R13: 00007ffd6ecae0cf R14: 000000000000fffe R15: 0000000000022000 [ 1790.649639] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1791.003063] EXT4-fs warning (device loop5): ext4_multi_mount_protect:340: MMP startup interrupted, failing mount [ 1791.003063] 19:09:16 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:09:16 executing program 1: getpgrp(0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x20, 0x7, 0x0, 0x1, 0x0, 0x7, 0x48004, 0xf, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffba89, 0x2, @perf_bp={&(0x7f0000000000), 0x9}, 0x8010, 0x8000, 0x80000001, 0x7, 0x9, 0x2, 0xfffc, 0x0, 0x1, 0x0, 0x7}, 0x0, 0x4, 0xffffffffffffffff, 0xb) r0 = getpgrp(0x0) pidfd_open(r0, 0x0) r1 = pidfd_open(r0, 0x0) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) 19:09:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:09:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000011600)='PMM\x00PMM', 0x7, 0x6000}], 0x0, &(0x7f0000013c00)) 19:09:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:09:16 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 3) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:09:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x9000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:09:16 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(0xffffffffffffffff, r4) [ 1805.220464] FAULT_INJECTION: forcing a failure. [ 1805.220464] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1805.224584] CPU: 0 PID: 10898 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1805.226014] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1805.227721] Call Trace: [ 1805.228262] dump_stack+0x107/0x167 [ 1805.229047] should_fail.cold+0x5/0xa [ 1805.229858] _copy_from_user+0x2e/0x1b0 [ 1805.230684] __do_sys_memfd_create+0x16d/0x450 [ 1805.231609] ? memfd_file_seals_ptr+0x170/0x170 [ 1805.232610] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1805.233685] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1805.234741] do_syscall_64+0x33/0x40 [ 1805.235500] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1805.236563] RIP: 0033:0x7f43d3d63b19 [ 1805.237320] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1805.241191] RSP: 002b:00007f43d12d8e98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1805.242785] RAX: ffffffffffffffda RBX: 0000000020001900 RCX: 00007f43d3d63b19 [ 1805.244254] RDX: 000000000000fffe RSI: 0000000000000000 RDI: 00007f43d3dbd0fb [ 1805.245720] RBP: 0000000000000001 R08: 0000000000007fff R09: 0000000000000000 [ 1805.247177] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1805.248658] R13: 00007ffd6ecae0cf R14: 000000000000fffe R15: 0000000000022000 19:09:17 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1805.272739] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:09:17 executing program 1: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x8, 0x41, 0x2, 0x48, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2, 0x1, 0xfffffffe, 0x4, 0x5, 0x7, 0x0, 0x0, 0xffff, 0x0, 0xff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) r1 = pidfd_open(r0, 0x0) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) [ 1805.277906] device syz_tun entered promiscuous mode [ 1805.288287] device syz_tun left promiscuous mode [ 1805.351308] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:09:17 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, 0xffffffffffffffff) 19:09:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:09:17 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xa000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) [ 1805.438570] device syz_tun entered promiscuous mode [ 1805.441325] device syz_tun left promiscuous mode 19:09:17 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x0, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:09:17 executing program 1: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) dup(r3) pidfd_getfd(r3, r1, 0x0) [ 1805.523687] FAULT_INJECTION: forcing a failure. [ 1805.523687] name failslab, interval 1, probability 0, space 0, times 0 [ 1805.526232] CPU: 0 PID: 10919 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1805.527623] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1805.529307] Call Trace: [ 1805.529845] dump_stack+0x107/0x167 [ 1805.530577] should_fail.cold+0x5/0xa [ 1805.531331] ? shmem_alloc_inode+0x18/0x40 [ 1805.532190] should_failslab+0x5/0x20 [ 1805.532964] kmem_cache_alloc+0x5b/0x310 [ 1805.533786] ? shmem_destroy_inode+0x70/0x70 [ 1805.534676] shmem_alloc_inode+0x18/0x40 [ 1805.535492] ? shmem_destroy_inode+0x70/0x70 [ 1805.536384] alloc_inode+0x63/0x240 [ 1805.537121] new_inode+0x23/0x250 [ 1805.537838] shmem_get_inode+0x15e/0xbc0 [ 1805.538677] __shmem_file_setup+0xb8/0x320 [ 1805.539548] ? _copy_from_user+0xfb/0x1b0 [ 1805.540429] __do_sys_memfd_create+0x275/0x450 [ 1805.541381] ? memfd_file_seals_ptr+0x170/0x170 [ 1805.542348] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1805.543425] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1805.544488] do_syscall_64+0x33/0x40 [ 1805.545245] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1805.546300] RIP: 0033:0x7f43d3d63b19 [ 1805.547055] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1805.550796] RSP: 002b:00007f43d12d8e98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1805.552362] RAX: ffffffffffffffda RBX: 0000000020001900 RCX: 00007f43d3d63b19 [ 1805.553826] RDX: 000000000000fffe RSI: 0000000000000000 RDI: 00007f43d3dbd0fb [ 1805.555284] RBP: 0000000000000001 R08: 0000000000007fff R09: 0000000000000000 [ 1805.556757] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1805.558197] R13: 00007ffd6ecae0cf R14: 000000000000fffe R15: 0000000000022000 19:09:17 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, 0xffffffffffffffff) [ 1805.675863] device syz_tun entered promiscuous mode [ 1805.685189] device syz_tun left promiscuous mode [ 1806.038504] EXT4-fs warning (device loop5): ext4_multi_mount_protect:340: MMP startup interrupted, failing mount [ 1806.038504] 19:09:33 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:09:33 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xb000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:09:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000013c00)) 19:09:33 executing program 1: r0 = getpgrp(0x0) r1 = getpgid(r0) r2 = pidfd_open(r1, 0x0) vmsplice(r2, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) r3 = syz_open_procfs(r0, &(0x7f0000000000)='net/protocols\x00') r4 = getpgrp(0x0) pidfd_open(r4, 0x0) ptrace$peek(0x1, r4, &(0x7f0000000040)) r5 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) pidfd_getfd(r3, r5, 0x0) 19:09:33 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x0, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:09:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 5) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:09:33 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, 0xffffffffffffffff) 19:09:33 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) [ 1821.331533] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1821.360171] device syz_tun entered promiscuous mode [ 1821.371454] FAULT_INJECTION: forcing a failure. [ 1821.371454] name failslab, interval 1, probability 0, space 0, times 0 [ 1821.373402] CPU: 1 PID: 10949 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1821.374470] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1821.375760] Call Trace: [ 1821.376166] dump_stack+0x107/0x167 [ 1821.376736] should_fail.cold+0x5/0xa [ 1821.377333] ? create_object.isra.0+0x3a/0xa20 [ 1821.378036] should_failslab+0x5/0x20 [ 1821.378622] kmem_cache_alloc+0x5b/0x310 [ 1821.379256] create_object.isra.0+0x3a/0xa20 [ 1821.379941] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1821.380759] kmem_cache_alloc+0x159/0x310 [ 1821.381430] ? shmem_destroy_inode+0x70/0x70 [ 1821.382150] shmem_alloc_inode+0x18/0x40 [ 1821.382788] ? shmem_destroy_inode+0x70/0x70 [ 1821.383489] alloc_inode+0x63/0x240 [ 1821.384044] new_inode+0x23/0x250 [ 1821.384608] shmem_get_inode+0x15e/0xbc0 [ 1821.385260] __shmem_file_setup+0xb8/0x320 [ 1821.385961] ? _copy_from_user+0xfb/0x1b0 [ 1821.386615] __do_sys_memfd_create+0x275/0x450 [ 1821.387348] ? memfd_file_seals_ptr+0x170/0x170 [ 1821.388105] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1821.388975] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1821.389787] do_syscall_64+0x33/0x40 [ 1821.390370] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1821.391159] RIP: 0033:0x7f43d3d63b19 19:09:33 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xd000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) [ 1821.391724] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1821.394811] RSP: 002b:00007f43d12d8e98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1821.395983] RAX: ffffffffffffffda RBX: 0000000020001900 RCX: 00007f43d3d63b19 [ 1821.397079] RDX: 000000000000fffe RSI: 0000000000000000 RDI: 00007f43d3dbd0fb [ 1821.398206] RBP: 0000000000000001 R08: 0000000000007fff R09: 0000000000000000 [ 1821.399575] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1821.400726] R13: 00007ffd6ecae0cf R14: 000000000000fffe R15: 0000000000022000 [ 1821.408640] device syz_tun left promiscuous mode [ 1821.466804] EXT4-fs warning (device loop5): read_mmp_block:114: Error -117 while reading MMP block 12 19:09:33 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x0, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:09:33 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xf000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:09:33 executing program 1: ioctl$EXT4_IOC_CLEAR_ES_CACHE(0xffffffffffffffff, 0x6628) r0 = shmget$private(0x0, 0x4000, 0x110, &(0x7f0000ff9000/0x4000)=nil) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000000)=0x0) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000040)={{0x1, r1, 0xffffffffffffffff, 0xee01, 0xee01, 0x40, 0x497}, 0x5, 0x4, 0x9, 0x80, r2, 0x0, 0x854}) r3 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r3, &(0x7f0000ffe000/0x2000)=nil, 0x4000) shmat(r3, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmctl$SHM_UNLOCK(r3, 0xc) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) vmsplice(r5, &(0x7f0000001640)=[{&(0x7f0000001200)='G', 0x1}], 0x1, 0x0) 19:09:33 executing program 4: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1821.710763] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:09:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000013c00)) 19:09:33 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) vmsplice(r2, &(0x7f0000001640)=[{&(0x7f0000000040)="46a71a64c8e1cbf532", 0x9}], 0x1, 0x3) 19:09:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 6) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) [ 1821.909235] FAULT_INJECTION: forcing a failure. [ 1821.909235] name failslab, interval 1, probability 0, space 0, times 0 [ 1821.910578] CPU: 1 PID: 10977 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1821.911376] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1821.912333] Call Trace: [ 1821.912655] dump_stack+0x107/0x167 [ 1821.913061] should_fail.cold+0x5/0xa [ 1821.913489] ? security_inode_alloc+0x34/0x160 [ 1821.914007] should_failslab+0x5/0x20 [ 1821.914432] kmem_cache_alloc+0x5b/0x310 [ 1821.914897] security_inode_alloc+0x34/0x160 [ 1821.915394] inode_init_always+0xa4e/0xd10 [ 1821.915857] ? shmem_destroy_inode+0x70/0x70 [ 1821.916348] alloc_inode+0x84/0x240 [ 1821.916761] new_inode+0x23/0x250 [ 1821.917180] shmem_get_inode+0x15e/0xbc0 [ 1821.917673] __shmem_file_setup+0xb8/0x320 [ 1821.918152] ? _copy_from_user+0xfb/0x1b0 [ 1821.918610] __do_sys_memfd_create+0x275/0x450 [ 1821.919116] ? memfd_file_seals_ptr+0x170/0x170 [ 1821.919640] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1821.920241] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1821.920862] do_syscall_64+0x33/0x40 [ 1821.921302] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1821.921900] RIP: 0033:0x7f43d3d63b19 [ 1821.922338] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1821.924470] RSP: 002b:00007f43d12d8e98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1821.925322] RAX: ffffffffffffffda RBX: 0000000020001900 RCX: 00007f43d3d63b19 [ 1821.926147] RDX: 000000000000fffe RSI: 0000000000000000 RDI: 00007f43d3dbd0fb [ 1821.926940] RBP: 0000000000000001 R08: 0000000000007fff R09: 0000000000000000 [ 1821.927767] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1821.928621] R13: 00007ffd6ecae0cf R14: 000000000000fffe R15: 0000000000022000 [ 1821.932990] EXT4-fs warning (device loop5): read_mmp_block:114: Error -117 while reading MMP block 12 19:09:47 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:09:47 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:09:47 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x10040000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:09:47 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:09:47 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x0, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:09:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000013c00)) 19:09:47 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) (fail_nth: 1) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:09:47 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 7) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) [ 1835.683837] FAULT_INJECTION: forcing a failure. [ 1835.683837] name failslab, interval 1, probability 0, space 0, times 0 [ 1835.686700] CPU: 0 PID: 11001 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1835.688275] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1835.690160] Call Trace: [ 1835.690761] dump_stack+0x107/0x167 [ 1835.691595] should_fail.cold+0x5/0xa [ 1835.692464] ? create_object.isra.0+0x3a/0xa20 [ 1835.693534] should_failslab+0x5/0x20 [ 1835.694407] kmem_cache_alloc+0x5b/0x310 [ 1835.695345] create_object.isra.0+0x3a/0xa20 [ 1835.696353] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1835.697524] kmem_cache_alloc+0x159/0x310 [ 1835.698484] security_inode_alloc+0x34/0x160 [ 1835.699496] inode_init_always+0xa4e/0xd10 [ 1835.700416] ? shmem_destroy_inode+0x70/0x70 [ 1835.701390] alloc_inode+0x84/0x240 [ 1835.702234] new_inode+0x23/0x250 [ 1835.703038] shmem_get_inode+0x15e/0xbc0 [ 1835.703983] __shmem_file_setup+0xb8/0x320 [ 1835.704980] ? _copy_from_user+0xfb/0x1b0 [ 1835.705943] __do_sys_memfd_create+0x275/0x450 [ 1835.706997] ? memfd_file_seals_ptr+0x170/0x170 [ 1835.708087] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1835.709319] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1835.710522] do_syscall_64+0x33/0x40 [ 1835.711344] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1835.712483] RIP: 0033:0x7f43d3d63b19 [ 1835.713357] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1835.717335] RSP: 002b:00007f43d12d8e98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1835.718894] RAX: ffffffffffffffda RBX: 0000000020001900 RCX: 00007f43d3d63b19 [ 1835.720349] RDX: 000000000000fffe RSI: 0000000000000000 RDI: 00007f43d3dbd0fb [ 1835.721812] RBP: 0000000000000001 R08: 0000000000007fff R09: 0000000000000000 [ 1835.723293] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1835.724775] R13: 00007ffd6ecae0cf R14: 000000000000fffe R15: 0000000000022000 [ 1835.727389] device syz_tun entered promiscuous mode [ 1835.733284] FAULT_INJECTION: forcing a failure. [ 1835.733284] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1835.735818] CPU: 0 PID: 10998 Comm: syz-executor.1 Not tainted 5.10.205 #1 [ 1835.737301] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1835.739004] Call Trace: [ 1835.739568] dump_stack+0x107/0x167 [ 1835.740347] should_fail.cold+0x5/0xa [ 1835.741180] _copy_from_user+0x2e/0x1b0 [ 1835.742064] addrconf_del_ifaddr+0xc3/0x160 [ 1835.742995] ? addrconf_add_ifaddr+0x1c0/0x1c0 [ 1835.744015] inet6_ioctl+0x1da/0x290 [ 1835.744815] ? inet6_release+0x70/0x70 [ 1835.745689] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1835.746794] ? SOFTIRQ_verbose+0x10/0x10 [ 1835.747685] ? find_held_lock+0x2c/0x110 [ 1835.748569] sock_do_ioctl+0xd3/0x300 [ 1835.749422] ? compat_ifr_data_ioctl+0x180/0x180 [ 1835.750456] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1835.751673] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1835.752786] ? do_vfs_ioctl+0x283/0x10d0 [ 1835.753680] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1835.754778] ? generic_block_fiemap+0x60/0x60 [ 1835.755781] sock_ioctl+0x3ea/0x700 [ 1835.756591] ? dlci_ioctl_set+0x30/0x30 [ 1835.757475] ? selinux_file_ioctl+0xb6/0x270 [ 1835.758426] ? dlci_ioctl_set+0x30/0x30 [ 1835.759315] __x64_sys_ioctl+0x19a/0x210 [ 1835.760217] do_syscall_64+0x33/0x40 [ 1835.761015] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1835.762156] RIP: 0033:0x7fe026b33b19 [ 1835.762984] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1835.766986] RSP: 002b:00007fe0240a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1835.768620] RAX: ffffffffffffffda RBX: 00007fe026c46f60 RCX: 00007fe026b33b19 [ 1835.770229] RDX: 0000000020000140 RSI: 0000000000008936 RDI: 0000000000000004 [ 1835.771818] RBP: 00007fe0240a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1835.773336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1835.774902] R13: 00007fff427b8c6f R14: 00007fe0240a9300 R15: 0000000000022000 [ 1835.791776] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1835.803535] EXT4-fs warning (device loop5): read_mmp_block:114: Error -117 while reading MMP block 12 [ 1835.823380] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:09:47 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x11000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) [ 1835.902741] device syz_tun left promiscuous mode 19:09:47 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x0, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:09:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}], 0x0, &(0x7f0000013c00)) 19:09:47 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) (fail_nth: 2) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) [ 1836.088663] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1836.125014] device syz_tun entered promiscuous mode [ 1836.129090] FAULT_INJECTION: forcing a failure. [ 1836.129090] name failslab, interval 1, probability 0, space 0, times 0 [ 1836.131729] CPU: 1 PID: 11020 Comm: syz-executor.1 Not tainted 5.10.205 #1 [ 1836.133136] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1836.134824] Call Trace: [ 1836.135379] dump_stack+0x107/0x167 [ 1836.136141] should_fail.cold+0x5/0xa [ 1836.136925] ? __alloc_skb+0x6d/0x5b0 [ 1836.137714] should_failslab+0x5/0x20 [ 1836.138489] kmem_cache_alloc_node+0x55/0x330 [ 1836.139407] ? mark_lock+0xf5/0x2df0 [ 1836.140171] __alloc_skb+0x6d/0x5b0 [ 1836.140933] ? lock_chain_count+0x20/0x20 [ 1836.141780] inet6_ifa_notify+0x118/0x220 [ 1836.142636] ? inet6_fill_ifaddr+0xd60/0xd60 [ 1836.143535] ? __ipv6_ifa_notify+0xb10/0xb10 [ 1836.144433] __ipv6_ifa_notify+0x17b/0xb10 [ 1836.145297] ? modify_prefix_route+0x590/0x590 [ 1836.146224] ? try_to_grab_pending+0xe0/0xe0 [ 1836.147130] ipv6_ifa_notify+0xd7/0x240 [ 1836.147934] ipv6_del_addr+0x38e/0x8d0 [ 1836.148725] ? addrconf_dad_start+0x1c0/0x1c0 [ 1836.149663] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1836.150720] ? __local_bh_enable_ip+0x9d/0x100 [ 1836.151649] inet6_addr_del+0x2e3/0x5c0 [ 1836.152472] addrconf_del_ifaddr+0xf5/0x160 [ 1836.153356] ? addrconf_add_ifaddr+0x1c0/0x1c0 [ 1836.154287] ? lock_downgrade+0x6d0/0x6d0 [ 1836.155142] inet6_ioctl+0x1da/0x290 [ 1836.155900] ? inet6_release+0x70/0x70 [ 1836.156705] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1836.157772] ? SOFTIRQ_verbose+0x10/0x10 [ 1836.158595] ? find_held_lock+0x2c/0x110 [ 1836.159426] sock_do_ioctl+0xd3/0x300 [ 1836.160201] ? compat_ifr_data_ioctl+0x180/0x180 [ 1836.161184] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1836.162347] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1836.163393] ? do_vfs_ioctl+0x283/0x10d0 [ 1836.164213] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1836.165276] ? generic_block_fiemap+0x60/0x60 [ 1836.166196] sock_ioctl+0x3ea/0x700 [ 1836.166934] ? dlci_ioctl_set+0x30/0x30 [ 1836.167745] ? selinux_file_ioctl+0xb6/0x270 [ 1836.168637] ? dlci_ioctl_set+0x30/0x30 [ 1836.169469] __x64_sys_ioctl+0x19a/0x210 [ 1836.170302] do_syscall_64+0x33/0x40 [ 1836.171058] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1836.172096] RIP: 0033:0x7fe026b33b19 [ 1836.172856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1836.176552] RSP: 002b:00007fe0240a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1836.178092] RAX: ffffffffffffffda RBX: 00007fe026c46f60 RCX: 00007fe026b33b19 [ 1836.179523] RDX: 0000000020000140 RSI: 0000000000008936 RDI: 0000000000000004 [ 1836.180970] RBP: 00007fe0240a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1836.182408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1836.183842] R13: 00007fff427b8c6f R14: 00007fe0240a9300 R15: 0000000000022000 19:09:47 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) [ 1836.221360] device syz_tun left promiscuous mode 19:09:48 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x20000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:09:48 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x0, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1836.285603] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 1836.299385] EXT4-fs (loop5): get root inode failed [ 1836.300472] EXT4-fs (loop5): mount failed 19:09:48 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) (fail_nth: 3) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) [ 1836.379569] FAULT_INJECTION: forcing a failure. [ 1836.379569] name failslab, interval 1, probability 0, space 0, times 0 [ 1836.382248] CPU: 0 PID: 11027 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1836.383725] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1836.385431] Call Trace: [ 1836.385972] dump_stack+0x107/0x167 [ 1836.386724] should_fail.cold+0x5/0xa [ 1836.387506] ? __d_alloc+0x2a/0x990 [ 1836.388250] should_failslab+0x5/0x20 [ 1836.389027] kmem_cache_alloc+0x5b/0x310 [ 1836.389844] ? trace_hardirqs_on+0x5b/0x180 [ 1836.390720] __d_alloc+0x2a/0x990 [ 1836.391433] d_alloc_pseudo+0x19/0x70 [ 1836.392207] alloc_file_pseudo+0xce/0x250 [ 1836.393071] ? alloc_file+0x5a0/0x5a0 [ 1836.393843] ? shmem_get_inode+0x55c/0xbc0 [ 1836.394710] __shmem_file_setup+0x144/0x320 [ 1836.395580] ? _copy_from_user+0xfb/0x1b0 [ 1836.396421] __do_sys_memfd_create+0x275/0x450 [ 1836.397352] ? memfd_file_seals_ptr+0x170/0x170 [ 1836.398298] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1836.399366] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1836.400416] do_syscall_64+0x33/0x40 [ 1836.401179] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1836.402210] RIP: 0033:0x7f43d3d63b19 [ 1836.402962] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1836.406685] RSP: 002b:00007f43d12d8e98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1836.408221] RAX: ffffffffffffffda RBX: 0000000020001900 RCX: 00007f43d3d63b19 [ 1836.409669] RDX: 000000000000fffe RSI: 0000000000000000 RDI: 00007f43d3dbd0fb [ 1836.411111] RBP: 0000000000000001 R08: 0000000000007fff R09: 0000000000000000 [ 1836.412552] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1836.414012] R13: 00007ffd6ecae0cf R14: 000000000000fffe R15: 0000000000022000 [ 1836.567062] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1836.614451] device syz_tun entered promiscuous mode [ 1836.618824] FAULT_INJECTION: forcing a failure. [ 1836.618824] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1836.621742] CPU: 1 PID: 11037 Comm: syz-executor.1 Not tainted 5.10.205 #1 [ 1836.623139] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1836.624813] Call Trace: [ 1836.625349] dump_stack+0x107/0x167 [ 1836.626088] should_fail.cold+0x5/0xa [ 1836.626863] _copy_from_user+0x2e/0x1b0 [ 1836.627679] kstrtouint_from_user+0xbd/0x220 [ 1836.628561] ? kstrtou8_from_user+0x210/0x210 [ 1836.629483] ? lock_acquire+0x197/0x470 [ 1836.630278] ? ksys_write+0x12d/0x260 [ 1836.631057] proc_fail_nth_write+0x78/0x220 [ 1836.631918] ? proc_task_getattr+0x1f0/0x1f0 [ 1836.632810] ? __fget_files+0x296/0x4c0 [ 1836.633621] ? proc_task_getattr+0x1f0/0x1f0 [ 1836.634502] vfs_write+0x29a/0xa70 [ 1836.635224] ksys_write+0x12d/0x260 [ 1836.635956] ? __ia32_sys_read+0xb0/0xb0 [ 1836.636793] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1836.637840] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1836.638886] do_syscall_64+0x33/0x40 [ 1836.639649] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1836.640670] RIP: 0033:0x7fe026ae65ff [ 1836.641434] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 1836.645108] RSP: 002b:00007fe0240a9170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1836.646622] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fe026ae65ff [ 1836.648045] RDX: 0000000000000001 RSI: 00007fe0240a91e0 RDI: 0000000000000007 [ 1836.649472] RBP: 00007fe0240a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1836.650894] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 1836.652315] R13: 00007fff427b8c6f R14: 00007fe0240a9300 R15: 0000000000022000 [ 1836.664579] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1836.743497] device syz_tun left promiscuous mode 19:10:03 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:10:03 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:10:03 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:10:03 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:10:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {0x0, 0x0, 0x6000}], 0x0, &(0x7f0000013c00)) 19:10:03 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x0, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:10:03 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x20100000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:10:03 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) [ 1851.347755] FAULT_INJECTION: forcing a failure. [ 1851.347755] name failslab, interval 1, probability 0, space 0, times 0 [ 1851.350317] CPU: 1 PID: 11058 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1851.351912] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1851.353705] Call Trace: [ 1851.354239] dump_stack+0x107/0x167 [ 1851.354975] should_fail.cold+0x5/0xa [ 1851.355775] ? create_object.isra.0+0x3a/0xa20 [ 1851.356702] should_failslab+0x5/0x20 [ 1851.357543] kmem_cache_alloc+0x5b/0x310 [ 1851.358484] create_object.isra.0+0x3a/0xa20 [ 1851.359481] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1851.360627] kmem_cache_alloc+0x159/0x310 [ 1851.361657] __d_alloc+0x2a/0x990 [ 1851.362471] d_alloc_pseudo+0x19/0x70 [ 1851.363332] alloc_file_pseudo+0xce/0x250 [ 1851.364259] ? alloc_file+0x5a0/0x5a0 [ 1851.365131] ? shmem_get_inode+0x55c/0xbc0 [ 1851.366138] __shmem_file_setup+0x144/0x320 [ 1851.367106] ? _copy_from_user+0xfb/0x1b0 [ 1851.368037] __do_sys_memfd_create+0x275/0x450 [ 1851.369081] ? memfd_file_seals_ptr+0x170/0x170 [ 1851.370171] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1851.371342] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1851.372497] do_syscall_64+0x33/0x40 [ 1851.373350] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1851.374532] RIP: 0033:0x7f43d3d63b19 [ 1851.375367] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1851.379507] RSP: 002b:00007f43d12d8e98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1851.381257] RAX: ffffffffffffffda RBX: 0000000020001900 RCX: 00007f43d3d63b19 [ 1851.382882] RDX: 000000000000fffe RSI: 0000000000000000 RDI: 00007f43d3dbd0fb [ 1851.384475] RBP: 0000000000000001 R08: 0000000000007fff R09: 0000000000000000 [ 1851.386154] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1851.387760] R13: 00007ffd6ecae0cf R14: 000000000000fffe R15: 0000000000022000 19:10:03 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x0, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1851.397763] device syz_tun entered promiscuous mode [ 1851.404556] device syz_tun left promiscuous mode [ 1851.434001] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1851.465802] EXT4-fs warning (device loop5): read_mmp_block:114: Error -117 while reading MMP block 12 [ 1851.520235] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:10:03 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x2, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:10:03 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x0, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1851.595710] device syz_tun entered promiscuous mode [ 1851.607156] device syz_tun left promiscuous mode [ 1851.622157] device syz_tun entered promiscuous mode 19:10:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {0x0, 0x0, 0x6000}], 0x0, &(0x7f0000013c00)) 19:10:03 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) [ 1851.647176] device syz_tun left promiscuous mode 19:10:03 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x2e000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) [ 1851.675779] FAULT_INJECTION: forcing a failure. [ 1851.675779] name failslab, interval 1, probability 0, space 0, times 0 [ 1851.678671] CPU: 1 PID: 11078 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1851.680431] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1851.682354] Call Trace: [ 1851.683029] dump_stack+0x107/0x167 [ 1851.683812] should_fail.cold+0x5/0xa [ 1851.684760] ? __alloc_file+0x21/0x320 [ 1851.685699] should_failslab+0x5/0x20 [ 1851.686560] kmem_cache_alloc+0x5b/0x310 [ 1851.687543] __alloc_file+0x21/0x320 [ 1851.688399] alloc_empty_file+0x6d/0x170 [ 1851.689332] alloc_file+0x5e/0x5a0 [ 1851.690246] alloc_file_pseudo+0x16a/0x250 [ 1851.691144] ? alloc_file+0x5a0/0x5a0 [ 1851.692090] ? shmem_get_inode+0x55c/0xbc0 [ 1851.693107] __shmem_file_setup+0x144/0x320 [ 1851.694036] ? _copy_from_user+0xfb/0x1b0 [ 1851.694920] __do_sys_memfd_create+0x275/0x450 [ 1851.695955] ? memfd_file_seals_ptr+0x170/0x170 [ 1851.697097] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1851.698215] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1851.699392] do_syscall_64+0x33/0x40 [ 1851.700245] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1851.701418] RIP: 0033:0x7f43d3d63b19 [ 1851.702210] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1851.706064] RSP: 002b:00007f43d12d8e98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1851.707672] RAX: ffffffffffffffda RBX: 0000000020001900 RCX: 00007f43d3d63b19 [ 1851.709203] RDX: 000000000000fffe RSI: 0000000000000000 RDI: 00007f43d3dbd0fb [ 1851.710707] RBP: 0000000000000001 R08: 0000000000007fff R09: 0000000000000000 [ 1851.712215] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1851.713726] R13: 00007ffd6ecae0cf R14: 000000000000fffe R15: 0000000000022000 19:10:03 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x4b47, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) [ 1851.798721] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1851.806841] EXT4-fs warning (device loop5): read_mmp_block:114: Error -117 while reading MMP block 12 [ 1851.870351] device syz_tun entered promiscuous mode [ 1851.880188] device syz_tun left promiscuous mode [ 1851.901371] device syz_tun entered promiscuous mode [ 1851.907350] device syz_tun left promiscuous mode 19:10:03 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x0, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:10:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 11) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:10:19 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:10:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:10:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {0x0, 0x0, 0x6000}], 0x0, &(0x7f0000013c00)) 19:10:19 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:10:19 executing program 0: ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2800, 0xfffffffffffffffe}, 0x804, 0x0, 0x0, 0x1, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_usb_connect$cdc_ecm(0x3, 0x50, &(0x7f0000000000)=ANY=[@ANYBLOB="12010002020000082505a1a440000102030109023e000101c1e015090400fb0321550d24ff0000cb0351775d8bc25e8409017d09050302"], &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x45, &(0x7f0000000080)={0x5, 0xf, 0x45, 0x3, [@ss_container_id={0x14, 0x10, 0x4, 0x73, "27d7474d5e78b47fb717d5d3f77cfbac"}, @ssp_cap={0x18, 0x10, 0xa, 0x47, 0x3, 0x3, 0x880, 0x3704, [0xbe00, 0xffc000, 0xde]}, @ssp_cap={0x14, 0x10, 0xa, 0x1, 0x2, 0x5, 0xf00, 0x3, [0x3f00, 0x3e8f]}]}, 0x1, [{0x2, &(0x7f0000000280)=@string={0x2}}]}) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x640680, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), r0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TID_CONFIG(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x34, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x18}]}, 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000300)={'wlan1\x00', 0x0}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000340)=0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x54, r3, 0x10, 0x70bd2c, 0x25dfdbff, {{}, {@val={0x8, 0x1, 0x5b}, @val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x1f, 0x1d}}}}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x6, 0x7}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_PID={0x8, 0x52, 0xffffffffffffffff}, @NL80211_ATTR_PID={0x8, 0x52, r9}]}, 0x54}, 0x1, 0x0, 0x0, 0x20008041}, 0x4000) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x24, 0x1d, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x8, 0x1, 0x0, 0x0, @u32}]}, 0x24}}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x4040, 0x42) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:10:19 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x4b49, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:10:19 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x0, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1867.732558] FAULT_INJECTION: forcing a failure. [ 1867.732558] name failslab, interval 1, probability 0, space 0, times 0 [ 1867.735559] CPU: 0 PID: 11108 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1867.737057] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1867.738793] Call Trace: [ 1867.739332] dump_stack+0x107/0x167 [ 1867.740096] should_fail.cold+0x5/0xa [ 1867.740901] ? create_object.isra.0+0x3a/0xa20 [ 1867.741863] should_failslab+0x5/0x20 [ 1867.742647] kmem_cache_alloc+0x5b/0x310 [ 1867.743476] create_object.isra.0+0x3a/0xa20 [ 1867.744375] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1867.745438] kmem_cache_alloc+0x159/0x310 [ 1867.746300] __alloc_file+0x21/0x320 [ 1867.747069] alloc_empty_file+0x6d/0x170 [ 1867.747907] alloc_file+0x5e/0x5a0 [ 1867.748657] alloc_file_pseudo+0x16a/0x250 [ 1867.749552] ? alloc_file+0x5a0/0x5a0 [ 1867.750347] ? shmem_get_inode+0x55c/0xbc0 [ 1867.751222] __shmem_file_setup+0x144/0x320 [ 1867.752108] ? _copy_from_user+0xfb/0x1b0 [ 1867.752974] __do_sys_memfd_create+0x275/0x450 [ 1867.753919] ? memfd_file_seals_ptr+0x170/0x170 [ 1867.755012] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1867.756370] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1867.757703] do_syscall_64+0x33/0x40 [ 1867.758643] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1867.759968] RIP: 0033:0x7f43d3d63b19 [ 1867.760874] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1867.765701] RSP: 002b:00007f43d12d8e98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1867.767602] RAX: ffffffffffffffda RBX: 0000000020001900 RCX: 00007f43d3d63b19 [ 1867.769337] RDX: 000000000000fffe RSI: 0000000000000000 RDI: 00007f43d3dbd0fb [ 1867.771048] RBP: 0000000000000001 R08: 0000000000007fff R09: 0000000000000000 [ 1867.772760] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1867.774469] R13: 00007ffd6ecae0cf R14: 000000000000fffe R15: 0000000000022000 [ 1867.824127] device syz_tun entered promiscuous mode [ 1867.826598] udc-core: couldn't find an available UDC or it's busy [ 1867.828517] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 [ 1867.865870] device syz_tun left promiscuous mode [ 1867.885767] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1867.890477] EXT4-fs warning (device loop5): read_mmp_block:114: Error -117 while reading MMP block 12 [ 1867.898799] device syz_tun entered promiscuous mode [ 1867.906082] device syz_tun left promiscuous mode [ 1867.941040] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:10:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 12) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:10:19 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x0, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:10:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000011600), 0x0, 0x6000}], 0x0, &(0x7f0000013c00)) 19:10:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x40000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:10:19 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x541b, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) [ 1868.110445] FAULT_INJECTION: forcing a failure. [ 1868.110445] name failslab, interval 1, probability 0, space 0, times 0 [ 1868.112346] CPU: 0 PID: 11131 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1868.113338] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1868.114509] Call Trace: [ 1868.114890] dump_stack+0x107/0x167 [ 1868.115411] should_fail.cold+0x5/0xa [ 1868.115962] ? security_file_alloc+0x34/0x170 [ 1868.116606] should_failslab+0x5/0x20 [ 1868.117168] kmem_cache_alloc+0x5b/0x310 [ 1868.117754] security_file_alloc+0x34/0x170 [ 1868.118382] __alloc_file+0xb7/0x320 [ 1868.118921] alloc_empty_file+0x6d/0x170 [ 1868.119499] alloc_file+0x5e/0x5a0 [ 1868.120002] alloc_file_pseudo+0x16a/0x250 [ 1868.120597] ? alloc_file+0x5a0/0x5a0 [ 1868.121145] ? shmem_get_inode+0x55c/0xbc0 [ 1868.121748] __shmem_file_setup+0x144/0x320 [ 1868.122371] ? _copy_from_user+0xfb/0x1b0 [ 1868.122965] __do_sys_memfd_create+0x275/0x450 [ 1868.123618] ? memfd_file_seals_ptr+0x170/0x170 [ 1868.124296] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1868.125016] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1868.125756] do_syscall_64+0x33/0x40 [ 1868.126268] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1868.126992] RIP: 0033:0x7f43d3d63b19 [ 1868.127507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1868.130136] RSP: 002b:00007f43d12d8e98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1868.131217] RAX: ffffffffffffffda RBX: 0000000020001900 RCX: 00007f43d3d63b19 [ 1868.132233] RDX: 000000000000fffe RSI: 0000000000000000 RDI: 00007f43d3dbd0fb [ 1868.133265] RBP: 0000000000000001 R08: 0000000000007fff R09: 0000000000000000 [ 1868.134283] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1868.135291] R13: 00007ffd6ecae0cf R14: 000000000000fffe R15: 0000000000022000 [ 1868.171758] device syz_tun entered promiscuous mode [ 1868.181779] device syz_tun left promiscuous mode [ 1868.189751] device syz_tun entered promiscuous mode [ 1868.193763] device syz_tun left promiscuous mode 19:10:19 executing program 0: r0 = memfd_create(&(0x7f0000000340)='\x00', 0x6) fcntl$addseals(r0, 0x409, 0x10) [ 1868.227619] EXT4-fs warning (device loop5): read_mmp_block:114: Error -117 while reading MMP block 12 19:10:20 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x0, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1868.249992] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:10:35 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:10:35 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:10:35 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x5421, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:10:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 13) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:10:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000011600), 0x0, 0x6000}], 0x0, &(0x7f0000013c00)) 19:10:35 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x60000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:10:35 executing program 0: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x0, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:10:35 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x0, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1883.331475] FAULT_INJECTION: forcing a failure. [ 1883.331475] name failslab, interval 1, probability 0, space 0, times 0 [ 1883.334190] CPU: 0 PID: 11164 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1883.335602] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1883.337303] Call Trace: [ 1883.337860] dump_stack+0x107/0x167 [ 1883.338615] should_fail.cold+0x5/0xa [ 1883.339401] ? create_object.isra.0+0x3a/0xa20 [ 1883.340352] should_failslab+0x5/0x20 [ 1883.341136] kmem_cache_alloc+0x5b/0x310 [ 1883.341994] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1883.343113] create_object.isra.0+0x3a/0xa20 [ 1883.344015] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1883.345054] kmem_cache_alloc+0x159/0x310 [ 1883.345922] security_file_alloc+0x34/0x170 [ 1883.346810] __alloc_file+0xb7/0x320 [ 1883.347582] alloc_empty_file+0x6d/0x170 [ 1883.348429] alloc_file+0x5e/0x5a0 [ 1883.349175] alloc_file_pseudo+0x16a/0x250 [ 1883.350052] ? alloc_file+0x5a0/0x5a0 [ 1883.350833] ? shmem_get_inode+0x55c/0xbc0 [ 1883.351708] __shmem_file_setup+0x144/0x320 [ 1883.352606] ? _copy_from_user+0xfb/0x1b0 [ 1883.353483] __do_sys_memfd_create+0x275/0x450 [ 1883.354437] ? memfd_file_seals_ptr+0x170/0x170 [ 1883.355372] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1883.356452] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1883.357529] do_syscall_64+0x33/0x40 [ 1883.358305] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1883.359361] RIP: 0033:0x7f43d3d63b19 [ 1883.360127] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1883.363851] RSP: 002b:00007f43d12d8e98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1883.365431] RAX: ffffffffffffffda RBX: 0000000020001900 RCX: 00007f43d3d63b19 [ 1883.366891] RDX: 000000000000fffe RSI: 0000000000000000 RDI: 00007f43d3dbd0fb [ 1883.368356] RBP: 0000000000000001 R08: 0000000000007fff R09: 0000000000000000 [ 1883.369822] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1883.371286] R13: 00007ffd6ecae0cf R14: 000000000000fffe R15: 0000000000022000 [ 1883.381508] device syz_tun entered promiscuous mode [ 1883.390483] device syz_tun left promiscuous mode [ 1883.413802] device syz_tun entered promiscuous mode [ 1883.418126] device syz_tun left promiscuous mode 19:10:35 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x0, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1883.466825] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1883.473790] EXT4-fs warning (device loop5): read_mmp_block:114: Error -117 while reading MMP block 12 19:10:35 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x541b, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) [ 1883.525862] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:10:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:10:35 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x5450, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:10:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000011600), 0x0, 0x6000}], 0x0, &(0x7f0000013c00)) [ 1883.647376] device syz_tun entered promiscuous mode [ 1883.651453] device syz_tun entered promiscuous mode 19:10:35 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x7a0e0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) [ 1883.679484] device syz_tun left promiscuous mode [ 1883.695677] device syz_tun entered promiscuous mode [ 1883.705432] FAULT_INJECTION: forcing a failure. [ 1883.705432] name failslab, interval 1, probability 0, space 0, times 0 [ 1883.708470] CPU: 0 PID: 11185 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1883.710002] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1883.711717] Call Trace: [ 1883.712271] dump_stack+0x107/0x167 [ 1883.713018] should_fail.cold+0x5/0xa [ 1883.713813] ? getname_flags.part.0+0x50/0x4f0 [ 1883.714761] should_failslab+0x5/0x20 [ 1883.715549] kmem_cache_alloc+0x5b/0x310 [ 1883.716389] getname_flags.part.0+0x50/0x4f0 [ 1883.717292] getname+0x8e/0xd0 [ 1883.717952] do_sys_openat2+0xf9/0x420 [ 1883.718770] ? build_open_flags+0x6f0/0x6f0 [ 1883.719688] ? rcu_read_lock_any_held+0x75/0xa0 [ 1883.720657] __x64_sys_openat+0x13f/0x1f0 [ 1883.721546] ? __ia32_sys_open+0x1c0/0x1c0 [ 1883.722435] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1883.723540] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1883.724628] do_syscall_64+0x33/0x40 [ 1883.725418] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1883.726498] RIP: 0033:0x7f43d3d16a04 [ 1883.727278] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1883.731154] RSP: 002b:00007f43d12d8e20 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1883.732742] RAX: ffffffffffffffda RBX: 00007f43d3dad970 RCX: 00007f43d3d16a04 [ 1883.734245] RDX: 0000000000000002 RSI: 00007f43d12d8f40 RDI: 00000000ffffff9c [ 1883.735721] RBP: 00007f43d12d8f40 R08: 0000000000000000 R09: 0000000000000000 [ 1883.737207] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1883.738703] R13: 0000000000000005 R14: 0000000020001918 R15: 0000000000000001 [ 1883.746260] device syz_tun left promiscuous mode [ 1883.750202] device syz_tun left promiscuous mode 19:10:35 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1883.859835] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:10:35 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x541b, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) [ 1883.920483] EXT4-fs warning (device loop5): read_mmp_block:114: Error -117 while reading MMP block 12 [ 1883.930702] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1884.083328] device syz_tun entered promiscuous mode [ 1884.095658] device syz_tun left promiscuous mode 19:10:49 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x5451, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:10:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:10:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000011600)='PMM\x00', 0x4, 0x6000}], 0x0, &(0x7f0000013c00)) 19:10:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 15) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:10:49 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:10:49 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:10:49 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:10:49 executing program 0: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x0, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1898.205968] device syz_tun entered promiscuous mode [ 1898.210590] FAULT_INJECTION: forcing a failure. [ 1898.210590] name failslab, interval 1, probability 0, space 0, times 0 [ 1898.213140] CPU: 1 PID: 11219 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1898.214575] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1898.216310] Call Trace: [ 1898.216852] dump_stack+0x107/0x167 [ 1898.217618] should_fail.cold+0x5/0xa [ 1898.218397] ? create_object.isra.0+0x3a/0xa20 [ 1898.219324] should_failslab+0x5/0x20 [ 1898.220098] kmem_cache_alloc+0x5b/0x310 [ 1898.220921] create_object.isra.0+0x3a/0xa20 [ 1898.221824] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1898.222853] kmem_cache_alloc+0x159/0x310 [ 1898.223749] getname_flags.part.0+0x50/0x4f0 [ 1898.224673] getname+0x8e/0xd0 [ 1898.225443] do_sys_openat2+0xf9/0x420 [ 1898.226291] ? build_open_flags+0x6f0/0x6f0 [ 1898.227170] ? rcu_read_lock_any_held+0x75/0xa0 [ 1898.228108] __x64_sys_openat+0x13f/0x1f0 [ 1898.228995] ? __ia32_sys_open+0x1c0/0x1c0 [ 1898.229879] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1898.231053] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1898.232150] do_syscall_64+0x33/0x40 [ 1898.232988] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1898.234077] RIP: 0033:0x7f43d3d16a04 [ 1898.234877] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1898.238743] RSP: 002b:00007f43d12d8e20 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1898.240360] RAX: ffffffffffffffda RBX: 00007f43d3dad970 RCX: 00007f43d3d16a04 [ 1898.241830] RDX: 0000000000000002 RSI: 00007f43d12d8f40 RDI: 00000000ffffff9c [ 1898.243272] RBP: 00007f43d12d8f40 R08: 0000000000000000 R09: 0000000000000000 [ 1898.244727] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1898.246184] R13: 0000000000000005 R14: 0000000020001918 R15: 0000000000000001 [ 1898.260452] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1898.262310] device syz_tun left promiscuous mode [ 1898.274171] device syz_tun entered promiscuous mode [ 1898.284114] device syz_tun left promiscuous mode 19:10:50 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x5, 0x80) r0 = fork() ptrace(0x10, r0) ptrace(0x4207, r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r2, r1) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r6 = fork() ptrace(0x10, r6) ptrace(0x4207, r6) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x6, 0x0) ptrace$getregset(0x4204, r6, 0x1, &(0x7f00000000c0)={&(0x7f0000000080)}) dup2(r5, r4) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r5, 0x4008941a, &(0x7f0000000040)) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r4, 0x40049366, &(0x7f0000000080)=0x2) pread64(r3, &(0x7f0000001e00)=""/4140, 0x102c, 0x3f) [ 1898.397701] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:10:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 16) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:10:50 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:10:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x5452, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:10:50 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) [ 1898.593306] FAULT_INJECTION: forcing a failure. [ 1898.593306] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1898.596198] CPU: 0 PID: 11241 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1898.597649] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1898.599335] Call Trace: [ 1898.599887] dump_stack+0x107/0x167 [ 1898.600637] should_fail.cold+0x5/0xa [ 1898.601410] strncpy_from_user+0x34/0x470 [ 1898.602318] getname_flags.part.0+0x95/0x4f0 [ 1898.603207] getname+0x8e/0xd0 [ 1898.603861] do_sys_openat2+0xf9/0x420 [ 1898.604659] ? build_open_flags+0x6f0/0x6f0 [ 1898.605682] ? rcu_read_lock_any_held+0x75/0xa0 [ 1898.606865] __x64_sys_openat+0x13f/0x1f0 [ 1898.607870] ? __ia32_sys_open+0x1c0/0x1c0 [ 1898.608903] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1898.610209] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1898.611296] do_syscall_64+0x33/0x40 [ 1898.612054] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1898.613108] RIP: 0033:0x7f43d3d16a04 [ 1898.613890] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1898.617623] RSP: 002b:00007f43d12d8e20 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1898.619161] RAX: ffffffffffffffda RBX: 00007f43d3dad970 RCX: 00007f43d3d16a04 [ 1898.620607] RDX: 0000000000000002 RSI: 00007f43d12d8f40 RDI: 00000000ffffff9c [ 1898.622064] RBP: 00007f43d12d8f40 R08: 0000000000000000 R09: 0000000000000000 [ 1898.623511] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1898.624945] R13: 0000000000000005 R14: 0000000020001918 R15: 0000000000000001 [ 1898.670510] device syz_tun entered promiscuous mode [ 1898.677159] device syz_tun left promiscuous mode 19:10:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 17) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) [ 1898.693704] device syz_tun entered promiscuous mode [ 1898.719597] device syz_tun left promiscuous mode 19:10:50 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x2, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:10:50 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:10:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x5460, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) [ 1898.884656] FAULT_INJECTION: forcing a failure. [ 1898.884656] name failslab, interval 1, probability 0, space 0, times 0 [ 1898.887238] CPU: 1 PID: 11255 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1898.888652] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1898.890334] Call Trace: [ 1898.890879] dump_stack+0x107/0x167 [ 1898.891621] should_fail.cold+0x5/0xa [ 1898.892399] ? __alloc_file+0x21/0x320 [ 1898.893191] should_failslab+0x5/0x20 [ 1898.893984] kmem_cache_alloc+0x5b/0x310 [ 1898.894819] __alloc_file+0x21/0x320 [ 1898.895573] alloc_empty_file+0x6d/0x170 [ 1898.896413] path_openat+0xe3/0x26e0 [ 1898.897167] ? path_lookupat+0x860/0x860 [ 1898.897994] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1898.899041] ? SOFTIRQ_verbose+0x10/0x10 [ 1898.899864] do_filp_open+0x190/0x3e0 [ 1898.900622] ? may_open_dev+0xf0/0xf0 [ 1898.901387] ? __alloc_fd+0x2b8/0x630 [ 1898.902167] ? lock_downgrade+0x6d0/0x6d0 [ 1898.902997] ? do_raw_spin_lock+0x121/0x260 [ 1898.903867] ? rwlock_bug.part.0+0x90/0x90 [ 1898.904731] ? _raw_spin_unlock+0x1a/0x30 [ 1898.905583] ? __alloc_fd+0x2b8/0x630 [ 1898.906368] do_sys_openat2+0x171/0x420 [ 1898.907182] ? build_open_flags+0x6f0/0x6f0 [ 1898.908071] ? rcu_read_lock_any_held+0x75/0xa0 [ 1898.909021] __x64_sys_openat+0x13f/0x1f0 [ 1898.909879] ? __ia32_sys_open+0x1c0/0x1c0 [ 1898.910750] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1898.911815] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1898.912876] do_syscall_64+0x33/0x40 [ 1898.913643] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1898.914686] RIP: 0033:0x7f43d3d16a04 [ 1898.915446] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1898.919210] RSP: 002b:00007f43d12d8e20 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1898.920755] RAX: ffffffffffffffda RBX: 00007f43d3dad970 RCX: 00007f43d3d16a04 [ 1898.922219] RDX: 0000000000000002 RSI: 00007f43d12d8f40 RDI: 00000000ffffff9c [ 1898.923676] RBP: 00007f43d12d8f40 R08: 0000000000000000 R09: 0000000000000000 [ 1898.925127] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1898.926591] R13: 0000000000000005 R14: 0000000020001918 R15: 0000000000000001 [ 1898.974343] device syz_tun entered promiscuous mode [ 1898.993367] device syz_tun left promiscuous mode [ 1899.028871] EXT4-fs warning (device loop5): ext4_multi_mount_protect:340: MMP startup interrupted, failing mount [ 1899.028871] [ 1899.031874] device syz_tun entered promiscuous mode [ 1899.043177] device syz_tun left promiscuous mode 19:10:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000011600)='PMM\x00', 0x4, 0x6000}], 0x0, &(0x7f0000013c00)) 19:10:50 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xf9fdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) [ 1900.146753] EXT4-fs warning (device loop5): ext4_multi_mount_protect:340: MMP startup interrupted, failing mount [ 1900.146753] 19:11:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 18) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:11:08 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x2, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:11:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000011600)='PMM\x00', 0x4, 0x6000}], 0x0, &(0x7f0000013c00)) 19:11:08 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:11:08 executing program 0: capset(&(0x7f0000000000)={0x19980330, 0xffffffffffffffff}, &(0x7f0000000040)={0x8, 0x20, 0x3, 0x6, 0x7, 0x346a}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x3f, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c902e6661740002cfa20e9470000000f80100000000", 0x17, 0xffffffff00000010}, {0x0, 0x0, 0x1000a04}], 0x1224011, &(0x7f00000000c0)=ANY=[@ANYRESOCT=0x0]) 19:11:08 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:11:08 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:11:08 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8901, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) [ 1917.289189] FAULT_INJECTION: forcing a failure. [ 1917.289189] name failslab, interval 1, probability 0, space 0, times 0 [ 1917.291504] CPU: 1 PID: 11291 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1917.292736] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1917.294189] Call Trace: [ 1917.294657] dump_stack+0x107/0x167 [ 1917.295305] should_fail.cold+0x5/0xa [ 1917.295975] ? create_object.isra.0+0x3a/0xa20 [ 1917.296780] should_failslab+0x5/0x20 [ 1917.297453] kmem_cache_alloc+0x5b/0x310 [ 1917.298186] create_object.isra.0+0x3a/0xa20 [ 1917.298973] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1917.299885] kmem_cache_alloc+0x159/0x310 [ 1917.300648] __alloc_file+0x21/0x320 [ 1917.301321] alloc_empty_file+0x6d/0x170 [ 1917.302056] path_openat+0xe3/0x26e0 [ 1917.302757] ? path_lookupat+0x860/0x860 [ 1917.303502] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1917.304479] ? SOFTIRQ_verbose+0x10/0x10 [ 1917.305229] do_filp_open+0x190/0x3e0 [ 1917.305930] ? may_open_dev+0xf0/0xf0 [ 1917.306624] ? __alloc_fd+0x2b8/0x630 [ 1917.307321] ? lock_downgrade+0x6d0/0x6d0 [ 1917.308079] ? do_raw_spin_lock+0x121/0x260 [ 1917.308857] ? rwlock_bug.part.0+0x90/0x90 [ 1917.309624] ? _raw_spin_unlock+0x1a/0x30 [ 1917.310384] ? __alloc_fd+0x2b8/0x630 [ 1917.311098] do_sys_openat2+0x171/0x420 [ 1917.311810] ? build_open_flags+0x6f0/0x6f0 [ 1917.312585] ? rcu_read_lock_any_held+0x75/0xa0 [ 1917.313453] __x64_sys_openat+0x13f/0x1f0 [ 1917.314225] ? __ia32_sys_open+0x1c0/0x1c0 [ 1917.315024] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1917.315999] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1917.316928] do_syscall_64+0x33/0x40 [ 1917.317586] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1917.318522] RIP: 0033:0x7f43d3d16a04 [ 1917.319196] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1917.322485] RSP: 002b:00007f43d12d8e20 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1917.323850] RAX: ffffffffffffffda RBX: 00007f43d3dad970 RCX: 00007f43d3d16a04 [ 1917.325122] RDX: 0000000000000002 RSI: 00007f43d12d8f40 RDI: 00000000ffffff9c [ 1917.326424] RBP: 00007f43d12d8f40 R08: 0000000000000000 R09: 0000000000000000 [ 1917.327724] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1917.329005] R13: 0000000000000005 R14: 0000000020001918 R15: 0000000000000001 [ 1917.369541] device syz_tun entered promiscuous mode [ 1917.372744] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1917.377242] device syz_tun left promiscuous mode [ 1917.404531] device syz_tun entered promiscuous mode [ 1917.418993] device syz_tun left promiscuous mode [ 1917.444498] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:11:09 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x2, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:11:09 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x1433, &(0x7f0000001680)={0x0, 0x81af, 0x0, 0xffffffff, 0x8100}, &(0x7f0000feb000/0xb000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000001300)) r2 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x2) flock(r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000002e00)=""/4109, 0x100d}], 0x2) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x80, 0x81, 0xd, 0x8, 0x0, 0x2, 0x9019, 0xb, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x2dc0, 0x101}, 0x2000, 0x6, 0x80000000, 0x4, 0x4, 0x6, 0x200, 0x0, 0x7fffffff, 0x0, 0xfffffffffffffc01}, 0x0, 0xd, 0xffffffffffffffff, 0x1) fork() syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x31f, &(0x7f0000000240)={'wlan1\x00'}) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x1a3, 0x0, r5}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_WRITE_FIXED={0x5, 0x4, 0x0, @fd=r4, 0x0, 0x0, 0x120ea6a2, 0x0, 0x0, {0x1, r8}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001780)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r3, 0x0, &(0x7f0000001640)={&(0x7f00000013c0)=@phonet, 0x80, &(0x7f0000001700)=[{&(0x7f0000001440)=""/56, 0x38}, {&(0x7f0000001480)=""/12, 0xc}, {&(0x7f00000014c0)=""/67, 0x43}, {&(0x7f0000001540)=""/64, 0x40}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001580)=""/184, 0xb8}], 0x6}, 0x0, 0x60, 0x1, {0x1, r8}}, 0x2) fork() getpgrp(0x0) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000001180)={0x43, 0x9, 0x2, {0x3, 0x9, 0x1ff, 0xc, 0x3, 0xffffffff, 0x1, 0x3, 0x10001}}, 0x43) 19:11:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8902, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:11:09 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:11:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 19) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) [ 1917.702144] device syz_tun entered promiscuous mode [ 1917.725333] device syz_tun left promiscuous mode [ 1917.763558] FAULT_INJECTION: forcing a failure. [ 1917.763558] name failslab, interval 1, probability 0, space 0, times 0 [ 1917.766479] CPU: 0 PID: 11322 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1917.768010] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1917.769902] Call Trace: [ 1917.770515] dump_stack+0x107/0x167 [ 1917.771337] should_fail.cold+0x5/0xa [ 1917.772198] ? security_file_alloc+0x34/0x170 [ 1917.773210] should_failslab+0x5/0x20 [ 1917.774069] kmem_cache_alloc+0x5b/0x310 [ 1917.774996] security_file_alloc+0x34/0x170 [ 1917.775970] __alloc_file+0xb7/0x320 [ 1917.776806] alloc_empty_file+0x6d/0x170 [ 1917.777722] path_openat+0xe3/0x26e0 [ 1917.778591] ? path_lookupat+0x860/0x860 [ 1917.779500] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1917.780671] ? SOFTIRQ_verbose+0x10/0x10 [ 1917.781591] do_filp_open+0x190/0x3e0 [ 1917.782448] ? may_open_dev+0xf0/0xf0 [ 1917.783308] ? __alloc_fd+0x2b8/0x630 [ 1917.784192] ? lock_downgrade+0x6d0/0x6d0 [ 1917.785130] ? do_raw_spin_lock+0x121/0x260 [ 1917.786104] ? rwlock_bug.part.0+0x90/0x90 [ 1917.787069] ? _raw_spin_unlock+0x1a/0x30 [ 1917.787997] ? __alloc_fd+0x2b8/0x630 [ 1917.788866] do_sys_openat2+0x171/0x420 [ 1917.789776] ? build_open_flags+0x6f0/0x6f0 [ 1917.790748] ? rcu_read_lock_any_held+0x75/0xa0 [ 1917.791802] __x64_sys_openat+0x13f/0x1f0 [ 1917.792734] ? __ia32_sys_open+0x1c0/0x1c0 [ 1917.793701] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1917.794885] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1917.796050] do_syscall_64+0x33/0x40 [ 1917.796888] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1917.798058] RIP: 0033:0x7f43d3d16a04 [ 1917.798901] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1917.803016] RSP: 002b:00007f43d12d8e20 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1917.804721] RAX: ffffffffffffffda RBX: 00007f43d3dad970 RCX: 00007f43d3d16a04 [ 1917.806344] RDX: 0000000000000002 RSI: 00007f43d12d8f40 RDI: 00000000ffffff9c [ 1917.807958] RBP: 00007f43d12d8f40 R08: 0000000000000000 R09: 0000000000000000 [ 1917.809557] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1917.811167] R13: 0000000000000005 R14: 0000000020001918 R15: 0000000000000001 [ 1917.822225] device syz_tun entered promiscuous mode [ 1917.836986] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1917.842618] device syz_tun left promiscuous mode 19:11:09 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x2, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1917.919783] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:11:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 20) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) [ 1918.078503] FAULT_INJECTION: forcing a failure. [ 1918.078503] name failslab, interval 1, probability 0, space 0, times 0 [ 1918.081132] CPU: 1 PID: 11332 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1918.082514] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1918.084123] Call Trace: [ 1918.084649] dump_stack+0x107/0x167 [ 1918.085380] should_fail.cold+0x5/0xa [ 1918.086146] ? create_object.isra.0+0x3a/0xa20 [ 1918.087050] should_failslab+0x5/0x20 [ 1918.087804] kmem_cache_alloc+0x5b/0x310 [ 1918.088605] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1918.089702] create_object.isra.0+0x3a/0xa20 [ 1918.090617] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1918.091615] kmem_cache_alloc+0x159/0x310 [ 1918.092457] security_file_alloc+0x34/0x170 [ 1918.093336] __alloc_file+0xb7/0x320 [ 1918.094095] alloc_empty_file+0x6d/0x170 [ 1918.094901] path_openat+0xe3/0x26e0 [ 1918.095650] ? path_lookupat+0x860/0x860 [ 1918.096491] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1918.097515] ? SOFTIRQ_verbose+0x10/0x10 [ 1918.098373] do_filp_open+0x190/0x3e0 [ 1918.099127] ? may_open_dev+0xf0/0xf0 [ 1918.099919] ? __alloc_fd+0x2b8/0x630 [ 1918.100666] ? lock_downgrade+0x6d0/0x6d0 [ 1918.101507] ? do_raw_spin_lock+0x121/0x260 [ 1918.102379] ? rwlock_bug.part.0+0x90/0x90 [ 1918.103256] ? _raw_spin_unlock+0x1a/0x30 [ 1918.104095] ? __alloc_fd+0x2b8/0x630 [ 1918.104887] do_sys_openat2+0x171/0x420 [ 1918.105696] ? build_open_flags+0x6f0/0x6f0 [ 1918.106584] ? rcu_read_lock_any_held+0x75/0xa0 [ 1918.107521] __x64_sys_openat+0x13f/0x1f0 [ 1918.108361] ? __ia32_sys_open+0x1c0/0x1c0 [ 1918.109220] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1918.110288] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1918.111334] do_syscall_64+0x33/0x40 [ 1918.112082] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1918.113131] RIP: 0033:0x7f43d3d16a04 [ 1918.113889] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1918.117511] RSP: 002b:00007f43d12d8e20 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1918.119073] RAX: ffffffffffffffda RBX: 00007f43d3dad970 RCX: 00007f43d3d16a04 [ 1918.120522] RDX: 0000000000000002 RSI: 00007f43d12d8f40 RDI: 00000000ffffff9c [ 1918.121997] RBP: 00007f43d12d8f40 R08: 0000000000000000 R09: 0000000000000000 [ 1918.123428] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1918.124856] R13: 0000000000000005 R14: 0000000020001918 R15: 0000000000000001 [ 1918.171319] EXT4-fs warning (device loop5): ext4_multi_mount_protect:340: MMP startup interrupted, failing mount [ 1918.171319] 19:11:23 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x2, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:11:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8903, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:11:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:11:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000011600)='PMM\x00PM', 0x6, 0x6000}], 0x0, &(0x7f0000013c00)) 19:11:23 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:11:23 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x1433, &(0x7f0000001680)={0x0, 0x81af, 0x0, 0xffffffff, 0x8100}, &(0x7f0000feb000/0xb000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000001300)) r2 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x2) flock(r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000002e00)=""/4109, 0x100d}], 0x2) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x80, 0x81, 0xd, 0x8, 0x0, 0x2, 0x9019, 0xb, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x2dc0, 0x101}, 0x2000, 0x6, 0x80000000, 0x4, 0x4, 0x6, 0x200, 0x0, 0x7fffffff, 0x0, 0xfffffffffffffc01}, 0x0, 0xd, 0xffffffffffffffff, 0x1) fork() syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x31f, &(0x7f0000000240)={'wlan1\x00'}) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x1a3, 0x0, r5}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_WRITE_FIXED={0x5, 0x4, 0x0, @fd=r4, 0x0, 0x0, 0x120ea6a2, 0x0, 0x0, {0x1, r8}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001780)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r3, 0x0, &(0x7f0000001640)={&(0x7f00000013c0)=@phonet, 0x80, &(0x7f0000001700)=[{&(0x7f0000001440)=""/56, 0x38}, {&(0x7f0000001480)=""/12, 0xc}, {&(0x7f00000014c0)=""/67, 0x43}, {&(0x7f0000001540)=""/64, 0x40}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001580)=""/184, 0xb8}], 0x6}, 0x0, 0x60, 0x1, {0x1, r8}}, 0x2) fork() getpgrp(0x0) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000001180)={0x43, 0x9, 0x2, {0x3, 0x9, 0x1ff, 0xc, 0x3, 0xffffffff, 0x1, 0x3, 0x10001}}, 0x43) 19:11:23 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 21) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:11:23 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) [ 1931.963316] device syz_tun entered promiscuous mode [ 1931.990240] device syz_tun left promiscuous mode [ 1931.996369] FAULT_INJECTION: forcing a failure. [ 1931.996369] name failslab, interval 1, probability 0, space 0, times 0 [ 1931.999025] CPU: 1 PID: 11357 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1932.000423] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1932.002121] Call Trace: [ 1932.002705] dump_stack+0x107/0x167 [ 1932.003516] should_fail.cold+0x5/0xa [ 1932.004396] ? __kthread_create_on_node+0xd1/0x400 [ 1932.005392] should_failslab+0x5/0x20 [ 1932.006002] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1932.006181] kmem_cache_alloc_trace+0x55/0x320 [ 1932.007984] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1932.008936] __kthread_create_on_node+0xd1/0x400 [ 1932.009898] ? __kthread_parkme+0x1d0/0x1d0 [ 1932.010794] ? __mutex_lock+0x4fe/0x10b0 [ 1932.011621] ? loop_configure+0xcb5/0x1480 [ 1932.012477] ? do_raw_spin_unlock+0x4f/0x220 [ 1932.013381] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1932.014375] kthread_create_on_node+0xbb/0x100 [ 1932.015305] ? __kthread_create_on_node+0x400/0x400 [ 1932.016326] ? lockdep_init_map_type+0x2c7/0x780 [ 1932.017292] ? lockdep_init_map_type+0x2c7/0x780 [ 1932.018275] loop_configure+0x3e3/0x1480 [ 1932.019115] lo_ioctl+0xa72/0x1760 [ 1932.019843] ? avc_has_extended_perms+0x7f1/0xf40 [ 1932.020829] ? loop_set_status_old+0x250/0x250 [ 1932.021768] ? avc_ss_reset+0x180/0x180 [ 1932.022600] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1932.023669] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1932.024764] ? trace_hardirqs_on+0x5b/0x180 [ 1932.025651] ? __lock_acquire+0xbb1/0x5b00 [ 1932.026584] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1932.027652] ? generic_block_fiemap+0x60/0x60 [ 1932.028581] ? loop_set_status_old+0x250/0x250 [ 1932.029507] blkdev_ioctl+0x291/0x710 [ 1932.030295] ? blkdev_common_ioctl+0x1870/0x1870 [ 1932.031273] ? selinux_file_ioctl+0xb6/0x270 [ 1932.032179] block_ioctl+0xf9/0x140 [ 1932.032919] ? blkdev_read_iter+0x1c0/0x1c0 [ 1932.033803] __x64_sys_ioctl+0x19a/0x210 [ 1932.034655] do_syscall_64+0x33/0x40 [ 1932.035415] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1932.036458] RIP: 0033:0x7f43d3d638d7 [ 1932.037219] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1932.040950] RSP: 002b:00007f43d12d8e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1932.042514] RAX: ffffffffffffffda RBX: 00007f43d3dad970 RCX: 00007f43d3d638d7 [ 1932.043962] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1932.045407] RBP: 0000000000000006 R08: 0000000000000000 R09: 0000000000000000 [ 1932.046865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1932.048315] R13: 0000000000000005 R14: 0000000020001918 R15: 0000000000000001 [ 1932.052780] device syz_tun entered promiscuous mode [ 1932.059631] device syz_tun left promiscuous mode [ 1932.076810] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:11:23 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x2, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:11:23 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 22) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) [ 1932.146427] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1932.171329] FAULT_INJECTION: forcing a failure. [ 1932.171329] name failslab, interval 1, probability 0, space 0, times 0 [ 1932.174136] CPU: 1 PID: 11372 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1932.175724] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1932.177427] Call Trace: [ 1932.177996] dump_stack+0x107/0x167 [ 1932.178758] should_fail.cold+0x5/0xa [ 1932.179547] ? create_object.isra.0+0x3a/0xa20 [ 1932.180468] should_failslab+0x5/0x20 [ 1932.181249] kmem_cache_alloc+0x5b/0x310 [ 1932.182093] create_object.isra.0+0x3a/0xa20 [ 1932.182975] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1932.184024] kmem_cache_alloc_trace+0x151/0x320 [ 1932.184964] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1932.185944] __kthread_create_on_node+0xd1/0x400 [ 1932.186894] ? __kthread_parkme+0x1d0/0x1d0 [ 1932.187794] ? __mutex_lock+0x4fe/0x10b0 [ 1932.188657] ? loop_configure+0xcb5/0x1480 [ 1932.189568] ? do_raw_spin_unlock+0x4f/0x220 [ 1932.190503] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1932.191478] kthread_create_on_node+0xbb/0x100 [ 1932.192428] ? __kthread_create_on_node+0x400/0x400 [ 1932.193491] ? lockdep_init_map_type+0x2c7/0x780 [ 1932.194498] ? lockdep_init_map_type+0x2c7/0x780 [ 1932.195477] loop_configure+0x3e3/0x1480 [ 1932.196345] lo_ioctl+0xa72/0x1760 [ 1932.197067] ? avc_has_extended_perms+0x7f1/0xf40 [ 1932.198103] ? loop_set_status_old+0x250/0x250 [ 1932.199021] ? avc_ss_reset+0x180/0x180 [ 1932.199842] ? lock_acquire+0x197/0x470 [ 1932.200639] ? find_held_lock+0x2c/0x110 [ 1932.201484] ? __lock_acquire+0xbb1/0x5b00 [ 1932.202391] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1932.203464] ? generic_block_fiemap+0x60/0x60 [ 1932.204376] ? loop_set_status_old+0x250/0x250 [ 1932.205307] blkdev_ioctl+0x291/0x710 [ 1932.206094] ? blkdev_common_ioctl+0x1870/0x1870 [ 1932.207063] ? selinux_file_ioctl+0xb6/0x270 [ 1932.208131] block_ioctl+0xf9/0x140 [ 1932.209015] ? blkdev_read_iter+0x1c0/0x1c0 [ 1932.210043] __x64_sys_ioctl+0x19a/0x210 [ 1932.210898] do_syscall_64+0x33/0x40 [ 1932.211667] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1932.212733] RIP: 0033:0x7f43d3d638d7 [ 1932.213498] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1932.217356] RSP: 002b:00007f43d12d8e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1932.219070] RAX: ffffffffffffffda RBX: 00007f43d3dad970 RCX: 00007f43d3d638d7 [ 1932.220610] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1932.222242] RBP: 0000000000000006 R08: 0000000000000000 R09: 0000000000000000 [ 1932.223849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1932.225452] R13: 0000000000000005 R14: 0000000020001918 R15: 0000000000000001 19:11:23 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:11:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8904, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:11:24 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r1, &(0x7f0000002400)=[{&(0x7f0000000440)=""/213, 0xd5}], 0x1, 0xffffffff, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$setlease(r2, 0x400, 0x1) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r4 = syz_open_dev$vcsu(&(0x7f0000000040), 0x8001, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000001840)=@flushsa={0x14, 0x1c, 0x100, 0x70bd2b, 0x25dfdbff, {0x3c}}, 0x14}, 0x1, 0x0, 0x0, 0x44040}, 0x0) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0x158, 0x1a, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@local, 0x0, 0x33}, @in=@private, {0x0, 0x0, 0x6}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}}]}, 0x158}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_SPLICE={0x1e, 0x2, 0x0, @fd=r4, 0xffffffffffffff7f, {0x0, r0}, 0x8001, 0x1, 0x0, {0x0, 0x0, r5}}, 0xea) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_io_uring_setup(0x0, 0x0, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000140), 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 19:11:24 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x2, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1932.467767] device syz_tun entered promiscuous mode [ 1932.496420] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1932.512853] device syz_tun left promiscuous mode [ 1932.549641] device syz_tun entered promiscuous mode 19:11:24 executing program 4: set_mempolicy(0x0, &(0x7f00000000c0)=0x6c0e, 0x7fff) syz_80211_join_ibss(&(0x7f0000000040)='wlan1\x00', 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, &(0x7f00000023c0)=0x28) syz_80211_join_ibss(&(0x7f0000000000)='wlan1\x00', &(0x7f0000000080)=@default_ibss_ssid, 0x6, 0x2) r0 = fork() tkill(0x0, 0x0) wait4(r0, &(0x7f0000000140), 0x8, &(0x7f00000002c0)) syz_80211_join_ibss(&(0x7f00000001c0)='wlan0\x00', &(0x7f0000000200)=@random="b27dc9f8ca3ae52872e1aeab3189bd00e9e6c9e8b0afa5e9703d04", 0x1b, 0x2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x59, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_80211_inject_frame(&(0x7f0000000100)=@device_b, &(0x7f0000000180)=@mgmt_frame=@deauth={@with_ht={{{}, {0x8}, @broadcast, @broadcast, @from_mac=@broadcast, {0x7, 0x79}}, @ver_80211n={0x0, 0x81, 0x2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}, 0x23, @void}, 0x1e) fork() 19:11:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 23) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) [ 1932.571567] device syz_tun left promiscuous mode [ 1932.581882] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1932.728722] FAULT_INJECTION: forcing a failure. [ 1932.728722] name failslab, interval 1, probability 0, space 0, times 0 [ 1932.731302] CPU: 1 PID: 11394 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1932.732840] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1932.734532] Call Trace: [ 1932.735081] dump_stack+0x107/0x167 [ 1932.735838] should_fail.cold+0x5/0xa [ 1932.736723] ? __kernfs_new_node+0xd4/0x860 [ 1932.737772] should_failslab+0x5/0x20 [ 1932.738807] kmem_cache_alloc+0x5b/0x310 [ 1932.739991] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1932.741439] __kernfs_new_node+0xd4/0x860 [ 1932.742623] ? lock_chain_count+0x20/0x20 [ 1932.743744] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1932.745052] ? update_load_avg+0x162/0x1870 [ 1932.746254] ? find_held_lock+0x2c/0x110 [ 1932.747261] ? set_user_nice.part.0+0x2fd/0x760 [ 1932.748444] kernfs_create_dir_ns+0x9c/0x230 [ 1932.749455] internal_create_group+0x793/0xb30 [ 1932.750400] ? set_user_nice.part.0+0x2fd/0x760 [ 1932.751438] ? sysfs_remove_group+0x170/0x170 [ 1932.752524] ? lockdep_init_map_type+0x2c7/0x780 [ 1932.753557] ? blk_queue_flag_set+0x22/0x30 [ 1932.754444] ? __loop_update_dio+0x2d2/0x690 [ 1932.755345] loop_configure+0x954/0x1480 [ 1932.756178] lo_ioctl+0xa72/0x1760 [ 1932.756898] ? avc_has_extended_perms+0x7f1/0xf40 [ 1932.757879] ? loop_set_status_old+0x250/0x250 [ 1932.758844] ? avc_ss_reset+0x180/0x180 [ 1932.759653] ? lock_acquire+0x197/0x470 [ 1932.760465] ? find_held_lock+0x2c/0x110 [ 1932.761302] ? __lock_acquire+0xbb1/0x5b00 [ 1932.762222] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1932.763303] ? generic_block_fiemap+0x60/0x60 [ 1932.764221] ? loop_set_status_old+0x250/0x250 [ 1932.765142] blkdev_ioctl+0x291/0x710 [ 1932.765936] ? blkdev_common_ioctl+0x1870/0x1870 [ 1932.766914] ? selinux_file_ioctl+0xb6/0x270 [ 1932.767811] block_ioctl+0xf9/0x140 [ 1932.768549] ? blkdev_read_iter+0x1c0/0x1c0 [ 1932.769430] __x64_sys_ioctl+0x19a/0x210 [ 1932.770268] do_syscall_64+0x33/0x40 [ 1932.771024] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1932.772073] RIP: 0033:0x7f43d3d638d7 [ 1932.772826] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1932.776559] RSP: 002b:00007f43d12d8e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1932.778133] RAX: ffffffffffffffda RBX: 00007f43d3dad970 RCX: 00007f43d3d638d7 [ 1932.779561] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1932.780978] RBP: 0000000000000006 R08: 0000000000000000 R09: 0000000000000000 [ 1932.782403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1932.783863] R13: 0000000000000005 R14: 0000000020001918 R15: 0000000000000001 [ 1932.817725] EXT4-fs warning (device loop5): ext4_multi_mount_protect:340: MMP startup interrupted, failing mount [ 1932.817725] [ 1932.982224] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1938.255998] Bluetooth: hci7: command 0x0409 tx timeout [ 1940.303956] Bluetooth: hci7: command 0x041b tx timeout [ 1942.351928] Bluetooth: hci7: command 0x040f tx timeout [ 1943.109393] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1943.110977] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1943.113480] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1943.149017] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1943.150543] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1943.152149] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1943.395627] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1944.399942] Bluetooth: hci7: command 0x0419 tx timeout [ 1944.539300] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 19:11:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:11:52 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8906, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:11:52 executing program 4: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x4c, 0x0, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast1}, @FOU_ATTR_TYPE={0x5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @rand_addr=0x64010101}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x88}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x16}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0xaaaac32, &(0x7f0000000200), 0x0, &(0x7f00000000c0)=ANY=[]) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000180)={0x38, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}]}]}, 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000580)={'ip6tnl0\x00', &(0x7f0000000500)={'ip6_vti0\x00', 0x0, 0x29, 0x0, 0x5, 0xd8bab79, 0x10, @ipv4={'\x00', '\xff\xff', @local}, @private2, 0x40, 0x8, 0x1, 0x6}}) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000d80)=0x14, 0x80000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000002980)={'ip6tnl0\x00', &(0x7f0000002900)={'syztnl1\x00', 0x0, 0x29, 0x1f, 0x4, 0xffff, 0x23, @remote, @local, 0x8, 0x20, 0xfffffff9, 0x2a}}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003f80)=[{{&(0x7f0000000340)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x43}}, 0x10, &(0x7f0000000440)=[{&(0x7f0000000380)="bd83758ae759564e2e02b4945d08e3621eb7a5e6826a5b5de448ccc059af4e66b1f31d12c4aecd827bab3cc5ff3f2ee054f0265b9d6dd499562c11c98d65ac6286481c584427aa86fafdcfc999c9bc990656065e539eb20a81e46d3c1a45d511057f2b4b", 0x64}, {&(0x7f0000000400)="8a79b3cdc5a4f43fab62da44", 0xc}], 0x2, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @dev={0xac, 0x14, 0x14, 0x14}, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xffffff82}}, @ip_retopts={{0x5c, 0x0, 0x7, {[@ssrr={0x89, 0x23, 0x6d, [@private=0xa010100, @dev={0xac, 0x14, 0x14, 0x20}, @private=0xa010100, @rand_addr=0x64010102, @private=0xa010102, @empty, @dev={0xac, 0x14, 0x14, 0x2d}, @multicast1]}, @rr={0x7, 0x7, 0xe6, [@dev={0xac, 0x14, 0x14, 0x42}]}, @ssrr={0x89, 0xf, 0xe8, [@private=0xa010102, @private=0xa010101, @multicast2]}, @lsrr={0x83, 0xf, 0x80, [@loopback, @dev={0xac, 0x14, 0x14, 0x15}, @dev={0xac, 0x14, 0x14, 0x2e}]}, @noop]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_ttl={{0x14}}, @ip_retopts={{0x30, 0x0, 0x7, {[@rr={0x7, 0xf, 0x56, [@private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @local]}, @noop, @noop, @timestamp_prespec={0x44, 0xc, 0x96, 0x3, 0x8, [{@private=0xa010102, 0x20}]}]}}}], 0x118}}, {{&(0x7f0000000700)={0x2, 0x4e22, @private=0xa010100}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000740)="4b1d14fa29704d67ecf4624ed1f07a91b69b", 0x12}, {&(0x7f0000000780)="b044adb4d5247fa1bf94568b2035fdbfb9db268b1a12f6746b5b637ac513d5834678bbddf2c878fe6118c06633d4c3c16f207208a9b45add5283af385247558d1384c181b8555daa75c3ed873a87", 0x4e}], 0x2, &(0x7f0000000840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x80000001}}, @ip_retopts={{0x8c, 0x0, 0x7, {[@timestamp={0x44, 0x20, 0x9a, 0x0, 0x7, [0xff, 0xf3ce, 0xffffffe0, 0x5, 0x3, 0x3, 0x7fffffff]}, @noop, @rr={0x7, 0x23, 0xa8, [@initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @broadcast, @remote, @loopback, @multicast1, @multicast2, @loopback]}, @ssrr={0x89, 0xb, 0x10, [@remote, @remote]}, @rr={0x7, 0x1f, 0xb, [@local, @private=0xa010101, @remote, @loopback, @multicast2, @broadcast, @remote]}, @rr={0x7, 0xb, 0x86, [@multicast1, @multicast1]}]}}}, @ip_retopts={{0x40, 0x0, 0x7, {[@noop, @ssrr={0x89, 0x2b, 0x9b, [@rand_addr=0x64010102, @remote, @empty, @local, @private=0xa010101, @remote, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @rand_addr=0x64010100]}, @end]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}}}}], 0x120}}, {{&(0x7f0000000980)={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000000cc0)=[{&(0x7f00000009c0)="b6c07db5ec5a5a7b3d283557dbe8e36f2ee8bf549828390cd290899d172bc97f40c0da5a7509f2856ed73e92e8d9080c9aaee53d9bcdb741156daa9a7952c6d7f7499cd6956a186b6e0fa7802f6f8af761f9420a8a50afcb992eb97afade9d89f78e84cfff5f9905e0c8c10322a6ca2d4b312f8abeb2c2b374a624a9839b26fa533093dfc36fc52437521603e56ce0047c74cfa8e391abc66f161eff8d9a0f7b99ac82c3b671caeef5df30a1ada14b6ad60b65ffb1", 0xb5}, {&(0x7f0000000a80)="76c04550dc5615beb24ac2a11b2381c244bca2c1f43e1b3ae00bebe1554865a9207107599a", 0x25}, {&(0x7f0000000ac0)="e75235ac08ae824aa7d7bc84e01d7d092aaf3fbc6e83da0a81397b3393e8acf4d6db88b6620bd0fd2fe713d63625e8c6290576e0e0b4fdacac0c3a8074f0e20cdf7c4fab48fb770afd4d213f3813d71830846d8f2f9a889344022dc9b21ed7c8c575d57157aec32cac71d125608d274a1d6f047ac85de316cc86cf0eb404334c67816b4bb33faa8c1e1dddf1cc42332a9d7b50058755bc447ba4b6493da9f69ca81a3ab9d87fa5cabca73f9f95ff9838ca803a68eae42f0715ec45d1d73cbf8e38f1ca2714270cee6cea2781a668c23feb9de811877c85f933bc585b0c1372f08bb313dff5627ac151cdbab95d1c", 0xee}, {&(0x7f0000000bc0)="efa325932b09d8a322a58ba7", 0xc}, {&(0x7f00000017c0)="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", 0x1000}, {&(0x7f0000000c00)="e604e596735c85a8d4280125de0e6de32ccb4e18e467c7ee16a56d13af09a0b18c885d55324de5796d2e49c7a14bb787fd183faeb39c445a206eaafb83690a83ef59d0a5a9f60ae6ae93d7d19d5609a9f8e65426d404da08172e4c54dbccd3a80b515fbe7b72d9e0aebfe611e9f5985ae2c16028ccbcfe16086682297f5bae8471f098a6edac97f0f4", 0x89}], 0x6, &(0x7f0000000dc0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @local, @loopback}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}], 0x98}}, {{&(0x7f0000000e80)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x25}}, 0x10, &(0x7f0000001000)=[{&(0x7f0000000ec0)="b14337a538", 0x5}, {&(0x7f0000000f00)="cdf62341a10bee3d88f3c06c55de35561935a9827f2c5a7154f269249da3d30e6860060c4dfeb58b88a25a72cfdf36c377a310367e70b5506a304987fe2396a587e6d5dac20a3df3df65a04c567eb14bfd5c1c9bb5783fcf9de4a65bd77433d9e24b1be2bab673a1784242218927c95dfcba863c1d6f3bbd893587d93be753dbcf2a635d32496c864a595bd21ff5712f6428cd5accb0bf7b2092d27a7117404e677e703c043858e1b96d725a935f546069c4fd4c2bdac1cf2e57a09d9056f0c0f231b7ce794c5b24b965eb9f219f09960cd982b6c6515587db1739cd37d0e1c2d5ebeacab6b9dc6fc317ceecb5", 0xed}], 0x2, &(0x7f0000001040)=[@ip_retopts={{0x40, 0x0, 0x7, {[@rr={0x7, 0x23, 0xc8, [@local, @empty, @loopback, @empty, @empty, @rand_addr=0x64010101, @loopback, @dev={0xac, 0x14, 0x14, 0x12}]}, @generic={0x88, 0xd, "82eda9eb08553c24998633"}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x80}}], 0x58}}, {{&(0x7f00000010c0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000001680)=[{&(0x7f0000001100)="321a57703c4ea9743091a0ff93bc3890a37fd90b2492fe7fb0fed4ccb4e9f6eef1b839f4660fd466a45df24d9208eb52b5371d3008514e51a15d67c8f76e9ba9c2cb078e0d5fd1583f2e104570619b98a36a0506366bbf36f15173d7b6803654f90c5fa853c761b10d47c8faf9861c6b4959778956ee0203c2ca5c73e254642377f64aec2ffa0960cfe4fbbfb1936d8461499676aa1694f60bc0e5a798b000863894aa73fec7117eb2626586376770d0af94b0f9310a8f92ea01d31d3c05ef1fc6535da6f8acb3852e1a11f630d5023141736999a2ce4666f24211b9fee973ef822510833ca19588f864bac486a9", 0xee}, {&(0x7f0000001200)="8ed38a00a99d5c8f08dc8df34542ea584078a2ea194e4053f7c20ec877bbd8b754827961a8374073a7ce060444ff7036db1feef8f28822c0510ac30a3ddcb65a46976e4a80457ee9238a4cbee6fa547653daf03f70b2555eef5b1d537f11f61b92ab3e518502e18ebe9fc596db92e51fa28e9bacbd529511b35cb1ca95e5d6a1508a10f351247e", 0x87}, {&(0x7f00000012c0)="07ca966bc2c621ceab6339391ee67c81cf155b96a744011d13492bb4909cec53367c3bc8f45e9c31e9527940f8543d09522ee3095b5958891ca363f0dfd87f12240158f9434b21abf0489888ffceee392bfef573627959b2b2076171b0d25af5d2c65f2da2ced2c9595a94fffe356b8e6cdeb84f5e8ea4c51919497a183fbfb50f4c61c062e4bf5fb44dd594882645c1b9fdb65d11d60ea07f67c2b0795d99b58315cececc4b5fa60adb87bb85f39ad97328e7d0672b38de0879cd9cfd62de73", 0xc0}, {&(0x7f0000001380)="2a85a1629cd393e40678600f9f6eba69a2c704bb1e0c8a9cedd38b81226487586e43117302e88dfbfa33722fbd3281cf6b3564f9adb22eaa3c0293e580119bc084d78fda45f11fc8b8c8dc3f0f520fb5e921f9e452d6fcb18bdb7b4d45783eb00459734b902b721a83f4bfac32c49818d36c5f63a3675512b03249c815c0d364370367b800dde30514fd26a0", 0x8c}, {&(0x7f0000001440)="1dc4439dc2aa02de4b9c4aca2b621c806218eb58c346e1ad11c24095cd19a66533e48eec65497370ef8b0bbf1b13261cde3f88f33917c3e12bc72d7ba446ed77bd3270f694b890bfdc687e8af962febeecd5236434b4982c1b47df936e90e55817ff103fb4f948d822edaec70453d85c9bd6528c3cbc1baa0e5695611da3f93457a3b21375ed9c7d304095803c9d93b4fd54fb087d5e0825d8dc41cb4e8febdc4231259793ec6390c43c6d", 0xab}, {&(0x7f0000001500)="c276813fa11184e8a5a5b7ccfd549da88a4e7776de1e27498f716446a1eb678bce390a095f74d4d49147af07e9cad66b99f74fa720", 0x35}, {&(0x7f0000002ac0)="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", 0x1000}, {&(0x7f0000001540)="4f7d8e8e87aeaa8721561ea2ab265eb0a5c92aef48315458435f", 0x1a}, {&(0x7f0000001580)="e013e82cd7bebbe2dbc0e90593d32b287dab3ef576210baa6321320e67ec4303b598947ac71340f574b6f725a51d61dda246fc1c0f1bbe6a8339ed9526f6a5c8f9df29828dce9f19603659839ecc2c1542ce6d42b6cc44f3711fd51519acf41762c046ba7e314d83f78f517b592ed7c7801dacf2e7fa1a643b6336157d131d4c5c7554a43187c8346225b7c46c2f94c0b10cb6a144dac261a7f47df25ceb3fe6d725116cdd921daa3de847270733fef820fe3075f2944d898e463cfdfb1eaae56b35feffa9e9ea73b0e6a00d4241e7", 0xcf}], 0x9, &(0x7f00000027c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xfd}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_retopts={{0xac, 0x0, 0x7, {[@timestamp={0x44, 0xc, 0x82, 0x0, 0x2, [0x9, 0x5]}, @end, @cipso={0x86, 0x5a, 0x1, [{0x5, 0x6, "2232a018"}, {0x5, 0xe, "e67c6384f807d760afd5584b"}, {0x3, 0xc, "5d33a12ca912974b5608"}, {0x5, 0x4, 'ej'}, {0x2, 0xc, "0515e267a739594afe7e"}, {0x1, 0x3, "ab"}, {0x5, 0xe, "e6fe75f95c1e2b1e14d0bf07"}, {0x7, 0x10, "c70440839e88173473c5e0f27a62"}, {0x5, 0x3, "f2"}]}, @cipso={0x86, 0x31, 0x1, [{0x6, 0x8, "cc6b230f2f39"}, {0x7, 0x7, "1249932883"}, {0x5, 0xb, "0f96bef1ced2b25d9c"}, {0x7, 0x4, "139c"}, {0x0, 0xd, "fb02edcf91eee3a2dd55cb"}]}, @generic={0x94, 0x2}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x80000001}}], 0xf8}}, {{0x0, 0x0, &(0x7f00000028c0)=[{&(0x7f0000001740)="a2a18d99dbcc924afb95aada27a65c06d7821adcd9aeef070f608652b66ae070da62c55aea03524d3cc99ef14e7f7d3560bb4027f55ad5258ba7c3", 0x3b}], 0x1, &(0x7f00000029c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast1, @loopback}}}], 0x38}}, {{&(0x7f0000002a00)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000003b40)=[{&(0x7f0000003ac0)="acaa2f733e76090b2cbde9dbe388b369e2fc336c85834688bc7c9103e2f8cae054005f6c77ab683bbd7d113927f97f388950e3aa20c66db47b9d9645da1dca46436b465a67366523", 0x48}, {&(0x7f0000002a40)="01ee", 0x2}], 0x2, &(0x7f0000003b80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x200}}], 0x18}}, {{&(0x7f0000003bc0)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000003d80)=[{&(0x7f0000003c00)="04387ab0156b6103e0e1ed002f5eb7c7a9fe2dfa68a80158e621fc33a7fe9df1f76867a911a1e034389bbdc76e36c091222576b03904f69f47b7cf9375a3781ae130008d4021", 0x46}, {&(0x7f0000003c80)="b8e1b96aa1853acab876d721bfdc36c18ef2c36fd146b93435de4e3078e1b175db3e799266e6497332725ba25387171df4f4a69b499d89963173d8f5210389602004f49e23e0fefbc1d5ac156238ff5ec0860ac07b2c5e8e12d6ac97c10789028768d6e51f38c5372ddfb6dde3e2732150780258f227ff801f743c37b3ca4b60c9bd472ec083780cee6bc2543a32946e18f92526ad655bf83f392a85cdfb161a2990d42f99398609be89773aff8296226315859d054ce4d27e6a4a03f1f970d1474e8f22a18d6da4a107571315afca72f47e9b9b80e30308acfa2fe73839ef3b89fe52ff3f1f7d90cecce6c397", 0xed}], 0x2}}, {{&(0x7f0000003dc0)={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f0000003f00)=[{&(0x7f0000003e00)="3191b2653e4fcb1e76e80882a71dfb2c80f5c84240bd58ef1a3a93d89d7ca9df880ecabb626020c6366a95998f576d3b879b67e53dce82421288c91c165a48eee01701f4cdc869cf22820a909339d910206b08e1f2083698f0423f063f1deaf9f2c8c2351fd997fb9e60c3af3b48506664f720c6e5cee495df474066c120491131b14ddcac0de0fb3fb6e8ed2e29c9944846191deeca024fcccf8268917fd29c91c270fe4c6f5a108a6b7db03390fab900f50d1987997b35b976430dbdc2bcff282546", 0xc3}], 0x1, &(0x7f0000003f40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3e8}}], 0x18}}], 0x9, 0x4000000) chdir(&(0x7f0000000040)='./file0\x00') r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002a80)='/proc/asound/seq/clients\x00', 0x0, 0x0) fcntl$lock(r6, 0x0, 0x0) r7 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r6, 0xc018937a, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100ee0018000000", @ANYRES32=r7, @ANYBLOB='0\x00']) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f00000000c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0xabd, 0x1, 0x3, 0x8, 0x7f, 0xf6d1}, 0x20) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chroot(&(0x7f0000001780)='./file0\x00') creat(&(0x7f0000000080)='./file0\x00', 0x0) 19:11:52 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:11:52 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)) r1 = request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, r0) request_key(&(0x7f0000000280)='cifs.idmap\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='keyring\x00', r0) r2 = add_key$keyring(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000080), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f00000001c0)='.request_key_auth\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0x0) unshare(0x48020200) 19:11:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000011600)='PMM\x00PM', 0x6, 0x6000}], 0x0, &(0x7f0000013c00)) 19:11:52 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 24) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:11:52 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x2, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1961.163547] FAULT_INJECTION: forcing a failure. [ 1961.163547] name failslab, interval 1, probability 0, space 0, times 0 [ 1961.166215] CPU: 1 PID: 11888 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1961.167643] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1961.169330] Call Trace: [ 1961.169880] dump_stack+0x107/0x167 [ 1961.170643] should_fail.cold+0x5/0xa [ 1961.171426] ? create_object.isra.0+0x3a/0xa20 [ 1961.172368] should_failslab+0x5/0x20 [ 1961.173156] kmem_cache_alloc+0x5b/0x310 [ 1961.173983] create_object.isra.0+0x3a/0xa20 [ 1961.174901] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1961.176167] kmem_cache_alloc+0x159/0x310 [ 1961.177118] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1961.178468] __kernfs_new_node+0xd4/0x860 [ 1961.179391] ? lock_chain_count+0x20/0x20 [ 1961.180316] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1961.181356] ? update_load_avg+0x162/0x1870 [ 1961.182300] ? find_held_lock+0x2c/0x110 [ 1961.183218] ? set_user_nice.part.0+0x2fd/0x760 [ 1961.184237] kernfs_create_dir_ns+0x9c/0x230 [ 1961.185194] internal_create_group+0x793/0xb30 [ 1961.186194] ? set_user_nice.part.0+0x2fd/0x760 [ 1961.187173] ? sysfs_remove_group+0x170/0x170 [ 1961.188115] ? lockdep_init_map_type+0x2c7/0x780 [ 1961.189145] ? blk_queue_flag_set+0x22/0x30 [ 1961.190071] ? __loop_update_dio+0x2d2/0x690 [ 1961.191063] loop_configure+0x954/0x1480 [ 1961.191963] lo_ioctl+0xa72/0x1760 [ 1961.192733] ? avc_has_extended_perms+0x7f1/0xf40 [ 1961.193787] ? loop_set_status_old+0x250/0x250 [ 1961.194780] ? avc_ss_reset+0x180/0x180 [ 1961.195602] ? lock_acquire+0x197/0x470 [ 1961.196433] ? find_held_lock+0x2c/0x110 [ 1961.197330] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1961.198510] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1961.199675] ? trace_hardirqs_on+0x5b/0x180 [ 1961.200608] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1961.201822] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1961.202946] ? generic_block_fiemap+0x60/0x60 [ 1961.203915] ? loop_set_status_old+0x250/0x250 [ 1961.204866] blkdev_ioctl+0x291/0x710 [ 1961.205721] ? blkdev_common_ioctl+0x1870/0x1870 [ 1961.206755] ? selinux_file_ioctl+0xb6/0x270 [ 1961.207694] block_ioctl+0xf9/0x140 [ 1961.208430] ? blkdev_read_iter+0x1c0/0x1c0 [ 1961.209347] __x64_sys_ioctl+0x19a/0x210 [ 1961.210196] do_syscall_64+0x33/0x40 [ 1961.210999] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1961.212056] RIP: 0033:0x7f43d3d638d7 [ 1961.212830] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1961.216580] RSP: 002b:00007f43d12d8e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1961.218122] RAX: ffffffffffffffda RBX: 00007f43d3dad970 RCX: 00007f43d3d638d7 [ 1961.219559] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1961.220997] RBP: 0000000000000006 R08: 0000000000000000 R09: 0000000000000000 [ 1961.222447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1961.223886] R13: 0000000000000005 R14: 0000000020001918 R15: 0000000000000001 19:11:53 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x2, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) 19:11:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0xffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/tcp6\x00') getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000180), &(0x7f0000000080)=0x68) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, 0x1c) write$P9_RLINK(r1, &(0x7f0000000200)={0x7, 0x47, 0x2}, 0x7) preadv(r1, &(0x7f0000000400)=[{&(0x7f00000003c0)=""/13, 0xd}], 0x1, 0xffa, 0x0) connect$802154_dgram(r1, &(0x7f0000000040)={0x24, @none={0x0, 0x1}}, 0x14) [ 1961.288777] device syz_tun entered promiscuous mode [ 1961.303610] device syz_tun left promiscuous mode [ 1961.317338] device syz_tun entered promiscuous mode [ 1961.334956] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1961.364474] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1961.369924] device syz_tun left promiscuous mode 19:11:53 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 25) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:11:53 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xffffe000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) [ 1961.475307] FAULT_INJECTION: forcing a failure. [ 1961.475307] name failslab, interval 1, probability 0, space 0, times 0 [ 1961.478134] CPU: 1 PID: 11907 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1961.479643] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1961.481565] Call Trace: [ 1961.482261] dump_stack+0x107/0x167 [ 1961.483395] should_fail.cold+0x5/0xa [ 1961.484513] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1961.485995] should_failslab+0x5/0x20 [ 1961.486985] kmem_cache_alloc+0x5b/0x310 [ 1961.488043] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1961.489505] idr_get_free+0x4b5/0x8f0 [ 1961.490534] idr_alloc_u32+0x170/0x2d0 [ 1961.491544] ? __fprop_inc_percpu_max+0x130/0x130 [ 1961.492794] ? lock_acquire+0x197/0x470 [ 1961.493823] ? __kernfs_new_node+0xff/0x860 [ 1961.494931] idr_alloc_cyclic+0x102/0x230 [ 1961.496010] ? idr_alloc+0x130/0x130 [ 1961.496976] ? rwlock_bug.part.0+0x90/0x90 [ 1961.498088] __kernfs_new_node+0x117/0x860 [ 1961.499175] ? lock_chain_count+0x20/0x20 [ 1961.500266] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1961.501507] ? update_load_avg+0x162/0x1870 [ 1961.502653] ? find_held_lock+0x2c/0x110 [ 1961.503714] ? set_user_nice.part.0+0x2fd/0x760 [ 1961.504926] kernfs_create_dir_ns+0x9c/0x230 [ 1961.506076] internal_create_group+0x793/0xb30 [ 1961.507268] ? set_user_nice.part.0+0x2fd/0x760 [ 1961.508477] ? sysfs_remove_group+0x170/0x170 [ 1961.509614] ? lockdep_init_map_type+0x2c7/0x780 [ 1961.510860] ? blk_queue_flag_set+0x22/0x30 [ 1961.511983] ? __loop_update_dio+0x2d2/0x690 [ 1961.513131] loop_configure+0x954/0x1480 [ 1961.514219] lo_ioctl+0xa72/0x1760 [ 1961.515159] ? avc_has_extended_perms+0x7f1/0xf40 [ 1961.516421] ? loop_set_status_old+0x250/0x250 [ 1961.517609] ? avc_ss_reset+0x180/0x180 [ 1961.518625] ? lock_acquire+0x197/0x470 [ 1961.519649] ? find_held_lock+0x2c/0x110 [ 1961.520720] ? __lock_acquire+0xbb1/0x5b00 [ 1961.521878] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1961.523255] ? generic_block_fiemap+0x60/0x60 [ 1961.524431] ? loop_set_status_old+0x250/0x250 [ 1961.525605] blkdev_ioctl+0x291/0x710 [ 1961.526575] ? blkdev_common_ioctl+0x1870/0x1870 [ 1961.527782] ? selinux_file_ioctl+0xb6/0x270 [ 1961.528917] block_ioctl+0xf9/0x140 [ 1961.529844] ? blkdev_read_iter+0x1c0/0x1c0 [ 1961.530978] __x64_sys_ioctl+0x19a/0x210 [ 1961.532020] do_syscall_64+0x33/0x40 [ 1961.532987] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1961.534308] RIP: 0033:0x7f43d3d638d7 [ 1961.535238] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1961.539999] RSP: 002b:00007f43d12d8e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1961.542186] RAX: ffffffffffffffda RBX: 00007f43d3dad970 RCX: 00007f43d3d638d7 [ 1961.544023] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1961.546044] RBP: 0000000000000006 R08: 0000000000000000 R09: 0000000000000000 [ 1961.547894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1961.549938] R13: 0000000000000005 R14: 0000000020001918 R15: 0000000000000001 19:11:53 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8907, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:11:53 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1961.624723] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:11:53 executing program 0: arch_prctl$ARCH_GET_CPUID(0x1011) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='debugfs\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0xc020, &(0x7f0000000140)) 19:11:53 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 26) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) [ 1961.651691] device syz_tun entered promiscuous mode [ 1961.667530] device syz_tun left promiscuous mode [ 1961.672963] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1961.677691] device syz_tun entered promiscuous mode [ 1961.707347] device syz_tun left promiscuous mode [ 1961.752391] FAULT_INJECTION: forcing a failure. [ 1961.752391] name failslab, interval 1, probability 0, space 0, times 0 [ 1961.753815] CPU: 0 PID: 11924 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1961.754588] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1961.755470] Call Trace: [ 1961.755758] dump_stack+0x107/0x167 [ 1961.756157] should_fail.cold+0x5/0xa [ 1961.756570] ? create_object.isra.0+0x3a/0xa20 [ 1961.757078] should_failslab+0x5/0x20 [ 1961.757483] kmem_cache_alloc+0x5b/0x310 [ 1961.757922] create_object.isra.0+0x3a/0xa20 [ 1961.758401] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1961.758951] kmem_cache_alloc+0x159/0x310 [ 1961.759402] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1961.760000] idr_get_free+0x4b5/0x8f0 [ 1961.760417] idr_alloc_u32+0x170/0x2d0 [ 1961.760833] ? __fprop_inc_percpu_max+0x130/0x130 [ 1961.761363] ? lock_acquire+0x197/0x470 [ 1961.761810] ? __kernfs_new_node+0xff/0x860 [ 1961.762313] idr_alloc_cyclic+0x102/0x230 [ 1961.762786] ? idr_alloc+0x130/0x130 [ 1961.763205] ? rwlock_bug.part.0+0x90/0x90 [ 1961.763698] __kernfs_new_node+0x117/0x860 [ 1961.764176] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1961.764764] ? lock_chain_count+0x20/0x20 [ 1961.765239] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1961.765784] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1961.766394] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1961.767005] ? trace_hardirqs_on+0x5b/0x180 [ 1961.767502] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1961.768123] kernfs_create_dir_ns+0x9c/0x230 [ 1961.768631] internal_create_group+0x793/0xb30 [ 1961.769149] ? set_user_nice.part.0+0x2fd/0x760 [ 1961.769669] ? sysfs_remove_group+0x170/0x170 [ 1961.770176] ? lockdep_init_map_type+0x2c7/0x780 [ 1961.770731] ? blk_queue_flag_set+0x22/0x30 [ 1961.771377] ? __loop_update_dio+0x2d2/0x690 [ 1961.771876] loop_configure+0x954/0x1480 [ 1961.772345] lo_ioctl+0xa72/0x1760 [ 1961.772746] ? avc_has_extended_perms+0x7f1/0xf40 [ 1961.773292] ? loop_set_status_old+0x250/0x250 [ 1961.773812] ? avc_ss_reset+0x180/0x180 [ 1961.774258] ? lock_acquire+0x197/0x470 [ 1961.774723] ? find_held_lock+0x2c/0x110 [ 1961.775185] ? __lock_acquire+0xbb1/0x5b00 [ 1961.775706] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1961.776297] ? generic_block_fiemap+0x60/0x60 [ 1961.776821] ? loop_set_status_old+0x250/0x250 [ 1961.777333] blkdev_ioctl+0x291/0x710 [ 1961.777762] ? blkdev_common_ioctl+0x1870/0x1870 [ 1961.778310] ? selinux_file_ioctl+0xb6/0x270 [ 1961.778810] block_ioctl+0xf9/0x140 [ 1961.779217] ? blkdev_read_iter+0x1c0/0x1c0 [ 1961.779705] __x64_sys_ioctl+0x19a/0x210 [ 1961.780180] do_syscall_64+0x33/0x40 [ 1961.780594] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1961.781169] RIP: 0033:0x7f43d3d638d7 [ 1961.781587] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1961.783675] RSP: 002b:00007f43d12d8e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1961.784529] RAX: ffffffffffffffda RBX: 00007f43d3dad970 RCX: 00007f43d3d638d7 [ 1961.785322] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1961.786121] RBP: 0000000000000006 R08: 0000000000000000 R09: 0000000000000000 [ 1961.786934] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1961.787748] R13: 0000000000000005 R14: 0000000020001918 R15: 0000000000000001 [ 1961.954620] EXT4-fs warning (device loop5): ext4_multi_mount_protect:340: MMP startup interrupted, failing mount [ 1961.954620] 19:12:08 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x890b, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) 19:12:08 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x1fac, 0x40d5, 0x2, &(0x7f00000000c0)={[0x8000]}, 0x8) getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfa, 0x3, 0x9, 0x40, 0x0, 0x401, 0x1818, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac9, 0x0, @perf_bp={&(0x7f0000000240)}, 0x40, 0x1ff, 0x7fffffff, 0x0, 0x8264, 0x8, 0x7ff, 0x0, 0x862c, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x181201, 0x44, 0x14}, 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x4100, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000400)) 19:12:08 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfffffbff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) 19:12:08 executing program 4: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x4c, 0x0, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast1}, @FOU_ATTR_TYPE={0x5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @rand_addr=0x64010101}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x88}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x16}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0xaaaac32, &(0x7f0000000200), 0x0, &(0x7f00000000c0)=ANY=[]) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000180)={0x38, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}]}]}, 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000580)={'ip6tnl0\x00', &(0x7f0000000500)={'ip6_vti0\x00', 0x0, 0x29, 0x0, 0x5, 0xd8bab79, 0x10, @ipv4={'\x00', '\xff\xff', @local}, @private2, 0x40, 0x8, 0x1, 0x6}}) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000d80)=0x14, 0x80000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000002980)={'ip6tnl0\x00', &(0x7f0000002900)={'syztnl1\x00', 0x0, 0x29, 0x1f, 0x4, 0xffff, 0x23, @remote, @local, 0x8, 0x20, 0xfffffff9, 0x2a}}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003f80)=[{{&(0x7f0000000340)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x43}}, 0x10, &(0x7f0000000440)=[{&(0x7f0000000380)="bd83758ae759564e2e02b4945d08e3621eb7a5e6826a5b5de448ccc059af4e66b1f31d12c4aecd827bab3cc5ff3f2ee054f0265b9d6dd499562c11c98d65ac6286481c584427aa86fafdcfc999c9bc990656065e539eb20a81e46d3c1a45d511057f2b4b", 0x64}, {&(0x7f0000000400)="8a79b3cdc5a4f43fab62da44", 0xc}], 0x2, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @dev={0xac, 0x14, 0x14, 0x14}, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xffffff82}}, @ip_retopts={{0x5c, 0x0, 0x7, {[@ssrr={0x89, 0x23, 0x6d, [@private=0xa010100, @dev={0xac, 0x14, 0x14, 0x20}, @private=0xa010100, @rand_addr=0x64010102, @private=0xa010102, @empty, @dev={0xac, 0x14, 0x14, 0x2d}, @multicast1]}, @rr={0x7, 0x7, 0xe6, [@dev={0xac, 0x14, 0x14, 0x42}]}, @ssrr={0x89, 0xf, 0xe8, [@private=0xa010102, @private=0xa010101, @multicast2]}, @lsrr={0x83, 0xf, 0x80, [@loopback, @dev={0xac, 0x14, 0x14, 0x15}, @dev={0xac, 0x14, 0x14, 0x2e}]}, @noop]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_ttl={{0x14}}, @ip_retopts={{0x30, 0x0, 0x7, {[@rr={0x7, 0xf, 0x56, [@private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @local]}, @noop, @noop, @timestamp_prespec={0x44, 0xc, 0x96, 0x3, 0x8, [{@private=0xa010102, 0x20}]}]}}}], 0x118}}, {{&(0x7f0000000700)={0x2, 0x4e22, @private=0xa010100}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000740)="4b1d14fa29704d67ecf4624ed1f07a91b69b", 0x12}, {&(0x7f0000000780)="b044adb4d5247fa1bf94568b2035fdbfb9db268b1a12f6746b5b637ac513d5834678bbddf2c878fe6118c06633d4c3c16f207208a9b45add5283af385247558d1384c181b8555daa75c3ed873a87", 0x4e}], 0x2, &(0x7f0000000840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x80000001}}, @ip_retopts={{0x8c, 0x0, 0x7, {[@timestamp={0x44, 0x20, 0x9a, 0x0, 0x7, [0xff, 0xf3ce, 0xffffffe0, 0x5, 0x3, 0x3, 0x7fffffff]}, @noop, @rr={0x7, 0x23, 0xa8, [@initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @broadcast, @remote, @loopback, @multicast1, @multicast2, @loopback]}, @ssrr={0x89, 0xb, 0x10, [@remote, @remote]}, @rr={0x7, 0x1f, 0xb, [@local, @private=0xa010101, @remote, @loopback, @multicast2, @broadcast, @remote]}, @rr={0x7, 0xb, 0x86, [@multicast1, @multicast1]}]}}}, @ip_retopts={{0x40, 0x0, 0x7, {[@noop, @ssrr={0x89, 0x2b, 0x9b, [@rand_addr=0x64010102, @remote, @empty, @local, @private=0xa010101, @remote, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @rand_addr=0x64010100]}, @end]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}}}}], 0x120}}, {{&(0x7f0000000980)={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000000cc0)=[{&(0x7f00000009c0)="b6c07db5ec5a5a7b3d283557dbe8e36f2ee8bf549828390cd290899d172bc97f40c0da5a7509f2856ed73e92e8d9080c9aaee53d9bcdb741156daa9a7952c6d7f7499cd6956a186b6e0fa7802f6f8af761f9420a8a50afcb992eb97afade9d89f78e84cfff5f9905e0c8c10322a6ca2d4b312f8abeb2c2b374a624a9839b26fa533093dfc36fc52437521603e56ce0047c74cfa8e391abc66f161eff8d9a0f7b99ac82c3b671caeef5df30a1ada14b6ad60b65ffb1", 0xb5}, {&(0x7f0000000a80)="76c04550dc5615beb24ac2a11b2381c244bca2c1f43e1b3ae00bebe1554865a9207107599a", 0x25}, {&(0x7f0000000ac0)="e75235ac08ae824aa7d7bc84e01d7d092aaf3fbc6e83da0a81397b3393e8acf4d6db88b6620bd0fd2fe713d63625e8c6290576e0e0b4fdacac0c3a8074f0e20cdf7c4fab48fb770afd4d213f3813d71830846d8f2f9a889344022dc9b21ed7c8c575d57157aec32cac71d125608d274a1d6f047ac85de316cc86cf0eb404334c67816b4bb33faa8c1e1dddf1cc42332a9d7b50058755bc447ba4b6493da9f69ca81a3ab9d87fa5cabca73f9f95ff9838ca803a68eae42f0715ec45d1d73cbf8e38f1ca2714270cee6cea2781a668c23feb9de811877c85f933bc585b0c1372f08bb313dff5627ac151cdbab95d1c", 0xee}, {&(0x7f0000000bc0)="efa325932b09d8a322a58ba7", 0xc}, {&(0x7f00000017c0)="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", 0x1000}, {&(0x7f0000000c00)="e604e596735c85a8d4280125de0e6de32ccb4e18e467c7ee16a56d13af09a0b18c885d55324de5796d2e49c7a14bb787fd183faeb39c445a206eaafb83690a83ef59d0a5a9f60ae6ae93d7d19d5609a9f8e65426d404da08172e4c54dbccd3a80b515fbe7b72d9e0aebfe611e9f5985ae2c16028ccbcfe16086682297f5bae8471f098a6edac97f0f4", 0x89}], 0x6, &(0x7f0000000dc0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @local, @loopback}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}], 0x98}}, {{&(0x7f0000000e80)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x25}}, 0x10, &(0x7f0000001000)=[{&(0x7f0000000ec0)="b14337a538", 0x5}, {&(0x7f0000000f00)="cdf62341a10bee3d88f3c06c55de35561935a9827f2c5a7154f269249da3d30e6860060c4dfeb58b88a25a72cfdf36c377a310367e70b5506a304987fe2396a587e6d5dac20a3df3df65a04c567eb14bfd5c1c9bb5783fcf9de4a65bd77433d9e24b1be2bab673a1784242218927c95dfcba863c1d6f3bbd893587d93be753dbcf2a635d32496c864a595bd21ff5712f6428cd5accb0bf7b2092d27a7117404e677e703c043858e1b96d725a935f546069c4fd4c2bdac1cf2e57a09d9056f0c0f231b7ce794c5b24b965eb9f219f09960cd982b6c6515587db1739cd37d0e1c2d5ebeacab6b9dc6fc317ceecb5", 0xed}], 0x2, &(0x7f0000001040)=[@ip_retopts={{0x40, 0x0, 0x7, {[@rr={0x7, 0x23, 0xc8, [@local, @empty, @loopback, @empty, @empty, @rand_addr=0x64010101, @loopback, @dev={0xac, 0x14, 0x14, 0x12}]}, @generic={0x88, 0xd, "82eda9eb08553c24998633"}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x80}}], 0x58}}, {{&(0x7f00000010c0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000001680)=[{&(0x7f0000001100)="321a57703c4ea9743091a0ff93bc3890a37fd90b2492fe7fb0fed4ccb4e9f6eef1b839f4660fd466a45df24d9208eb52b5371d3008514e51a15d67c8f76e9ba9c2cb078e0d5fd1583f2e104570619b98a36a0506366bbf36f15173d7b6803654f90c5fa853c761b10d47c8faf9861c6b4959778956ee0203c2ca5c73e254642377f64aec2ffa0960cfe4fbbfb1936d8461499676aa1694f60bc0e5a798b000863894aa73fec7117eb2626586376770d0af94b0f9310a8f92ea01d31d3c05ef1fc6535da6f8acb3852e1a11f630d5023141736999a2ce4666f24211b9fee973ef822510833ca19588f864bac486a9", 0xee}, {&(0x7f0000001200)="8ed38a00a99d5c8f08dc8df34542ea584078a2ea194e4053f7c20ec877bbd8b754827961a8374073a7ce060444ff7036db1feef8f28822c0510ac30a3ddcb65a46976e4a80457ee9238a4cbee6fa547653daf03f70b2555eef5b1d537f11f61b92ab3e518502e18ebe9fc596db92e51fa28e9bacbd529511b35cb1ca95e5d6a1508a10f351247e", 0x87}, {&(0x7f00000012c0)="07ca966bc2c621ceab6339391ee67c81cf155b96a744011d13492bb4909cec53367c3bc8f45e9c31e9527940f8543d09522ee3095b5958891ca363f0dfd87f12240158f9434b21abf0489888ffceee392bfef573627959b2b2076171b0d25af5d2c65f2da2ced2c9595a94fffe356b8e6cdeb84f5e8ea4c51919497a183fbfb50f4c61c062e4bf5fb44dd594882645c1b9fdb65d11d60ea07f67c2b0795d99b58315cececc4b5fa60adb87bb85f39ad97328e7d0672b38de0879cd9cfd62de73", 0xc0}, {&(0x7f0000001380)="2a85a1629cd393e40678600f9f6eba69a2c704bb1e0c8a9cedd38b81226487586e43117302e88dfbfa33722fbd3281cf6b3564f9adb22eaa3c0293e580119bc084d78fda45f11fc8b8c8dc3f0f520fb5e921f9e452d6fcb18bdb7b4d45783eb00459734b902b721a83f4bfac32c49818d36c5f63a3675512b03249c815c0d364370367b800dde30514fd26a0", 0x8c}, {&(0x7f0000001440)="1dc4439dc2aa02de4b9c4aca2b621c806218eb58c346e1ad11c24095cd19a66533e48eec65497370ef8b0bbf1b13261cde3f88f33917c3e12bc72d7ba446ed77bd3270f694b890bfdc687e8af962febeecd5236434b4982c1b47df936e90e55817ff103fb4f948d822edaec70453d85c9bd6528c3cbc1baa0e5695611da3f93457a3b21375ed9c7d304095803c9d93b4fd54fb087d5e0825d8dc41cb4e8febdc4231259793ec6390c43c6d", 0xab}, {&(0x7f0000001500)="c276813fa11184e8a5a5b7ccfd549da88a4e7776de1e27498f716446a1eb678bce390a095f74d4d49147af07e9cad66b99f74fa720", 0x35}, {&(0x7f0000002ac0)="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", 0x1000}, {&(0x7f0000001540)="4f7d8e8e87aeaa8721561ea2ab265eb0a5c92aef48315458435f", 0x1a}, {&(0x7f0000001580)="e013e82cd7bebbe2dbc0e90593d32b287dab3ef576210baa6321320e67ec4303b598947ac71340f574b6f725a51d61dda246fc1c0f1bbe6a8339ed9526f6a5c8f9df29828dce9f19603659839ecc2c1542ce6d42b6cc44f3711fd51519acf41762c046ba7e314d83f78f517b592ed7c7801dacf2e7fa1a643b6336157d131d4c5c7554a43187c8346225b7c46c2f94c0b10cb6a144dac261a7f47df25ceb3fe6d725116cdd921daa3de847270733fef820fe3075f2944d898e463cfdfb1eaae56b35feffa9e9ea73b0e6a00d4241e7", 0xcf}], 0x9, &(0x7f00000027c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xfd}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_retopts={{0xac, 0x0, 0x7, {[@timestamp={0x44, 0xc, 0x82, 0x0, 0x2, [0x9, 0x5]}, @end, @cipso={0x86, 0x5a, 0x1, [{0x5, 0x6, "2232a018"}, {0x5, 0xe, "e67c6384f807d760afd5584b"}, {0x3, 0xc, "5d33a12ca912974b5608"}, {0x5, 0x4, 'ej'}, {0x2, 0xc, "0515e267a739594afe7e"}, {0x1, 0x3, "ab"}, {0x5, 0xe, "e6fe75f95c1e2b1e14d0bf07"}, {0x7, 0x10, "c70440839e88173473c5e0f27a62"}, {0x5, 0x3, "f2"}]}, @cipso={0x86, 0x31, 0x1, [{0x6, 0x8, "cc6b230f2f39"}, {0x7, 0x7, "1249932883"}, {0x5, 0xb, "0f96bef1ced2b25d9c"}, {0x7, 0x4, "139c"}, {0x0, 0xd, "fb02edcf91eee3a2dd55cb"}]}, @generic={0x94, 0x2}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x80000001}}], 0xf8}}, {{0x0, 0x0, &(0x7f00000028c0)=[{&(0x7f0000001740)="a2a18d99dbcc924afb95aada27a65c06d7821adcd9aeef070f608652b66ae070da62c55aea03524d3cc99ef14e7f7d3560bb4027f55ad5258ba7c3", 0x3b}], 0x1, &(0x7f00000029c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast1, @loopback}}}], 0x38}}, {{&(0x7f0000002a00)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000003b40)=[{&(0x7f0000003ac0)="acaa2f733e76090b2cbde9dbe388b369e2fc336c85834688bc7c9103e2f8cae054005f6c77ab683bbd7d113927f97f388950e3aa20c66db47b9d9645da1dca46436b465a67366523", 0x48}, {&(0x7f0000002a40)="01ee", 0x2}], 0x2, &(0x7f0000003b80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x200}}], 0x18}}, {{&(0x7f0000003bc0)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000003d80)=[{&(0x7f0000003c00)="04387ab0156b6103e0e1ed002f5eb7c7a9fe2dfa68a80158e621fc33a7fe9df1f76867a911a1e034389bbdc76e36c091222576b03904f69f47b7cf9375a3781ae130008d4021", 0x46}, {&(0x7f0000003c80)="b8e1b96aa1853acab876d721bfdc36c18ef2c36fd146b93435de4e3078e1b175db3e799266e6497332725ba25387171df4f4a69b499d89963173d8f5210389602004f49e23e0fefbc1d5ac156238ff5ec0860ac07b2c5e8e12d6ac97c10789028768d6e51f38c5372ddfb6dde3e2732150780258f227ff801f743c37b3ca4b60c9bd472ec083780cee6bc2543a32946e18f92526ad655bf83f392a85cdfb161a2990d42f99398609be89773aff8296226315859d054ce4d27e6a4a03f1f970d1474e8f22a18d6da4a107571315afca72f47e9b9b80e30308acfa2fe73839ef3b89fe52ff3f1f7d90cecce6c397", 0xed}], 0x2}}, {{&(0x7f0000003dc0)={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f0000003f00)=[{&(0x7f0000003e00)="3191b2653e4fcb1e76e80882a71dfb2c80f5c84240bd58ef1a3a93d89d7ca9df880ecabb626020c6366a95998f576d3b879b67e53dce82421288c91c165a48eee01701f4cdc869cf22820a909339d910206b08e1f2083698f0423f063f1deaf9f2c8c2351fd997fb9e60c3af3b48506664f720c6e5cee495df474066c120491131b14ddcac0de0fb3fb6e8ed2e29c9944846191deeca024fcccf8268917fd29c91c270fe4c6f5a108a6b7db03390fab900f50d1987997b35b976430dbdc2bcff282546", 0xc3}], 0x1, &(0x7f0000003f40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3e8}}], 0x18}}], 0x9, 0x4000000) chdir(&(0x7f0000000040)='./file0\x00') r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002a80)='/proc/asound/seq/clients\x00', 0x0, 0x0) fcntl$lock(r6, 0x0, 0x0) r7 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r6, 0xc018937a, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100ee0018000000", @ANYRES32=r7, @ANYBLOB='0\x00']) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f00000000c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0xabd, 0x1, 0x3, 0x8, 0x7f, 0xf6d1}, 0x20) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chroot(&(0x7f0000001780)='./file0\x00') creat(&(0x7f0000000080)='./file0\x00', 0x0) 19:12:08 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)) fcntl$setstatus(r1, 0x4, 0x6c00) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:12:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 27) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:12:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000011600)='PMM\x00PM', 0x6, 0x6000}], 0x0, &(0x7f0000013c00)) 19:12:08 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1977.210192] FAULT_INJECTION: forcing a failure. [ 1977.210192] name failslab, interval 1, probability 0, space 0, times 0 [ 1977.212760] CPU: 0 PID: 11947 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1977.214149] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1977.215853] Call Trace: [ 1977.216415] dump_stack+0x107/0x167 [ 1977.217171] should_fail.cold+0x5/0xa [ 1977.217966] ? __kernfs_new_node+0xd4/0x860 [ 1977.218839] should_failslab+0x5/0x20 [ 1977.219616] kmem_cache_alloc+0x5b/0x310 [ 1977.220453] __kernfs_new_node+0xd4/0x860 [ 1977.221325] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1977.222320] ? lock_downgrade+0x6d0/0x6d0 [ 1977.223172] ? mutex_lock_io_nested+0xf30/0xf30 [ 1977.224148] ? __kernfs_new_node+0x549/0x860 [ 1977.225062] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1977.226093] kernfs_new_node+0x93/0x120 [ 1977.226917] __kernfs_create_file+0x51/0x350 [ 1977.227820] sysfs_add_file_mode_ns+0x221/0x560 [ 1977.228780] internal_create_group+0x324/0xb30 [ 1977.229744] ? sysfs_remove_group+0x170/0x170 [ 1977.230697] ? lockdep_init_map_type+0x2c7/0x780 [ 1977.231686] ? blk_queue_flag_set+0x22/0x30 [ 1977.232582] ? __loop_update_dio+0x2d2/0x690 [ 1977.233520] loop_configure+0x954/0x1480 19:12:08 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1977.234373] lo_ioctl+0xa72/0x1760 [ 1977.235233] ? avc_has_extended_perms+0x7f1/0xf40 [ 1977.236315] ? loop_set_status_old+0x250/0x250 [ 1977.237255] ? avc_ss_reset+0x180/0x180 [ 1977.238092] ? lock_acquire+0x197/0x470 [ 1977.238919] ? find_held_lock+0x2c/0x110 [ 1977.239790] ? __lock_acquire+0xbb1/0x5b00 [ 1977.240705] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1977.241801] ? generic_block_fiemap+0x60/0x60 [ 1977.242732] ? loop_set_status_old+0x250/0x250 [ 1977.243672] blkdev_ioctl+0x291/0x710 [ 1977.244452] ? blkdev_common_ioctl+0x1870/0x1870 [ 1977.245469] ? selinux_file_ioctl+0xb6/0x270 [ 1977.246371] block_ioctl+0xf9/0x140 [ 1977.247143] ? blkdev_read_iter+0x1c0/0x1c0 [ 1977.248016] __x64_sys_ioctl+0x19a/0x210 [ 1977.248864] do_syscall_64+0x33/0x40 [ 1977.249622] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1977.250686] RIP: 0033:0x7f43d3d638d7 [ 1977.251441] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1977.255277] RSP: 002b:00007f43d12d8e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1977.256812] RAX: ffffffffffffffda RBX: 00007f43d3dad970 RCX: 00007f43d3d638d7 [ 1977.258318] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1977.259835] RBP: 0000000000000006 R08: 0000000000000000 R09: 0000000000000000 [ 1977.261354] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1977.262882] R13: 0000000000000005 R14: 0000000020001918 R15: 0000000000000001 [ 1977.305416] device syz_tun entered promiscuous mode [ 1977.327413] device syz_tun left promiscuous mode [ 1977.337409] device syz_tun entered promiscuous mode [ 1977.349155] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 1977.354171] device syz_tun left promiscuous mode 19:12:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 28) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:12:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x890c, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) [ 1977.471139] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 19:12:09 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdf9, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) [ 1977.570231] FAULT_INJECTION: forcing a failure. [ 1977.570231] name failslab, interval 1, probability 0, space 0, times 0 [ 1977.572844] CPU: 1 PID: 11968 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1977.574281] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1977.576030] Call Trace: [ 1977.576599] dump_stack+0x107/0x167 [ 1977.577353] should_fail.cold+0x5/0xa [ 1977.578147] ? create_object.isra.0+0x3a/0xa20 [ 1977.579136] should_failslab+0x5/0x20 [ 1977.579934] kmem_cache_alloc+0x5b/0x310 [ 1977.580774] create_object.isra.0+0x3a/0xa20 [ 1977.581685] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1977.582747] kmem_cache_alloc+0x159/0x310 [ 1977.583625] __kernfs_new_node+0xd4/0x860 [ 1977.584484] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1977.585476] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1977.586486] ? wait_for_completion_io+0x270/0x270 [ 1977.587486] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 1977.588597] kernfs_new_node+0x93/0x120 [ 1977.589430] __kernfs_create_file+0x51/0x350 [ 1977.590346] sysfs_add_file_mode_ns+0x221/0x560 [ 1977.591339] internal_create_group+0x324/0xb30 [ 1977.592288] ? sysfs_remove_group+0x170/0x170 [ 1977.593235] ? lockdep_init_map_type+0x2c7/0x780 [ 1977.594214] ? blk_queue_flag_set+0x22/0x30 [ 1977.595109] ? __loop_update_dio+0x2d2/0x690 [ 1977.596033] loop_configure+0x954/0x1480 [ 1977.596897] lo_ioctl+0xa72/0x1760 [ 1977.597651] ? avc_has_extended_perms+0x7f1/0xf40 [ 1977.598674] ? loop_set_status_old+0x250/0x250 [ 1977.599621] ? avc_ss_reset+0x180/0x180 [ 1977.600437] ? lock_acquire+0x197/0x470 [ 1977.601272] ? find_held_lock+0x2c/0x110 [ 1977.602125] ? __lock_acquire+0xbb1/0x5b00 [ 1977.603146] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1977.604354] ? generic_block_fiemap+0x60/0x60 [ 1977.605296] ? loop_set_status_old+0x250/0x250 [ 1977.606259] blkdev_ioctl+0x291/0x710 [ 1977.607071] ? blkdev_common_ioctl+0x1870/0x1870 [ 1977.608057] ? selinux_file_ioctl+0xb6/0x270 [ 1977.609017] block_ioctl+0xf9/0x140 [ 1977.609837] ? blkdev_read_iter+0x1c0/0x1c0 [ 1977.610837] __x64_sys_ioctl+0x19a/0x210 [ 1977.611681] do_syscall_64+0x33/0x40 [ 1977.612437] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1977.613481] RIP: 0033:0x7f43d3d638d7 [ 1977.614259] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1977.618244] RSP: 002b:00007f43d12d8e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1977.619824] RAX: ffffffffffffffda RBX: 00007f43d3dad970 RCX: 00007f43d3d638d7 [ 1977.621285] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1977.622959] RBP: 0000000000000006 R08: 0000000000000000 R09: 0000000000000000 [ 1977.624446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1977.625919] R13: 0000000000000005 R14: 0000000020001918 R15: 0000000000000001 19:12:09 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x44, 0xce, 0x6, 0x0, 0x9, 0x2200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff2, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x68, 0x1, 0x2f, 0x7, 0x7, 0x1, 0x657, 0x0, 0x12ea400, 0x0, 0xfffffffffffffff9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x1, 0x4, 0x5, 0x8001, 0x26df, 0x3}, {0x7, 0x498, 0x6, 0x2, 0xfff, 0x6}], ['\x00', '\x00', '\x00']}) socket$inet_udp(0x2, 0x2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x2, 0x5545, 0x0) [ 1977.684066] device syz_tun entered promiscuous mode [ 1977.702201] device syz_tun left promiscuous mode [ 1977.718393] device syz_tun entered promiscuous mode [ 1977.730188] device syz_tun left promiscuous mode 19:12:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) (fail_nth: 29) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xfd, 0x6, 0x4, 0xe9, 0x0, 0x40, 0x20100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_bp, 0xa, 0x3, 0x80000001, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 19:12:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x9, 0x1ab, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8, 0x9, 0xff}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r3, 0x3, 0x6}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8916, &(0x7f0000000140)={@local, 0x78, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r0, r4) [ 1977.830393] FAULT_INJECTION: forcing a failure. [ 1977.830393] name failslab, interval 1, probability 0, space 0, times 0 [ 1977.833263] CPU: 1 PID: 11979 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 1977.834814] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1977.836945] Call Trace: [ 1977.837639] dump_stack+0x107/0x167 [ 1977.838536] should_fail.cold+0x5/0xa [ 1977.839338] ? __kernfs_new_node+0xd4/0x860 [ 1977.840241] should_failslab+0x5/0x20 [ 1977.841032] kmem_cache_alloc+0x5b/0x310 [ 1977.841885] __kernfs_new_node+0xd4/0x860 [ 1977.842768] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1977.843764] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1977.844767] ? wait_for_completion_io+0x270/0x270 [ 1977.845769] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 1977.846894] kernfs_new_node+0x93/0x120 [ 1977.847733] __kernfs_create_file+0x51/0x350 [ 1977.848647] sysfs_add_file_mode_ns+0x221/0x560 [ 1977.849622] internal_create_group+0x324/0xb30 [ 1977.850595] ? sysfs_remove_group+0x170/0x170 [ 1977.851539] ? lockdep_init_map_type+0x2c7/0x780 [ 1977.852517] ? blk_queue_flag_set+0x22/0x30 [ 1977.853404] ? __loop_update_dio+0x2d2/0x690 [ 1977.854326] loop_configure+0x954/0x1480 [ 1977.855206] lo_ioctl+0xa72/0x1760 [ 1977.855981] ? avc_has_extended_perms+0x7f1/0xf40 [ 1977.856987] ? loop_set_status_old+0x250/0x250 [ 1977.857932] ? avc_ss_reset+0x180/0x180 [ 1977.858768] ? lock_acquire+0x197/0x470 [ 1977.859581] ? find_held_lock+0x2c/0x110 [ 1977.860438] ? __lock_acquire+0xbb1/0x5b00 [ 1977.861355] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1977.862426] ? generic_block_fiemap+0x60/0x60 [ 1977.863372] ? loop_set_status_old+0x250/0x250 [ 1977.864321] blkdev_ioctl+0x291/0x710 [ 1977.865107] ? blkdev_common_ioctl+0x1870/0x1870 [ 1977.866086] ? selinux_file_ioctl+0xb6/0x270 [ 1977.867020] block_ioctl+0xf9/0x140 [ 1977.867785] ? blkdev_read_iter+0x1c0/0x1c0 [ 1977.868682] __x64_sys_ioctl+0x19a/0x210 [ 1977.869517] do_syscall_64+0x33/0x40 [ 1977.870292] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1977.871361] RIP: 0033:0x7f43d3d638d7 [ 1977.872144] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1977.875936] RSP: 002b:00007f43d12d8e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1977.877511] RAX: ffffffffffffffda RBX: 00007f43d3dad970 RCX: 00007f43d3d638d7 [ 1977.878998] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1977.880466] RBP: 0000000000000006 R08: 0000000000000000 R09: 0000000000000000 [ 1977.881931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1977.883408] R13: 0000000000000005 R14: 0000000020001918 R15: 0000000000000001 [ 1978.108756] EXT4-fs warning (device loop5): ext4_multi_mount_protect:340: MMP startup interrupted, failing mount [ 1978.108756] [ 1978.154450] device syz_tun entered promiscuous mode [ 1978.183838] device syz_tun left promiscuous mode [ 1978.194727] device syz_tun entered promiscuous mode [ 1978.219144] device syz_tun left promiscuous mode [ 2059.599948] Bluetooth: hci7: command 0x0406 tx timeout VM DIAGNOSIS: 19:17:15 Registers: info registers vcpu 0 RAX=ffffffff83e5e480 RBX=0000000000000000 RCX=ffffffff83e4653c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e5ea88 RBP=fffffbfff09c6450 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85672788 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e5e48e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe5800000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fcd9565ad78 CR3=0000000017d12000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000006000000040000000000000000 XMM02=006e65672063657865080a0100010101 XMM03=636578650e007a7a7566206365786509 XMM04=636578650b006574616469646e616320 XMM05=6f7420636578650a0065676169727420 XMM06=657220726f74756365786511006c6174 XMM07=6e696d20636578650d00737472617473 XMM08=007a7a7566206365786509006e656720 XMM09=006574616469646e616320636578650e XMM10=78650a0065676169727420636578650b XMM11=74756365786511006c61746f74206365 XMM12=6578650d00737472617473657220726f XMM13=636578650a00657a696d696e696d2063 XMM14=6e696820636578650a006873616d7320 XMM15=0000736465657320636578650a007374 info registers vcpu 1 RAX=ffffffff83e5e480 RBX=0000000000000001 RCX=ffffffff83e4653c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e5ea88 RBP=ffffed100112f000 RSP=ffff888008987e70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85672788 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e5e48e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe6900000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f6c1e92a430 CR3=0000000017d12000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000004161e76500000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000