0000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="75707065726469723d2e99ce696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531f926d412d152f20bc4a03bb73d29271b104dee63921afd234ffdcce447ae611d6040992cee7931af00c151fd72a731000000000000000000"]) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 15:14:41 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) write$P9_RAUTH(r0, &(0x7f0000000140)={0x14, 0x67, 0x1, {0x1a, 0x3, 0x6}}, 0x14) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) r1 = fcntl$getown(r0, 0x9) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) r4 = fcntl$getown(r0, 0x9) r5 = geteuid() stat(&(0x7f0000000840)='./file1\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000940)={0x0, r0, 0x0, 0x2, &(0x7f0000000900)='+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000980)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000a80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, &(0x7f0000000b00)=0xc) r10 = getpid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000b40)={0x0, 0x0}, &(0x7f0000000b80)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, &(0x7f0000000c00)=0xc) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000f80)=0x0) fstat(r0, &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0}) r15 = getegid() r16 = getpgid(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001400)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000001500)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0, 0x0}, &(0x7f0000001580)=0xc) r19 = getpgid(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000017c0)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f00000018c0)=0xe8) getresgid(&(0x7f0000001900)=0x0, &(0x7f0000001940), &(0x7f0000001980)) fcntl$getownex(r0, 0x10, &(0x7f0000002cc0)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002e00)=0xe8) getgroups(0x1, &(0x7f0000002e40)=[0x0]) fcntl$getownex(r0, 0x10, &(0x7f0000002e80)={0x0, 0x0}) r26 = getuid() stat(&(0x7f0000002ec0)='./file1\x00', &(0x7f0000002f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r28 = fcntl$getown(r0, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002f80)={{{@in=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, &(0x7f0000003080)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000030c0)={0x0, 0x0, 0x0}, &(0x7f0000003100)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000003140)={0x0}, &(0x7f0000003180)=0xc) r32 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000031c0)={0x0, 0x0, 0x0}, &(0x7f0000003200)=0xc) r34 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000003240)={0x0, 0x0}, &(0x7f0000003280)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000032c0)={0x0, 0x0, 0x0}, &(0x7f0000003300)=0xc) r37 = getpgid(0xffffffffffffffff) r38 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000039c0)={0x0, 0x0, 0x0}, &(0x7f0000003a00)=0xc) r40 = getpid() r41 = getuid() lstat(&(0x7f0000003a40)='./file1\x00', &(0x7f0000003a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r43 = fcntl$getown(r0, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000003b00)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000003c00)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000003c40)={0x0, 0x0, 0x0}, &(0x7f0000003c80)=0xc) r46 = socket(0x7, 0x80000, 0x40) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000003cc0)=0x0) getresuid(&(0x7f0000003d00), &(0x7f0000003d40)=0x0, &(0x7f0000003d80)) stat(&(0x7f0000003dc0)='./file1\x00', &(0x7f0000003e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000040c0)={0x0, 0xffffffffffffffff, 0x0, 0xf, &(0x7f0000004080)='\\+vmnet0]ppp1{\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000004100)='./file0\x00', &(0x7f0000004140)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000041c0)='./file1/file0\x00', &(0x7f0000004200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f0000004280)={0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000042c0)={0x0, 0x0}, &(0x7f0000004300)=0xc) r55 = getgid() r56 = getpgrp(0x0) getresuid(&(0x7f0000004340), &(0x7f0000004380), &(0x7f00000043c0)=0x0) r58 = getegid() sendmmsg$unix(r0, &(0x7f00000088c0)=[{&(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000200)="b7787480b7bc9c9eed4d61ba0d5fece0e4fcc2d48f1d699edd719f5e747f26f7fd0927a719675d61f404fa67dc27b6602f280a8b733a15b1ca66e93182529adcfd3c2296a6ac31e889bba81ade6ff19b3e39dc", 0x53}, {&(0x7f0000000280)="38708f4f16e9f510ddd9531fd36756a1bda3e532f259aca67190a80bde123e45e6414efb3253ec53c5a0b8a8af7fd721c68da4e4a68a2665ec75caf46e68001c2e143495c52567ca54dbb80ff34ff9", 0x4f}, {&(0x7f0000000300)="05922b5046732dc5723fc909061adfc42fa1b17a3d35dcfcdf97f1ef615799eb5d29a72ce915b70e17df4930e7092636871cfd142339f04560d332d6624b8b0368663c3cc16ce1f975808fe49163d968b3dff7efcb6170a1ed20897f1ed9efc2c2fa1e145a49b10a485119c79795a1844a226393789b10c18a3fdb611f87d879af8a2674d92269cb26ad94d1085ea217f554dffc770f976c0a97b89a2637c2b8a9e0642815ec1092c1be125cda5c2bdc5d", 0xb1}, {&(0x7f0000000400)="fbb109e8ced10d9bfe3366d60c66272fc72f77092912cb9c67635e7fe0fcf404768830cbfe10bd5d287dabe9b9eae839de1a34bb05cfccf723bd0741a7e423d831f33f754aa7b9f2e5dafcbe52256b6b153a24f9557d7466576a277b81d5", 0x5e}, {&(0x7f0000000500)="43c4d0e23af03adb51b83aa5de0e0cc716730b94eedf227419a844e5f0d67c2e9efc5eadb5275c68484b9cdc8814897f3fc22cdfc2c6958d74afbbf6c1299b2ad47e8aac8198bb7865b908f00335236c69c1941c730a17e9d1cd14cf3aaa85d10b3fc0b082b17708cea9f75e1ca978d7517fef0a6d9c77835c4e91dd619407835ab32b01b4794233fe92cde7fcbc5d5f12cc06b5d0f5f344d938fcdd0b765749793fc70b363fc91876fa182abf4a49bee892", 0xb2}], 0x5, &(0x7f0000000c40)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}], 0xe8, 0x4040084}, {&(0x7f0000000d80)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000f40)=[{&(0x7f0000000e00)="5c31ccb2c796dfc23c43fec20e60b7f81a9e56", 0x13}, {&(0x7f0000000e40)="28ab91990aa50c6745acdeec88bfd0b4ba273f4f13cc339bfaf6fb20d0a1fb83881924fdd65fb9fb453b8e52c3e4cfa91c2dc0f2c52491e181ce6e209ebe18b94d22a722c243a6dcbaa863d7dbe0c399f3f7ac", 0x53}, {&(0x7f0000000ec0)="5af6d856b3ca31569c0bb9f0098340cecf32032139aefab3520c5d4fbcc285cea8f457f23598d690f4fc3c8be4c54c2e6693ee09a277a52b7aefd17d991e76ac2bab4bf11d1211159348bbfc803a91744b7d4e314d64acef21905e6e0c0d03027656afa59d0dc2b5", 0x68}], 0x3, &(0x7f0000001040)=[@rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r13, r14, r15}], 0x88, 0x20008090}, {&(0x7f0000001100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000013c0)=[{&(0x7f0000001180)="2af2ef00aa444c12705f155749e20259f28165d12d315638e49a476b34a081f1dce0bb330bca9b06a409b15a61e407291563beb48ac93776227222bfe26276a3f87243ba029ce955c1d673c4b665c137eeadca4fc3ed9fe69ca056d3e4cd0b14aa966317ef2fd39cb7c9e85cc26c826de24640f1eff5597bed9fec3c04b7d146c4b76a0f8d45c9ca11f3ba17c96d73a4d313dae3da18cab6b4dba2faee0d879e8a0dc53fe262f2dee61adb7a9d304fadd07e9f3f85f5a74e214e026318b5fe8ab5c8f1e699dd7b417d", 0xc9}, {&(0x7f0000001280)}, {&(0x7f00000012c0)="0fe9883f043d79e831298294c7a8fab30dd340f9083dfdc273122b63f02e9710d5b0455f3ae22aeecfb33e4cff8267a33a8526ef304ab449baa9992817788a92c521c4e4b87735e2226a9a48bff9c7555ba2572290de909dc5bba1c585e39b331d79f6365a2dbd631c36a93bc4b692b1b9f0ab4381f1cec8fa85822a1bd981b9eb084c9aef4b9ba78f62291b20a2a3ed8007a368f18e13006c1a379b4dcf049eac102d1f7d3bed053356b20e23eb1430673d8c636eb1e1ba7d0ccf21baaa2455905e7d048db6af070d70eead627ba04954686c07d28f7cdb3311aab3f9aeb93ede3a96c6b549", 0xe6}], 0x3, &(0x7f00000015c0)=[@rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r16, r17, r18}], 0x38, 0x4}, {&(0x7f0000001600)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000001780)=[{&(0x7f0000001680)="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", 0xfb}], 0x1, &(0x7f0000008a80)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r19, @ANYRES32=r20, @ANYRES32=r21, @ANYBLOB="00000000180000000000000001005631a8a0394cc6b5e0fde311b3cd0000010000005ebd07d41d4c91630a", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="38000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="20000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00'], 0xd0, 0x20004001}, {&(0x7f0000001ac0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002c80)=[{&(0x7f0000001b40)="99537d49d59666512dcf556ba7c2b0c37916bb18b238367a2b58ff9e3723fd5325c1aa0886cce8866c216e6f71c3268ee8aaf32a5478cbc202b9ab2ef00e7d31bb00e4dc5f1a4a6885d60cd09b9c9184a2d13067f3ff045407b5bddfdc6a244adebf9b7eaf6fb54d9d6567de", 0x6c}, {&(0x7f0000001bc0)="e9a3ea50590c98ba60f5999df799acae80ac9fd1d038369dfcce02", 0x1b}, {&(0x7f0000001c00)="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", 0x1000}, {&(0x7f0000002c00)="74922f774abca35cc2b08640d77b58a744254637ad8c9fc5b3d3e6ac02bcd3b7d0e21b9caaa517d895538b4937a92cd3358a0f1114a78d849e0d36b2ad92b54a14779be07af30f9e246f9afb39262fa16ad637cb70c88ea6adfcbac4cac4e3", 0x5f}], 0x4, &(0x7f0000003340)=[@rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r22, r23, r24}, @cred={0x20, 0x1, 0x2, r25, r26, r27}, @cred={0x20, 0x1, 0x2, r28, r29, r30}, @cred={0x20, 0x1, 0x2, r31, r32, r33}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r34, r35, r36}, @rights={0x18, 0x1, 0x1, [r0, r0]}], 0x140, 0x8000}, {&(0x7f0000003480)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000003940)=[{&(0x7f0000003500)="134b79ce2ff16505de87c5c6ddf7cc828fc5552780e20c2462f5198aabaa", 0x1e}, {&(0x7f0000003540)="5823d5fe5fdc63890748f3ff4aa6cbcb66e24742e103d14f093acf80cb383fc62dd9b2a9d60c93b27dcb86ffd9c8712b663487dd2cda97938adacae3589fee2c4aec161c1693a087933a6ceadd7d0bbfb0abc0f9fc294fb211cc1b74d702b3720e6c895d4358e131baf541358e660c31d15eafce6442a2b78196c3ed0e224fcf60efff430945", 0x86}, {&(0x7f0000003600)="ad27fc0c2f5320d7311df95a6156aab3b01786488f252e162d769c9c21de59b8529dd793b139c9cf5b31667143c011898a1fe71f5536fa4ae0fea128e6d2d5df75fce68418e894d5a01aeea52f8dd6f33b77b94b9eef971d316e0d188e3313346fdf5542843126654a075fc66c8bd81d7f450fecadd690e15042583d50", 0x7d}, {&(0x7f0000003680)="3855e91f3db17ed115c732c01062a46182a09b4370ec0279f3820cf5b5ea7e51c60d8650ae53dc70d3f08a3e2a97dde927f75a3464d7823f0ec20b7c3a1149401d8f14f8d03acfa73dfbb440852e9bc1b9690e54b4b5d62f793a66a7f9e3137dd5b09314623ea94768192d260db557837fa4fef533e81a19c8eff9039a07407e865e1a993cb154e68ed15a32493024d396a8feb862f03fcd1ca3a5be2d9d8042e22ef57423c53caf6048bad99f3e0945c95ce13ed89c1c453949a402b3e871a75c2caa54e2bba63d3adb73b4a3abdaa6056657f4aefdadf5994900cf7e58e73bea57945610c860", 0xe7}, {&(0x7f0000003780)="eb22a5543d75a3998f2b80a25bf3e6a149cad38b22bbebab3ff26657e344961da9157c4a4c45b261d71be8ee2efe3dcbb9eb09d65265f98e2feb77e9", 0x3c}, {&(0x7f00000037c0)="1b0f77e1d32eb0cb7e3dba6fc19f553e02e1f043081fa3af04ef26b6f39cd8678ea418a19c0662cac83a95ff5793f27d3b5b90a40f35e3b4b8b4b4207f1bb976bb1b6a7949ec4e4d567ccb53286c82f911f03abac03322097e7ec6675f4e4ea1a51cd39b2d921b496ab7b98768fb41", 0x6f}, {&(0x7f0000003840)="edd2d1c35e4080867cc421a1eb8e16a0ce0ee0ae4c5d5606f82895d4a939be8b13bbd1f8ff86feea474b0a6e7bf408aee6a46a6a086b4a3acda3b21b953d7de4b92d7d2887ce01738748cfd5de1292a36226280c975270a0247c3fde8daef0d90c01ff0c8f137a2c40654972b7244c128c8ae415addad3cb942961a1c44237458fe8522ac24298e6f0047dc4ce192c71e878e0ca8ddcb2d9cdda0f07e7287d339daaf4079d9021c0c2eb9527e95c9ec84d7c1c259ee9bff09cfc46d5ed1abfccf4a7bc843fb7b4e777477e28a8baaffc6cf34871b88450fb25a123f80f3b83b0d054f79ab25bd4a7", 0xe8}], 0x7, &(0x7f0000003e80)=[@cred={0x20, 0x1, 0x2, r37, r38, r39}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r40, r41, r42}, @cred={0x20, 0x1, 0x2, r43, r44, r45}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r46, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r47, r48, r49}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}], 0x100, 0x1}, {&(0x7f0000003f80)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000004040)=[{&(0x7f0000004000)="b4e57009ea963a465b24149fd9f2e86aaa36204d416446890d8ba5", 0x1b}], 0x1, &(0x7f0000004400)=[@cred={0x20, 0x1, 0x2, r50, r51, r52}, @cred={0x20, 0x1, 0x2, r53, r54, r55}, @cred={0x20, 0x1, 0x2, r56, r57, r58}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}], 0x88, 0x4000}, {&(0x7f00000044c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000008800)=[{&(0x7f0000004540)}, {&(0x7f0000004580)="406bdf7a3895544f8582ffadaf913fb6487ef619732b08218660b2adf3", 0x1d}, {&(0x7f00000045c0)="400e59be6228fd617b8549430acad5d63c050f4cfd84b4aeaff330e004f7bd1452ca606b65dc58836f1966644ac7319c22d565c28f85f0bb7c22174df86d258595852a74c8f44cfd20a0d8ff787d256360b28bd7fdae5a9d32f380ef4cb3e415bddbb995a4cda45054be9c6ab645cf887fd44d2a449591e45d13e60dd48a1d20811682153e06e55de9a686ab203988f25b79ac13a8e1750ba2f1b04990241950a687b0ac28ddc5b8aa6d7f772bffed5f5c3ae00730033c710535d9ef09d69831a1a417b25c904b8612b32f7d50cc7f81a3dcef29e3c65b9ecd733603564fc2aa04e9461cdcc672fedda78be430ab8fbfa534c2efb4754640bea1f0932a77e014f17a1a47349820c7bb38821032f0b8b03378e036fa258fe1fa43979ebbae4fcaf46c6b33826772c1f79ed91ad26b7da08bd1c2f915cc7308b15a6bb8237a93ec719a5d03b4113d418d7bc8813bbdb60b497f3e19b39e5d16756bab1cd56472df683e341b83fe77a963a8f00c6226380bc30dab5870438490399081959adfdf5d1e6c85c0885caf8dd39e7301c2b9fb260b1751c971621b8537db8ef0565659d533c0bf35213387dea77b90895ada4ccba89a683b1833a29b01e96282adcd8ebd2fc2af5d6ca478d777487c875a4f8ad3a4b0fbf51a86dc4617b635d8e482660e978f9a7401261ad031f165715cb5584d13db240921c87b37c1d093d31da891822184bc0c7c290e88d03cf242db5ff4e308aac76f0f09da7f009ed6f2bc0c69756fc41b340c49d83080533fccfcb2d09a2672eb20f95eee35686d1fda4c2f89bd0c6b4cfb8f6a1cf98ab1071b4a6331dc6a68b4d02fbd33c3a13f29bc498089f71aa23da141b100d89bbfaeb6e7ab3aaee5788a319f38ad279d9489f5041f3b8ad523781034c8c6f4aaa0f4cc5ccc7c0133832e144579172bafebec6b6fe73f90ac358c19bebe5f3c260fda076e7cb9ba88bf97bde37bd1bad2276bdd3c3eef0aa7612f0d09bd84f65a9d5419c77d550d917dedf4f3fe88d5ea5e56501177700be927c639fc00e4c5ed9e6255116c74c18744a343557731bcc1e23bf5957606ffd5c4874ce7e78025a54147bfd20b07edbc028bed0fb89b14beaa2cfb1873909587205d24005b8fec322f1c27bf3c8e0d515eedfffb67e7a6a3b756951cbf5cd5836d8ec8e66b5ccbdcf4524f85dcee2ff2ce5b0071d5aada9a7a4432932a77225685b0e8694f85effc24505bac0130bd6ffad838c6d093fa1c335d6a6436752f1b50ac0d9912f9a4c576ae5c6081bfc75c981d8edda8d0784e15591747f0b8ed9c9086e32582bba5a7786c282925f2880feb4e3fb81bd4d5a7d12cb06be05c22f9bcda1bbc5b253562c234cd047449b21752b99f518d4dbe86db32eef8a7da737a163d7650a28c5c735e60180a0c9e7b233af1379b17851ba17c8eb9ac6a42a7824779c477dd55d938526b95cfe241ae993effa0808983810f07c4f58c60c837b06c60f891878f135c3b31864ba2463546821677aadca2a7a3680701a9254a269decd2ee25153819970928b34b740d70b1a777b09062a31e9b6fc76ff7165f10b3afdad729805e7b178cbc1f92870d80cd1ef4c0f244ce858dd2170d681676a0818b2fe5819e00144e5b005a1d35d09ca10771a56b88476212e550fa8bea3ecc33a894acf8faa15b295631a37a78cd23565161b5a059465de4d034b6a8b31d0c2a4d8c8ff1b8f470945688135ca68f419b83ee7a546982c2c9ecb838ec3fff1fd69063ee681881f85f7ba88fba74a80df6a92b83ef67ce3b485fcacfff499c4ab1af54b0f6fb53ab2a7c83fd356624ca671a055d4049972701a32fa7d4bfede90fc84b095d0480dd1f63208b72e16e5ab49e6053f61a5d7a71b28c42febbae2f5d0cbc13778ea18f4505bd196e1de7d26a402f286657d2f9fbd2febe295174e23438f45e9710884860e32e9a7bff041c133f9cea8fc5941d264388d592231d95a12a42f41b823101b5aaf9d64af624c7ff6f8b2a4d6844a4cba5f11c19790a530930cf5711c85324566435d6d77919319b8ea90581a3d53cd56d88c4cef29b23a8063acb0526484281352ce1b7d9718c070385526084b310a3f1c1ec49d1d6aa914790888d4e0e4839774818baac075bb8f31e40963990cf0eb893ef7f7262459e7d8c5106aa0c75b4b587f4f5f2d2ac35ffef0ccccad0fb7d562cefdd91881d874235c1b9657efaea3570341c1e72043cc9679c96abc307b8525219324d54e971f214b1f58377d0d8d1cb964f9c37d16a4f44582afda9430bd4be6a83b0c5691ae405a606bb310a4c6768cea16bff0d2034d975e81a92975024d9bafb4436b58973382d721fd8f15857c9d378d8596317b7a2edd1bd29d469bcaba2fc941dc1b3d15eb1408581dcadf3593c9126eabbfb80e05fb9b4e7ef931ed42ced378acde07665d385e01fecc9928c1b4bdb7268429dc62c0fd4abd615984294f82e7af31836e806f06098026ca34cde211a6d78b103edfc10d5b0202e8a72d303f8783a044c9f163b3894b9253f5b0e674c96b89700332daa4c07f145e96b30a812fffdf9c18fe0c5c03b6452056a89966dd224a176bc8a2a3b2848e7a26e5d731b3d48949fb7d0b418a3228260e10d8edb5a4b929d750419c4bebf30a3a1cbe0ebe7e880beff3a537ea8d4bf8fd1f4d0a87b2c831f4245ef9ee332ae7b0f3c8e8e550fd56c3d367968f7b2fb71b04b9c699eea53eac62f48cf9949a3e499c78f2708b670d4ca197b734d6fda26d519c0e3678702e3fac408127e7daeacb2838e05091ff4efdf786f41fc47d3c2b84f2cf2539d0c7c60f5981afd452f51681e3e687113938492e2af40d560800e6f8c8b1cf67963a361356f350564a75dc065582c6e77a8815afec564f9078463614a4d1c2914c8ae5221b910746a26ae032a0003703ebfd1cb3953f28f882771ca230a199f07007f14ef6579d0de5613f1b45a6c18646c32fe4ad9388462c02fbb28097b77f63bb2e04e0945e7b2da15506180f121f9c91fee7bae26397374b89896bdb3981ce86fcbcb05237a252bec7eaf8559c6026eb9e0fbaa6e98ce681faf2b5a009391d83d08d4e13d6fb0044e8ae398f05210dc689bbcb2bfa0721a6f7be864c6f87205b42cf51725b65844999159ca854c816c078a0180391dcae4177a53ee8d122954cd64c79202d94d6cac7db39462a7dc1044aad314700b569cf925e1f797cc88ca357163a0d9153e1d2cb16b21a9deaa4bc154a1baf111b2570199518c42e769f888e014b3ac538d2559904f81d7e90a8a2e81d801d9fc3dfdb3c94e05726bb3db86fedb0dfec8a4216a06c351850db73de8850550fe7b3c82a2f213cec8e4ca67592f0e208a59b2ec3303be2182b57c43dac91b869dfe0df13623b8ae16a9b8fafd4c99c8b6177f5ce0e940a9bdb092de7750918b4088cc2b9575141d587d68782b430b37d2b78071d67c2347984827308f0dbdec855ff211e65b19bff33ce5ad526cb480717ed116bc3a5cd44bae793104ef7f73bffa75e8168e610245b2cfa0ae4c799f646ccc46f35308e2439de7959203de2f8ab4d5be1df8191d334dfbc6d774f2a3aebaaf3b36c1b408ff4e3c5d954fedd6ed48f065f346714e8930e08d45865db4396ec05e0a8428569562dc59d7005056b0f42650dda9bc41d575f687eb231af2ff1e2c8f65d207b77685ff376d69ad1ce25f49b290f792df47fe705b9f1ef53a5562239a43084a3f3c3f8d4bc258f4721991dd154e7d51db4b967e2a95fb832cfb0825bbf46023bb1f54698ac5369f8c573f3ff02703f45a49c4b011f367b50a5c1fdfe01d49d08135bde99a76761d43bb3477af2cff869ebf8e83da11de1602d43739076148db0ae0ed05049ccd1bdabae4f389ae53f70f6d6897e8fdd0f4a3ede5256266c614bbc848218981a9f7e83832d4ebf61fae0875d476259e66e51b9f3bb8234900910a70432a63629326b24420d51eb61f257a007253f1898a66138d468c89f64d11f79b0a9de817460797d20452d7d95d72b668bfb6a9bd9e93532ffd60d3cd913d1ee9b2863a31be378afd56ba25b447c99f84ff5034a9d1098732207c7664fc193bbef14932af41d9e64b07ba243494958d27a638152bd60ca0c6a7b737a69dff29c45520acac6dfd5c283905d98543669627d230f089a1439e55fb60a9f7ea54796701029997f8b7b38699a281d230189866ff2443ca8596a79c6e21abb3eb2108543bd15ea42c64b401e129702a1af7f1b499e702503695d1f23941d373eefdb5bf00470e388e5c352cba10bbd77be36c3831c04dcc8ce1caa0b8a3ab681a6746509c0506325b536b7a914d9f7f62bf854655f17cd0161497311537915813f4712979a358e009fe260e032ea317584f56a96bab4b3491e66b039e4b462ae13fb653505548ad9cce1e0705bc7dcbe7ae716ce4795dae2462e645ac91f1e6684fc8edc05ce68497a7f6cf22856fbcd54ba26c9e7f8fb80cf512540b66c4a85cea2aef03ff0f167c2cbc94edf795e062ded59ebadc0bd0c65ffd7a55c86bab8cfbdd1c260a9d5937be26fe9faef1a089ca9c77d75ca1b78c320d16a933e58a1c7055d8f34ae69cbef8b0387a84702904c66c9fd265675a28585fbc279d1ed04ed516461e24ad39f0c2ec10312a68d7674846796f113a76ee99b8540b9a2e05a7fd182921cc37c3ead09dff1868d0abefb926d5d47716e4495e27a3b499afe75a6da0724c598e4aebf1ce7c249ee5e4502262dac062a029d5acec0b346595692b13189ecaf42cf52c7a1e9ed88a4266d9eab58bc975f4af93b86e5ac028057d5df21eb49648dbf1d5d6a6061aca48100ce34f3a41b1e671eaab353c5cab7cbdcdcce6ac098696d6bfa4c817a7e33f211b1253eaa6adbdadaacf5cb9f4c0c5261e81c88724f50eca07515d53357a7cb2742c7fdd6c5bb46e62bef0467a1512eeb9c5888ec10a0ce290727e15d0ce68791faa97fb100976bda85ebe57f0b22a0d282d8bc2bf7f12d457848198c200226237e4fce9760ead4f7d8f18e871db21522ce0b0487b08a9322ea11f52f78d6c5f1d4063184e6596bc5a916d0b20c31bbcccf80d61a7321b4348fd5f09cd24c3c9df4c213a5a4faac4dfbce307bdf811d3e105e16221cf9b2f850ad8a61cef3d114c984b495f17c1b8d7f61ad64183f35dcd1f3b5190cfa85002ff3200a75fa8683de23973a61219f2066c07bc3eab235b047d0cc9de9a92ef6f10b9386bffc3d40c2475515755bb28bc2ba76762ee0d2061d166a440ef5a597cc9d76176728cadd48fedad0082a4322cee9609e42660e5013d1a403a53df4c16598d12ccead1e8395c31270d51c219d8a3c78a7b9477c4644a9a9bfa1f1ff3ea64f3ac4f85938decfdcb459fcb4fd83454ffd7602dabaf5d140023f41467e40da38db796627cab1dc85887a41dc035653bb7c986dc1789cf72195662350154b50acae89090ec1f833897e0c70e8d449ca8ba86a6ebf5129ef5933f5e07899b87cccd153225d0791c287f51735b4589c83e5ee4404af5e50e64c26d1596dbab8974f5323e122ee216f3f50fc9a7b3f1ae2aa2e799564702d5de5585cd345d04e3d4e82c5b2390737d6657cd2c7fc3679b5b1ced9e0069efe724c24045844be7a2dbc980f2a454e60b165d2f19349eee11ea23978a7bf0e99ff24484f5db747909d3f4b1d42d376cc851785bf120c4c9f74c96eabe48a79fb520083baea42882bda1ba6f6dbab692d7b7344048b8cdcac3461ee86c15abb10eb485f03aad", 0x1000}, {&(0x7f00000055c0)="91a83551dde020dbddf16d7ea883caa2fdea08cda9513570a5571a92b00050a8e4508898ee56363366", 0x29}, {&(0x7f0000005600)="d9f3a9b37462ba9abb9e154c0efb5760d9e3e4c81e417d87c94d2cf69bdf094e0b56062aa0b53ef15378fc59cc70fa5a1c8e732be8905571aca91225717c11d2ac53353cf68016f559cefadb24559c42e5eafcef0e346f0b5d1f264ff718af", 0x5f}, {&(0x7f0000005680)="3cc1c7dca5256cf771795fc8789cc7ae4871740138dddb11b588326e2157063d22ddbcb10b03e60121064668edffc284a1ed44eacaf732e42eccd866ea970fce7ae6108f335cf7893bead51b56f5830f33dab18401ea821db4c32b71609069cce4ad65081c5d7bdb18643d5b752fa3114a939aa8945af9c28041fc618573dfe0c245c09b8d5bb2c2e25df51d2bc05df49a233010b6f29e918a92a2cd656b54cad8f4706fcb1c0fb3ba80cd0268497fcddd0da620b1402d488a1318539a22b0b21739c8f5a2ab3278ab41f7bed31eb5f063a9b8574ca16dff95c5b25414181a52f3afe3b21732883579853ec8df46d300084007df11a7e27952", 0xf9}, {&(0x7f0000005780)="1dabcf2986a4aa95da5b016fbd1ce23776b65e1280098fdd0ecbf5e6139af8b03cd4e2517686d0584283d2c0201a4aa084b833b2c697d3eef01d32c91815fb553294b3b332cc902b83203f35ba0c215e331ff414b14ecf3dea56ed6b06a241a247d5b8eaaa8ff69f2202537204d8866bb7e5dc516ec077e5fbc1b162e62fc16d75a9ce912334b73132104be2617385805761e758e9963a7170ba931e8b33d5510f4b8427ece6b91bcfff9a3e46aa9add7b0994d7877aaedfdc86d3a28a72b50d4a21174a90232c8e8dc6ecdf573f98098e48b807dba9e1fe467f8b52548832643d7ca27f926193c024f5f2a3703b1ccce6c5186bfbd8ff6b4b0588bf69e0f36827b93a7cb47ca2c179cc45f7c6602ec965f78eb4f2a4e5271ca4a92e6659fbec85820c643d20bfcdce6244f140e00af20a5962567c5f1726c9ee2de5e691975b72300b68eebd17e9e44aec2ca43c6b9898177eafa341000037e1406584b124d034ab1831d5792b7563574d5fe4666bba3f0f83015c1f902f7dfe1408fa3747a8c3be22fe2f2b7182e9e1c3d3682d98ae6c372d707f671f812965f479ae3ad97017662f613ffa266dce6743ce09604f2b46925bb8029d6bbb05511c4e02711cfb6de5d67985ec82cb3c5862eb06c8ce2a3ded3261dd2acbc0e986896c2153a11d7c6d287b4d9c446e5af8426daf4aa65e259a713ca3c3724ab3c3877d35120881383b8ff15f6b47ca875ab9434036e25cb2a786178a5b9c5401a715d00adfb4c9ec15a9a6edbb9988d24f1c546f5d17cf0a3a72700ef5780b6f3b61d9b7f2341f0a25ac56055f122e585224a66a255977a2453113a8f59c2890c6c33e6016418843674105544dd7db5c3950fd8266e89b8692bd993a65573a40583d61f9dc16a88f2261fa882c78d2b250bf342344d7cb60f670e896021a629f1baadce96482ca4320eb603c1093a3a2689aae85cf980d900b7ae1b00e3810c4bbd34a714b039601ff7d0647f83d8ebd59c3212788ddd3e04a364539fcd27d8ceeba481ac73543d40c7f5696955cfed13469eadfa6d4f87e64c61112880db429ed17cda1859bb5aaaac25d235dde414a4e02ce27cfef838bcd13176b0d4b24515afc44b5f5442c7dc9f1163ab6e9291aed876c10a2e84211a51d854fcfb9e0075ea271dda2c2544bacba05d2a1b59d0162ded215d3bf1be52391a82e04ca5d34e1118d865e8d8130dcc2e58f4ab716f5d5bd899e8fe0a77fd21c34aa3a75f37f0567b6577e536e1e93f7fabaf932259c844a7d4103cf2102f278dd5a9f5342c1e035a5c5baa049fc6b5e5fa6aeebfeac8c484e1854fd1be2c2d08fa13d11cb84e2ce1f60aa9fccb8a93c505bdc839b68111ab7b0dd0543a68501da25d828ba8cd162be586f31a09202496570ab7ebb5e50c22376b376a27b017cffbeb5168563c6ae1825b917eb5faec6050c38f6db1c6dbc212ef0b1e2480563c4fb8e18e493679c044044cb5d6861469804eed8877cb346030c8320811aaf2bcf410677d3afa35aa8c0b1bf65b039206b21943e13d94acc51bb8301e8efbce95ec845eb696188df13e41d55f8567414f01476cf52b7ee2451c468ba3f28b7f34c402c9fb9be0aa6c8685359ccbc287809ef43c248439c59d6146e4d5da8910405f03205a261fe5e01707622da46ae487e3d6cceab94e686a0ca1f31438f2d7f075543d77bc56fcaa8645adc418224c724dc78186d04d4e050864946265f764277b5b216c4f4a6731393c7859565078089069dabdb0a4b0585022f3a929703ebdf688a0d1ed6092cab88f87dbac26762b90f5158b9edfe7533e8bdc7a8f7da8f76144448ba96efb72d6c3287b2e2c60baabd381cd63d5788c48d1d18aba79fa67f95d66c657637fc61cb42c7f58d9906c1649d054808188e3a4f94aa3eca774b32f42e496800f1176ed75638ab92b2190cbba78635b7635707e3d4a1e0c5698c7ffe5f9a20adb432da47089537091ace2e032a55b9a74577b66a51956a72daaec8d9a824caa6e50d3778d7c3980a6396d6a7a5cf06043fd074d52f9107fdd756778208c9028da5740dfe58a1621f52130e520d59cc5183f9693845015c139e58725f526c98726b8b37ced9b764b95771fd71e8d7b2493f24b41763e88787dee5da2959df6dbb40f1cb40a37936fef563928d5389b9aa1f5745008513607d92f704f6201cdc9bbb1dd5de878a7f51342beb5297dfb1ccb1a7680b71752e38e3a03183e5f3a8a89f15e133bfbeaaaef005172a1492cbb6385a721441e443f60999c4767b22680eb631b3f467800aed907d586aea0a65d5bd12465e883981b1f576159bd48b1a9d5368974baf320a420b02906dd7e716d4f3b73f5e6789afe734e90f357afe055d02ed37672ab746a49246cf5c18bcfe147337c8ba79bfb354f4c15f1b930e318fe453b5922a27e77c11c86bed525a80f0b2f63976b898ca19139f543af1c718d7f74b62bd9112be848ba847b5229aaf34cc41a0a61b3760f5be5c612f768a38b1a840942b393d2f36d05c2346f705745442e1bceb71e609647dfdb8d564cf4e2875c7bca0dcc6968445b7d47d0f8d20b17c0ba31f24aeeaf694abe09d685cd35740c43a309007da36b86da7cf2ec0fdf4ad2418116e5155ae9ad06da1373268d4e3e4e36b91fca7ab59c2a815ce34106683ea1971bb0f78e47d06919cb3a5a0558dea7e78e63a1b47bda0334eb7aac8722518f5b5635bdaa9e98b9767d93d5d4ed0548281265d1749edf64dac3ac2061eec3c3dcc126981bdf0c53afea580bdef2ce10e1ff32551656e017d07a2c9c594e6eb378a330bed510990c7ca87720835238c3d410bf0a2e4e742a27f90ab6e5d4eadb5b352fc8499335482f0daed41944203ba7769b442c38c950306ff7c8f78811c16c4bc413a078d47de2b10fa9319c850df158cd4065b778c4fc62f3120d122df0001a238d935dcb71726e9a7008c3cb3da7cd689684167911dc9741ba5137bf4db9d18188eb91b929701af9c7c3ee67965bc8aa44f4b112c5dc12af0dc872b29e4687ff2793aa25db9c932abd0cb8459c8a1fc3b60ac0f6859297c647152fcf5f5f0ed1473ffe7ef23194160526888064cb4740e09cbaf00b5abf9a4f396a94269c466695321e2b16cc9cfa3d1bd4fa030a44d1c56113b483024080b557a027240965874d647db849c5192bd6619fc7e37e6bc3e4ef85499fe9eb19e47fbed63eaa5cbbbd7d7cdf7781c7d9508714b8615e06b99a017df02b09aadd801b4cb0bbe33371c093685ecb19615300b73cc37ae41eba4be4bd0f834318691eb451001c698ad56ed1afacbc7408d4708171c849c911360bd65de236d39c099dccccedd59f5b3367e269ec8c19353adcc4d530f2015db484f5e153ed98f0623f0be1fa264d6a29308cd48ca02c2917919524fe7c9c12f1676bef176dac857535c4cd72778ed4fe631f458f005c28550bcb116372586f7c84b2b6c8ebe52da3f55008da018ba06c9bca49b1da2edde6278d77b8cadfbc00e15ade48bc73bfddf0a54a76811ecb3c600d318cce4e3c9a861e26581ea26d173bb94e80fd254fb5b2f8b32f2349b4196e83884eb00d7db0fed17506fe51002e204c4cd1ba3b2df84b4f5ad88532749ec5791dc1900561a6ac82d96da2ab1598982773802f35460dbc5f25f04c1e24dd9f6c7dc97c3bca48ec60fd14d43d188503ad55d9d4a57ebfca557c5d238ef8d98faf0b961144726012e1fd08854c3a9f5fa0bbba2cfc010e3264e6a6ad3dc571550dca6f46ae989993db80fffb7f1aaa9ef8059989032f3b14b3b3150e96bfa084b5275099cc47057df9900b1a44e76b728988675b97add2b6337a6f2d53e9f868166be048f6eee567d3b79f25ca25f5514cdd1f9decddebbe9a4005ff52ded3a48b80a9d54f9e6cdab8ead6f090e271473103c72f561483bfb5dd85b71d83b4472a3830b2913b44ec3b8927ea6a8aa4b6197393997f97ccfa6965ab9344c7a5604e67639e47356b0410395de2da044a0fe92d90c3e086270e5cba0d670822630d05dfcd4548511c6f5c17097ea7e209bd24a60da35755beb8ab372bcf30e8d602708ccd5b9c8edf46df1dddab2a3882eafd9f36afcc12028b6fa2a8ebc8ce0b32c80f76c39e4f11c57f38518abbf80156020d5da25f07a75de4dbad598654898c3e94c21d81e7afcc968c0cee1fdccb86e2a76e2435d5d4d23ad765aa75785f4dec66047090d28a979b747c608b087eee597a597939692df159cdedec9ff3668235d97d3bc6f47f80d398cc920244363f83a2ee466ab4d421a83b5255d58f55809cb0041347bb105ed1195fee169a18670df31425e0352094e5059aa39ad7166effdb4dc27755bf5a7212308b4f45a9003e8713d74e2536005e86ba6cae0664473165fbef008b1c3524a4c8bfd42f6e2c4b86dce284fe1415228b4a4322c1508d4563561b211854802db2357ccf6f19124f4247088994ca1e91b7a3102fb8fe0bf8bf2f3c1162be9564cd454401515622a6483eac099c0b70eb6f747faf89976dc3db79997c97f4184b09afda721b5836d20869779c41a20538f3af8bd6f95c6a9288b8a2a6a5f8c6cf336cb1d514d80ff9a682f0819f04ff7e3211ba35fc5d7cb8b8c10811d30cf97249c95cf73a825e87cf52805af2192343f8975351b2d8eb56d43cba9d6022cdb1a355974d3101df08f41babb11a7143c94046a3c81f023ed2ee4c1b04d5acf45c742b64d98038634c0f693a905304599a7811835a22ea2480e86c6375ab0ffeeb25875b5f1f4da55b088541f3943ac202ba5be643886698548c496e1dd9da4f9e4a65b4ddc7777a00d90cd5b2ee12bde5c9557a3474cf6789b2d08e3de4a8ea57ef9a7d1469b8d73999830fc238711b4f72345d76645e5c02738d770d25fb6787f4de2c51b946bc03d17ec0ef2b409f4f76c8e0c3481dc8b39f6405f66b98811316aed9b469e44a09c92874b4a9216879682f257fe047900f707a114f93547427dfbcdda247426f7a166b100fb920f1c52fa34fb170c6c0f349ece4680acebfaf40d6b7302d39bb92c508729062326da5174ddb1f9c7efe451d64bc7e4bb20cc845b0c1bc46fd5ba93c57757422c706c23a60bb5840026e3cc94b203f0fd3e7f2571a23c780527dd77f2ec71849dca82a4d8b5ceaa4afda556f1bcd0d03e31beb629872805bff649b78a239934e7ecf4528fdf08be43677455e9b743b724884d02644a4cfdd750deead9a2eb373f4f771025c388388b0fa4d2578938aee6d95b01822087ce490a9e2df561275113b1de2d24800eda2368c1f69ec9fe933bb7e4174e3984fec5a6d0afa97edaac08a3a38c626ce82b265ed09290549e7733e9635bebc2086c602fde84e2c83ad4b044fe39c4f6c5739b5163ae3afd7b803c17bfb750a155b09b7a8c95cb179360a0007b35eccbdb08c87cc445b67af18993901a101c922eff7ac7894d80de65b833b304ed9fff6ce19b3b6047a347948812c49409b9767f5ea9e8a2d8f59a622583317d099ba7bd6a07bb9521429bc374b178e5b8fe4d89dec83b8de710adce77e57bc6c32066091829ac252d783b70f3042cb43708dd780b4578276be893bc73fdbd30ce1a99ec7ba0205e65b010fd9b362d02d085dbb57d12e1bf2d2676c37c5a070401bfe7590e37ce5263c3d73fc5f60d968588715d8651c47651c4faf8dfbe1914796ef281d1f43e41feb88d5d243aad229c3434b384b999f769c38c772588e8e086a1c3294e522156175b539a9a8b29c34b1b8a115adf5c8e", 0x1000}, {&(0x7f0000006780)="f03089310e2b455dd5d68d26b382d62b7e4ce9b132e52288117a4d681857cd01c4849f1a279c03749033797bbf90ee95d89aff753100ba7923e10793dcc6f8a44226972e178f3db4", 0x48}, {&(0x7f0000006800)="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", 0x1000}, {&(0x7f0000007800)="79ef5e653b09f14d050d31aa6c3c656d7c97d83f00a69e7dfc1f2b511df1e7295ab9f83f97ba6ed4411a1cac6b8eb00e91f17289e4b2c7425036ed3ab71110da35cb3ae4ad1704062766656bb3f3165f922ad52841a7d933ee907883fb937ba15346bd99f759a9a924ec9231831c0de9ee8f6197f54ca4c504e02d6f47a93afffd3486937628716492a110b3c33962ae92fda247dc9d81830efb18010785b210679e6dc099d23bdc5d8aba9d875785b95eee86a93dce6efb0ad29b7683496d52cd4819ad832c1b55edb8f53dfefdb16fc3b5e4b088f9531b47f4e3cad3489017fdf1cfce8975cd40ac23a51fb594433b1fd63766bc5c101c60cfaba39a1af24fe57976fa80ead738d488148a805d9b10c50ae351d7df5871922430a1d0c216af73233f36f533b3d0fbcf8eabfcc411cb1f1b50552d6809a2fea10082b519f1d221a0af2daf4b29b82aef7a0d65c6b562e79db3dcd47587e00ac2f55d0f776f9a9191d7f7d97930f2679566eb8afb914d15389bae61329b4ca1a3cf63b3d0133088185537c7d3546c8ccfad967622fa410e276a2a72e3972d6f5e6571843780721efd5dc24c548601775f82978d0b07eebfd318eba3daf2318da10314182bfe6227b8336742f4f374b71ead09edaa15e352a9cbba58e598af635e7eb461baf839bd57b36e4a57e07007d0795f5807995b708e427a5ba1b25462443642aad3c0a648c9d9b32ec293c420f64cfb5659916e2f1ad0c35dd83d01408116c61db40965dad8573641e17ccedfb8d9b24fbd1d0a802f3783675f95c4463fff05f2f3fe1d21c144a7743868b5a4a207a48df29aa209db968598b4c33ffd68a0082c47ab2e514503efe6c5c28cee3b6c619975e5eb3169d0d89e78f72c1193e684dd7224eb060e783269cf06dd67bd4f3af163dfa522fba239ea8f15a4a27a0a65a786fc2f0c490b174176eabf94d5ca18659b96129df4269f6926887491f0e37d2b09ac5a347c6d10444c84171e20d287312615ecf2895029b3e7baf754e58df5b328aa1218d93d42e3ca492a50731142edc4688a365f9f900ccbdaee6b1fd281e50b1701fade4edb4c977e10de1de2bd992f8d1f95cf7316819cbe9d96bb6dd044c4ab5fb749c754f0782d2aba36bf14c3cf24cd1abe89e02f95fdc4c3c283acfadfd41afb4ffec0f9349f42e8ec5fb499352f1ef3582800048554c8844f45a1be80417f1b7fd5176f6fed97c812f32065c85871393597dace3e3755b11edd3c24b025580e719fc60b5248f3fc9f3fe249ef3e44075763a69b7272057e67400554e3360145d128528413473f941c876f2b5de9e4cdbf25df8cc857f4818932da8fd43528a375ecff189a18ef0af8dc6d79bd57c193d02bcf42e09926baed84865744569e0547c018fc085347c6027b0317ae69b9398203af267af8b989b5e596796d3687889422ebe493cc524eeeb7608cecf9d6d513c9f1b53fc90cb1e131fbe99892b4d7c936b50b751175bb43c55b7b59a8fe08830320398927908939ea21cebc08e124ce2dd437100504953c22dbb4943b45a83ec95962ab8902861f2e098859dc77e7cc0b56c3974974bfd14a9cfa4fee719aec4332efac702d19ded911d56f2d3249906bd9bc4a0d170e8bd02cfa41baa58845f40725a0178f33fba431d6470c5f054bffd8de032816a7860bcef7ee8540dcdc56c006475345a83424b4b6d78c3b29d0ae0ba54f554530edebcc4f74bf6791744d8a7810c72a83f17cb9e09ea95ecf0b03949f49bd00e40a2875e937ea7899a781aba711adf5c1d068238a14de7502459a4526103a8c8f54cd4b311080d47bae338b116c075e43316ce26938472e5342230e3e3956e72c84696221fe84843e28f2ea9cc66c655a49387883256cc1d745c6e6eb83b477049a7bd7e537463e41c35e3aa012fe712467be07e6cc953623f71916f0e1bb681f69dcc839167972465ae38df38135e0302da18f61a6afa6ba624033ab1dd72a63d8f39de0f93c48f1d3719a6eb90fd0d99138ca0cce5cb6f48606ee3cc5e3ff7b92b03e67056500b82d4b035e32ccad66ed27ca4f396ea0c0b2f3c52ff3df1c579c548a7c0f48c570c0aa7c4adda407630d2a0f7d74cdced8313b58ddc003c3c9c2d4c6a91ee2b0b533b29e06114e3c6725107c5920382f4ac1f906beef5141124940948074f8ab342825270e7d05bb16c12e5c1f6738244967ae4c252a5c12571f9fe5a0c1fadafe7e1166efd76010d5b00ac0a7789c8accff40eef3f00d3368d64d5026ecdfa643dbf5ec61e33d3d2dea31f4451bbecfd363af43cd6d654d5fdbc84af3e0a26a49ede8cf55b9ed6d4a5064c560cbcb503b7d0fef0204f6f123f5881de809a4b729be837abcd3ae60634ef9c259e8da60171ea7a8aa73bea40dfc6dec5e471304f4bee06999c5c86a1ea99c3898447d4cccc3840e9ba7a78c7eb18a221a3eab098c03e4e272a021f8fb30ad29f9aa429256db9967c757f4b292343a2451371a5514cd3861f9f44f36bf6ef4aa0db57de8fbb50b90a22f27f6c273f4076bde61150ba082ff4e1234fa7537fdf76b0cb0217ce334cb7664c335a9018e7dd0dfcfc99896f2265cec54e003d4d97f83491fc9e60113b0b0acd7441bfd26f4f891f135314eaae7ffa0e6cf04d1fad7640561e2ebde201cfd9c6fcc91fa356204c5f03a7d06efc0b0d5cca87fcbbe31833b0ef6ac6dfb2609aba119f1b3b385c4e55009782d67acb66f6a513a5c6e0b4355ca7cfdefa56efd704bb2fbdf26dffaa0271c24755947baa9e5e20ccb0354b8f47d37fc0ed5d14a552de7d3fb71d54e11b6c4a7b051778fd187d7b92040ebc9c9e4666bcc37900049cb85d1eece8e2336f23365c7760820d628ce44cafe46f3adee0fdc1abb7427dcf3cac96fad5bb073b5351647b96ac36edc8ee4ea3e4341da7f21c7ff65b2f32d2e8c96cac17906b3d221e2275f7fa81b6c2643d4110bf29daea7fbd4efcfe760b01ea2d79a829e65f9d5fc98a01ac2ffe83f692b7a7f1530c13bf72b5469d651e2f81844657b4c5cb0960b11052f9a0257858ebf5655ca3de939a22b5214eb0de723c81eb15ff37d150c75bed4eafe69bc76cafc735bfe606f1d08b91b5b9dc3a2d22887ad95f822fb0e57f3dc07513bae789d2cd36bfbb86ffa7fd3b926b51ff644bed416f7345b5ec724e4dd2a8b37c2773838c1d2a11962f242b7a0547b86c2abcd423d29f46e810e25ee46f463aeaa2fd3cbb12777fd9609520d6f217bdf7b36cab2b75d8e07b2e2cdbc84553aef47127465a845a02ec082f99a5654116afb5b3f6e0c5881ede30b25ace2d752142629bd44f4bb23484628fd7c8e27d79dcefe5a7ef963430cf3c2753335e8c337976f8c9682a7381c4ef58a08294249eaf6abb25d33e55e7645cddb7a2aa27b0a4b5830153bd188fc7e2c793fdc7b935d3801871d3d2735990782d09552af013fedebf7a19e34a81246fc0e886f8497d5add873f0f06becef96a06bb2a01bfb8392a7a4225f119a5904e7ec780fd9a4c1084072d28fd830ebf3ec016e9469fb81c775107d06993243510b35200be6d62c51b42aebbe85b7f223db1faa6356c3e5d7fd083c4d817ebfea7ffecb5c4464ae61a60ef9aaabc79e19bb7fab552aca61c28701ce066f510c3eaef1a28eceab67d61a0ee53bf75756f367324b11e5259942b47c8059d62266534fd85c3ce2211d99f7188bd217f1167babf07384affeff6c12c959c5ec10311bcfdd31a85cc5b70160df3af2321bee52643c4372ecb12678da95f0a075c0dd980ccc402c1ed0a997e222f18e41855a1e6053d9be8596ff847cd599282fc5e3410256bf64390fb15d8fc291243d9aa2e74394afa2318480151604ee6f059cae2a8eccbf1c766cde7cabeb099dac6d4bf00ff8f1a7a9dcfb4797ffc9275a151a24951854837f77e3a49094c1dcf9164850c7ca090a094f93a21bb09e46bce527102b943b05001966b80084b5d146a379cd4272dad3ae801326fed2e265a5643799998f39d10a4ac1a6815b17c53bcab0d46393cecd19066dde0e52cfb8dd10b948351ed29f8d6ce84510f6baa94e44a374783e1f509f90cc4c6cc2cab24a158820cdb85f94008e793637c481b754f3c314e98c6186e24b0cca76c6877f9261db704cff92988457ac81b848a2492262a4e8bdb8ae187e32f6d3542617adb28acb831bdde101962365fedefbcefc6c3bb8a6b6368ca82871a621ea2645395d59e897714cbef1eb1c7a2bc87437d3ce7ce27b0508f7629781b836acc027da25a9ec776a4fd46d3b0715fcceb43cf15cf31d9cf52a6b0385bf64ce9b3133f6850b5d445e4f3a8ea1dffd6b160ba00a33ab7cc87bde34560184ac0d5c22e4c76ba0a860baba82b4776f885399d062ba969057239a0824a3cd8b1236b6ff62b1f87e1cbb09839fb5a445572209fa10546fd0349568df8228637244e54d4c443b270d2e2273449a64b54ef1725b666c757ae82f43a0790d8a5f6151013705cbf008603272058c1a30314a2227d85c017ed7e95443a3971078bd1e9a61fe38a2786b88b5f3c119f5903a9ccbedebe0f92e9ec80576738e6191ff968f77c838c0ba0d9d578883e7dfe86ee0720700241977544bab4dd3b4bfaba3129454c0b914ac94ab14ef474635153240189a599e4f696080c74dcb430e5a033b8b92d267dd6cb640341ff3b58fa513371cf4912d56709027f2a1d90df16b1221f4136f047ba6a6e1d50a943bfaabc3df0057f965c09034b790b859ab612c9172b6205262f8bcd0b0b5ed3cee8ba31ab030a2cb78db5bc740cee386128da90537e873d2a741cd3a96e05f29a3e48342c92a446a031d8adfa0db71944d1749e4c874ef453dcb12dab182c8d3d94b18d42007d25c4fcb06bbb9359506d45a33369f29317aa714df8f9132896276379de4a664ab57b8e1f0bc0efd2e31e06a942107e938b0b592434327e8d32fd323621f78ccc73c49ef14aed1b14114e56ec1347baae9cd87a3acd930bbf74c654c44034f934c9d6202360f3894d2a7f65fb44728136dc0704b01f32b03e22aad44a47d69396a8da06449a86fe6eb567f5eb816ba58061bd666b3c979be64ed97ffdd878d4dbc87a7d84923885ddb138b9e922d7b15ac182040e63a212efa072e199d33a66f84d48f5355afed4daa18a7f210637f7fcbd3fe6f616625842d33c0a12f8802a3ff7e73b17578b65e5c3e5efae507efd787674eca892a8701962b17028eb86d1b0dc0a7f761a232d51dd0f77c18a3e657bed1be00c485d8743e18a58afe798ec2322c8bfc84afc3269b69e59f9a10298bb2f79cf408feeb317072cc4420e21279449f1d2b0d2c726b884d3d5d82c3707904cd083af875e043b7ce2f16a00c56a28345cf067b952d745e8e5dde0a639db192843fdb6dbfc42c55ec9d8799501316ff4db99feacaf9a276718c3e443a0ce002a24e5b71e6fff76ad33568cc9889c1592a344ebbfe74c69119ad42a3ef1ce10d759c546df53778a52148a0d0d246166e4a6789a166016efa3e16881dd8be3942ecb1fb0a95e40d415fa84d05477f7310f92a6e008859c65e3b242cb3517d161304fa1a58574ec1f397390abec40846d0ed27dfff41bb3f5a428d4393016e8d6e70b864c812581f120c5c9b96c9d3882237ad1ac80453bcfa51a64e8f35620195d96d58361b8f23503e4d68e1643b6df5b51527d3a9d95cc6be891529e85702bf816a2f05bfae3b3e62985531a2cb43d654980ef6b1aa76498c28624c4035881d2b59ae950cc8b7d6d5", 0x1000}], 0xa}], 0x8, 0x20000080) [ 2574.313839][T25407] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chdir(&(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 15:14:41 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x500000000000000}}], 0x22b, 0x0) 15:14:41 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000140), &(0x7f0000000180)=0xc) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r1, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e4) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000040)) 15:14:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d1900ac030000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) [ 2574.402943][T25599] overlayfs: unrecognized mount option "îy1¯" or missing value 15:14:41 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x700000000000000}}], 0x22b, 0x0) 15:14:41 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) fanotify_init(0x2, 0x181000) bind$netrom(r0, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) 15:14:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) [ 2574.665831][T25763] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:41 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x10383, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000180)={0x7, 0x7f, 0x1}, 0x7) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000080)={0x7}, 0x7) 15:14:41 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default, @default, @netrom, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000001200), 0x4) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000001240), &(0x7f0000001280)=0x4) ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000001140)={0x0, 0x0, [], @bt={0x2000, 0x8, 0x1, 0x200, 0x1, 0x5, 0x2, 0xa}}) mq_timedreceive(r1, &(0x7f0000000100)=""/4096, 0x1000, 0x8, &(0x7f0000001100)={0x0, 0x989680}) 15:14:41 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0xa00000000000000}}], 0x22b, 0x0) [ 2574.785010][T25763] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:41 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x8c2, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1400}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@newtfilter={0x2c, 0x2c, 0x10, 0x70bd29, 0x25dfdbfe, {0x0, r1, {0xf, 0xffe0}, {}, {0xb, 0x1}}, [@TCA_CHAIN={0x8, 0xb, 0x1ff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40010}, 0x8080) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 15:14:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d1900bf030000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:42 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RLOCK(r0, &(0x7f0000000040)={0x8, 0x35, 0x1, 0x3}, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in={0x2, 0x4e21, @rand_addr=0x281d}, @in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e24, 0x2, @ipv4={[], [], @remote}, 0x4}, @in6={0xa, 0x4e21, 0x1fe00000, @mcast2, 0x3}, @in6={0xa, 0x4e23, 0x1000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e20, @rand_addr=0x4}, @in6={0xa, 0x4e23, 0xfffffffffffffffb, @ipv4={[], [], @local}, 0xfffffffffffffff8}, @in6={0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x8001}], 0xdc) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r1, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) 15:14:42 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0xe00000000000000}}], 0x22b, 0x0) 15:14:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0xd1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 15:14:42 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) write$selinux_validatetrans(r0, &(0x7f00000000c0)={'system_u:object_r:tetex_data_t:s0', 0x20, 'system_u:object_r:crond_initrc_exec_t:s0', 0x20, 0x20, 0x20, '/usr/sbin/ntpd\x00'}, 0x6f) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') r2 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) faccessat(r2, &(0x7f00000001c0)='./file1/file0\x00', 0x1da, 0xf00) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 15:14:42 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x33) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000140)=""/245) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) [ 2575.126912][T26155] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2575.161416][T26164] EXT4-fs (sda1): quotafile must be on filesystem root 15:14:42 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0xf00000000000000}}], 0x22b, 0x0) 15:14:42 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000100)=ANY=[@ANYBLOB="010007000180c2ea7e82a61af5d73a6a17be3a4754ec8e008c001b74151c611ba8aaaaaaaaaa00000a0000000180c200000faaaaaaaaaa000000000000000000"]) bind$netrom(r0, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) [ 2575.348241][T26155] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:42 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000140)={0x0, 0x0, {0x0, 0x0, 0x301d, 0x3, 0x4, 0x3, 0x1, 0x3}}) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7, 0x21, 0x1}, 0x5) 15:14:42 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) bind$netrom(0xffffffffffffffff, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) 15:14:42 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x1100000000000000}}], 0x22b, 0x0) 15:14:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d1900c0030000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r1 = dup2(r0, r0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f00000003c0)={&(0x7f0000000240), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x30, r2, 0x308, 0x70bd29, 0x25dfdbfe, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x9, @bearer=@l2={'eth', 0x3a, 'caif0\x00'}}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000040)={'bpq0\x00', 0x8}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') r3 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 15:14:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x80, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000380)="24000000200007041dfffd946f6105000a0000001f00000000000800080017000400ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x4, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYBLOB='usRjquota=./file0,\x00']) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f00000001c0)=[0x2, 0x43]) 15:14:42 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05, 0x0, 0x1a}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) poll(&(0x7f0000000000)=[{r0, 0x1000}, {r0, 0x2000}, {r0}, {r0, 0x80}, {r0, 0xc011}, {r0, 0x210}, {r0, 0xa203}, {r0, 0x20}, {r0, 0x280}], 0x9, 0x7) 15:14:42 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x2a02000000000000}}], 0x22b, 0x0) [ 2575.642660][T26497] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2575.677791][T26532] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2575.725310][T26497] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:42 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) clone(0x100000, &(0x7f0000000000)="886481bd95738f00f75108a9eeabdf8f99e3a2472e8046312c8163d98f07cb4fd71b0760a915e3cf65a565bdfa7d65d345fa02a265fa376f02e66b1f9f95a4b801dda1fb6c002ac186", &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="1ece4fd34abab551cbf1b516c08d586a50ed2671b5b03f1b675b82778586526d4cd4ac49be296994cccd10c8c18bbc082d0b136a793b") bind$netrom(r0, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) 15:14:42 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = ioctl$TIOCGPTPEER(0xffffffffffffff9c, 0x5441, 0xffffffff) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f0000000040)) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYRESDEC=r0, @ANYPTR64=&(0x7f0000000340)=ANY=[@ANYRES16=r0, @ANYRESHEX=r0, @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="360ba1258789d8eb86500f3b66e203f3eac7b75de74976556019fa70d57054e3a315eebd4be69228d1def5bd221a4dfb0fe601907e8033766ee05525e6c7f5126714cb153fc2e1a371e6a498298af9ec81f9b0c3341bddac40d8d76138def2d022acb03b0e4a3a7559594a1e1e069e7d5049ffc67acf741b8f6af45e1178033573b3e013facea3f8c3a162e00704b47d895999878fa696dab4e7bc14e7a62754a8eb667b23e33a1eae6d839bb8f7f878170daffc247fe00d9a05b1152053193c2473d57bcb41de2b57a6d768d075", @ANYPTR64, @ANYPTR64, @ANYRES64=r0, @ANYRESHEX=r0, @ANYPTR, @ANYPTR, @ANYRESOCT=r0], @ANYRES16, @ANYPTR=&(0x7f0000000d80)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYRESDEC=0x0, @ANYPTR, @ANYRES32=r0, @ANYRES64=r0], @ANYBLOB="c91d8dbd025c72fb51661ad9f770c0df8f", @ANYRES64=r0, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRES16=r0, @ANYRESOCT=r0, @ANYRES32=r0, @ANYRES16=r0, @ANYRESHEX=r0]]]) chdir(&(0x7f00000001c0)='./file1\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000080)={0x7}, 0x7) 15:14:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190000420000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:42 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x4000000000000000}}], 0x22b, 0x0) [ 2575.906987][T26822] overlayfs: unrecognized mount option "18446744073709551615@" or missing value [ 2575.978366][T26829] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:43 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x43ff000000000000}}], 0x22b, 0x0) [ 2576.079904][T26829] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:43 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c656ba657ce093ff55381c197f19ebf26302c6cffffffff6469723d2e2f66696c65312c776f4e48d32a61a530a2eaf7c09399de9f3d3f3af5d0d74aaba75bd41a3012d7eb0100000000000000a793380c9ac9ee743008ebb850bc33b67bd2908f7a09cc3c5ecef12d12910fe23b4ab9a570e638af86123f36aab1c3c27c50d8c42457b9372827e3699c3f4777fed145b075e4faede0f390a8a717b467d036e46176ae80727c787b1921ad0e5891aebb1890864764ccf24bb00dac99a4fe9fc1068fcdc6210a6c3b24996e5f5a5598a4eafb"]) poll(&(0x7f0000000180), 0x0, 0x8) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) 15:14:43 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05, 0x4}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x10000, 0x101001) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000100)={'raw\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) [ 2576.234638][T26943] overlayfs: unrecognized mount option "lÿÿÿÿdir=./file1" or missing value [ 2576.561460][T26532] bond0: Releasing backup interface bond_slave_1 15:14:43 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x6000000000000000}}], 0x22b, 0x0) 15:14:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003020000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000080)=ANY=[@ANYBLOB="7573726a71756f302cfaffffffffffffff000018519c"]) 15:14:43 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000100)) bind$netrom(r0, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) 15:14:43 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00\xa1#\x9fW\x18\xfc\xef\xa9\x02\xd8\n\x05I\xcf\x19<.\x10\xe5\xac\x9f\x85b@\x99\x82e\xf4\xdb\v\x94\x00\xeb\xf3[==\x95\x8e\x13\xc1\x99\xa8\xa0\xadH\xf1Ma\x11{vl\xb7r\xd7\xbc\xb9\x05\x8d\x8c\\\x04\xed\xe0%)\xd6.v\rG\x91=\xd4_\xb4\xc4\xd3\xd2\xb4\xe3\x1dC\x00', 0x26e1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) 15:14:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000a80)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="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"]) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) r2 = syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x8001, 0x20000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @empty}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000600)={{{@in=@multicast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000740)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000780)={0x0, 0x0}, &(0x7f00000007c0)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000800)={0x0, 0x0}, &(0x7f0000000840)=0xc) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x1000, &(0x7f0000000c80)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC=r4, @ANYBLOB="2c616c6c6f775f6f746865722c6d61785f726561643d3078303030303030303030303030303030392c6f626a5f747970653d73797374656d2e736f636b70726f746f6e616d65002c6673757569643d00306564643500632d343437772d343738732d303736612d3b7f3333323277772c646f6e745f6d6561737572652c666f776e65723d", @ANYRESDEC=r5, @ANYBLOB=',hash,appraise,euid<', @ANYRESDEC=r6, @ANYBLOB="b6756909ce15103626b0e01e151933011d65b891291039144d6ad49b2ffe3e08ca8f9fb65a0000000086380a319efc37673ddbec876a42f8ba2cf3234f6aebd096ce4bfcd1aa26d4584695", @ANYRESDEC=r7, @ANYBLOB=',\x00']) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@known='system.sockprotoname\x00', &(0x7f0000000100)=""/26, 0x1a) socket$unix(0x1, 0x0, 0x0) r8 = shmget$private(0x0, 0x1000, 0x181, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_INFO(r8, 0xe, &(0x7f0000000340)=""/249) bind$unix(0xffffffffffffffff, 0x0, 0x0) [ 2576.712619][T27056] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2576.759347][T27064] overlayfs: missing 'lowerdir' 15:14:43 executing program 4: bind$netrom(0xffffffffffffffff, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) 15:14:43 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0xc3ff000000000000}}], 0x22b, 0x0) 15:14:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mount(&(0x7f0000000bc0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000c00)='./file0\x00', &(0x7f0000001ec0)='fusectl\x00', 0x20000, &(0x7f0000001f00)='/dev/sequencer2\x00') r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/sequencer2\x00', 0x10000, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r2, 0x800443d2, &(0x7f0000000a80)={0x1, &(0x7f0000000a40)=[{}]}) syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000240)='./file1\x00', 0x401, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000340)="367b88fcd847d5eeb7115ffd8e4b130adf559c37f7d31e51b4d609bd7155eeeaf07d557f62b61b97b2ddfe61f9e8be267421fdf12552eef27f517a25f3755a1cd662073cae54e6306c835d771ac1802aef163c803de9a6c7bfa29e4f92d4c569b2653de0a77aa3a3d7b064d3175b2d1e3b03fd79e8475633da3b24e87da08db3addd8ea60754d5eeb39c", 0x8a, 0x100000001}, {&(0x7f0000000c80)="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", 0x1000, 0x4}, {&(0x7f0000000400)="90730de6147b21ae76a4f97951bc293b35bf4da08229c34548607d10c5d8292d8fff92ccef8bad4ffa4cda841eae15c936c72273999bd555860d3f456ffc2976435355b0fb215292f836ce1e3e92453ad460eacb4f89a12586a9dced7bb6696f3162a89efe7578489afa18ca9ac9e4bf00dd6dcb8b5ff380b4e7c7c6785568c33bb7ce9f54bdd0417a24ee93c90f8f5f33d79337bac57f60cadff48f7b92a26ca09dd07ff17103a804ae717c9c5953f4419e0e684545bfadb62e2a3e0515bfa45a4b4048b1eeba22b1552012acbbcf2eb1e31c8c0b35649adb1e183a6fe5a9c46b834b73d605b28013b3910fc5aa63f63b0ed8d09ef65d7f8ccf912f03", 0xfd, 0x8000}, {&(0x7f0000000500)="f1c3d207b9f7bc35d0e9feaacec335e56921bde69f8ca121b2a3ef13470bf0a8cbfbd73aff15b625554691aeecc529383f43e687638104c62562418af0d093f2c59d5c802e7fde23a767bb0cda18b94374a0d8f9473ee4276fb2c5b82aead2764776c41090b34c5e2a27bc522822e9a0a91a6252fbd0e590e29d0926188d4d2de74ad800bb6bfe1eda1366a601585901c258fb3f17c095daf326266b712cc2b6369958d7265c4a8e90a74c37d5f03b8a15742f75b0d5245c7ad6c000c7dee9c920240a6cda6bd54401b064f3", 0xcc, 0x4}, {&(0x7f0000000600)="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", 0xfb, 0x5}, {&(0x7f00000002c0)="52c13d073c673293f9db7a0b15a0ea29334a3918258784e1df069be689bfce1daf3fb008ec49b264f3326c543cef876bf11f28", 0x33, 0x4}, {&(0x7f0000000740)="8d361809854bca6ec286cfb0878d0ec8a13da01a3a4c21e243f03d65f9b6bcad4a9706ca8c7e6186239da2c2dd0c44eb4c047d18b1feb94a72be4359e787a31beaa0f46841eb3fb3699b45a1", 0x4c, 0x9e9}, {&(0x7f00000007c0)="dbe26a611fe2a98d27d3fdfcafd2e35d13baacb153b8b91e4855df9192cad657d87be2bc1e681415484feddad52acabfdbdfa55d9ba456fb2da5eec0dfed8697254e0f8f502a41d31041ee4b6bb4d608427cc28dda7fb1fc0937fddaa0ced3e811013edcba143217c0740ece35016a1725dc82a625a1ccbb1980242722d5c83d32709b516ee3698aecfb9dd20754b7abbe0e3e603f90f8b1a3953d343e60e62a683ed05754231fa39f7e47e083b1a05d8f4e9afee6c64c6f91c46db14184e3f1200f6f72eac256a537d8631d3836", 0xce, 0x7564}], 0x400, &(0x7f0000000980)={[{@usrjquota={'usrjquota', 0x3d, 'overlay\x00'}}, {@flush_merge='flush_merge'}, {@discard='discard'}]}) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file1\x00', 0x8, 0x3) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000b00)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2920200}, 0xc, &(0x7f0000000b40)={&(0x7f0000001c80)={0x234, r3, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0x9c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}}, {0x14, 0x2, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x1b}, 0x6}}, {0x14, 0x2, @in={0x2, 0x4e22, @multicast1}}}}]}, @TIPC_NLA_LINK={0x15c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x310fe4c8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x528}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1f}, @TIPC_NLA_MON_REF={0x8}]}]}, 0x234}, 0x1, 0x0, 0x0, 0x20000000}, 0x40040) socket$unix(0x1, 0x0, 0x0) r4 = syz_open_dev$dspn(&(0x7f00000009c0)='/dev/dsp#\x00', 0x9d4, 0x101000) ioctl$SNDRV_TIMER_IOCTL_START(r4, 0x54a0) r5 = fcntl$getown(r0, 0x9) setpriority(0x0, r5, 0x7) bind$unix(0xffffffffffffffff, 0x0, 0x0) [ 2576.827856][T27056] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2576.854492][T27069] EXT4-fs (sda1): Unrecognized mount option "usrjquo0" or missing value 15:14:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003030000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:44 executing program 4: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x40400, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c04, 0xfffffffffffffffd, 0x0, 0xfffffffffffffffe}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) 15:14:44 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0xe803000000000000}}], 0x22b, 0x0) 15:14:44 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x1, 0x20401) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhci\x00', 0x206400) r2 = getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x800000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r2}}], [{@context={'context', 0x3d, 'system_u'}}, {@appraise='appraise'}, {@smackfsdef={'smackfsdef', 0x3d, 'memory.events\x00'}}, {@euid_lt={'euid<', r4}}]}}) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65102c776f726b6469723d2e2f66696c6531"]) chdir(&(0x7f0000000040)='./file0\x00') r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r5, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r5, &(0x7f0000000080)={0x7}, 0x7) r6 = shmget$private(0x0, 0x3000, 0x54000800, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_SET(r6, 0x1, &(0x7f0000000400)={{0x8, r4, r2, r4, r2, 0x2, 0x1000}, 0xfffffffffffffe00, 0x10000, 0x6, 0x3, r3, r3}) 15:14:44 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x400000003f, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x400000, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000100)) [ 2577.130087][T27296] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2577.153671][T27208] F2FS-fs (loop1): Invalid SB checksum offset: 1838753399 15:14:44 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000140)=0xfffffffffffffffb) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) 15:14:44 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0xeffdffff00000000}}], 0x22b, 0x0) 15:14:44 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x3ff, 0x4204c0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x80000000}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000480)={r1, 0x5, 0x3f, "40d18ed08d206b116c2037d9715bb25fc879faf7047a6508657970b6350a651e0c91aa8751db1eca6f78c685c65345b499c898f69437baef8458bc03fd9336"}, 0x47) ioctl$BLKPG(r0, 0x1269, &(0x7f00000003c0)={0x100000000, 0x5e, 0xec, &(0x7f00000002c0)="d42020404fe59146dac925939179a6b03c4f289a16b063b028dd9f1430e61ff4d612bfb76eec0140fe74e5f8e0ed7ed9cc2ba3ee217390fa78418b08f3e89ae5791c4837bbfe15ab48f32d469a9f31e12428ea0797fcb331fda5d6be6c7051c9081aebf268ceac39736cb9b02dcf46fd224288f496329940735e6a552ef6a87179a6527ce02052838b6f1217aa7ca5862dfa5c250d0c80d2adf21b8141e1855a44a1f300544aac80c23ebc886825265d60fda20f6dee24000bdf5f0b9b6ee0f1d71df4fc504d3155900d4362423f81d51eb1240a4ac075c841aaa0c078338b2fec7d8d601002706408764cb0"}) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000180)=0x3) accept4$packet(r0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000280)={'vcan0\x00', r2}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000240)={'team0\x00', r2}) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r3, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000100)=0x1e) [ 2577.212040][T27208] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 2577.251496][T27208] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 2577.286353][T27208] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 15:14:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003040000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:44 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0xf401000000000000}}], 0x22b, 0x0) 15:14:44 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000100)={0x0, 0x400000, 0x5c05, 0x0, 0x0, 0x80}) r0 = socket$key(0xf, 0x3, 0x2) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000040)={0x8000000, 0x20, 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000800}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="30020000", @ANYRES16=r2, @ANYBLOB="000425bd7000fcdbdf25010000000000000008410000001400180000001f7564703a73797a3100000000"], 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x24008004) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r3, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x800, 0x0) ioctl$VIDIOC_G_AUDIO(r1, 0x80345621, &(0x7f00000002c0)) lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@random={'system.', 'udp:syz1\x00'}, &(0x7f0000000380)='*keyring\x00', 0x9, 0x3) [ 2577.492997][T27509] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x4000, 0x0) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f00000000c0)={0x1, 0x9, 0x6, 0x7f87825}, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c80)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRES16=r1, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRESHEX=r1]], @ANYRES64=r0, @ANYBLOB="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", @ANYRES16=r0, @ANYRESDEC=r0, @ANYRESDEC=r0, @ANYRESHEX=r1]) chdir(&(0x7f00000001c0)='./file0\x00') r2 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 15:14:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000180)={{0xffffffffffff0b37, 0x7ff}, {0x1ff, 0xffffffffffff32c7}, 0xa8, 0x5, 0x3}) [ 2577.552734][T27509] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:44 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0xffffff7f00000000}}], 0x22b, 0x0) [ 2577.630014][T27604] EXT4-fs (sda1): quotafile must be on filesystem root 15:14:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003050000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:44 executing program 2: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000140)={0x7}, 0x2e9) [ 2577.704190][T27644] overlayfs: unrecognized mount option "@" or missing value 15:14:44 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x8, 0x0, 0x5c05}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) [ 2577.776885][T27727] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:44 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x389401, 0x0) mq_timedreceive(r0, &(0x7f0000000100)=""/18, 0x12, 0x81, &(0x7f0000000180)={0x0, 0x989680}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000001c0)={{0x2, 0x4e23, @broadcast}, {0x306, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x8, {0x2, 0x4e22, @multicast2}, 'bond_slave_0\x00'}) 15:14:45 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200000, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10010001}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x402, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4800) getsockopt$packet_buf(r1, 0x107, 0x2, &(0x7f0000000100)=""/208, &(0x7f0000000040)=0xd0) bind$netrom(r0, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r2, 0x300, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) bind$netrom(r1, &(0x7f0000000440)={{0x3, @default, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) [ 2577.912027][T27727] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) 15:14:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003060000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:45 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) [ 2578.018371][T27917] EXT4-fs (sda1): quotafile must be on filesystem root 15:14:45 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7, 0x21, 0x1}, 0x7) 15:14:45 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:45 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@default, @bcast, @default, @default, @default, @netrom, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 15:14:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000ac0)=ANY=[@ANYBLOB="7573726a71756f74613d2e2f66696c65302c00a97dc4a02e4a2c6b43e7ac07bca01f39732c2d3c78fed9cb026ea32098c4a7bc82117fd4d069f07da0c47dc79e774934470cee9e8a8bf1c976ffebd3ad0005410321eaac93839b4bee0b2d6ef7a6413493211f38787628d828f812dba44d3f64a52e3d8ab2d977ad613106fb17628d35e2295b12e91b7e2830b8244ae051b8cb4e2ca7e4b1027352d55cf2bdb4b341fb90a0d5d167b62d8686076b67a29489c68d471d956a216293ac2bf13dd35150ae9216490303d01a"]) getresuid(&(0x7f0000000940), &(0x7f0000000980)=0x0, &(0x7f00000009c0)) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xa6, 0xa, &(0x7f0000000840)=[{&(0x7f0000000180)="56f693a63ddcc145e05803c57da560c5985e4e9e44fc80faa586a49d96f3d8f6163ff1ed852d97e867627fa2fbd8fb2fa612502b1b77a7e9afb1acf279f6cd66f19adccba3d0696e8d87d0b2a460811b96103a956be525c1c82f0e8b4ced00be261103088079eb16b78616503a54d6a0ad59a42fc0ef9983bd13c204ea868566e99311537ff79c08e0b968861656c680a3d66214acc587bed031c0b9a2107653e54b3526d74695665ff33b412b7df1ded0a84454da08e83b905432d5ff7b0a10f1d2f8d7fb15907f1f078f9117ebf4994da21fe730db8e9e06406375a7ff79684351d6926f54f07864a2a4", 0xeb, 0x5431542a}, {&(0x7f0000000280)="1b93b952ef9a62bb4bb54b3d6c6b07756eb6109fb2da59bda877f014b2946ea92729fb89c07883ec4e0bc6fa64e21bdf14d19746afe9cfd18a983159f28af29098b4909a11597e3165921abb87d917e613eadd2c05edc7d00541f8ee994cc4e1963bb17e64315bf49dd4243d308f1388f631186936d1fe7c27bc7c3544d820d0e8e18378647b00b9db5fcacfc2c78a19a1566383d95ec8130640a66082c50e75a055bebf9393d07ba7c7469338fd23e21b7e76b0352db6d3e4320b21d474d8f197ec7dae1461b12e98a27193a9beca56cb", 0xd1, 0x7}, {&(0x7f0000000380)="6dab579565015dfdc55bf6a83d43c29ca9b96ed56ab31908497c3639206689d7ecf58a22f279864846a2353db400fd84e941f8", 0x33, 0x2}, {&(0x7f00000003c0)="7bdf297dbcf82bcd1bb950f58abe2c96b47d5d4b3d0f8ed35914a77f67adf2f1e065d3bdbbb0441b007b65ac08e336364f3641276db63591f2990b82e09e9cbad69076bb8f4796e99db9b1afef6bb113ae7192a93e0abb5c388b94d62885267793b444e2d6bbba353373db748b93839cb7bc07cdc4d6723dfb6d22ca05b8b85044021a6053fbe982711bfbdd3e32025008107652549579f7da832b269678e42ddd8f7137f352973dd88129a4e349a3e4ad853b811ab6910a440f2954eec4084e7394ff4eb588cf45fb16c369ae64d9893da45e9829ed9a563e69e9", 0xdb, 0x1f}, {&(0x7f00000004c0)="9a881c4c8fd0e91678a0c61aadf6f2c277ff2ad241bf49c9bf1baea596717edf7eef63b9e93c2aada107c26130adb428f8c6081da014914b0b1b3e4b9d440e753732a9db7678fcd75af64bf93143da7abc351888", 0x54, 0x3}, {&(0x7f0000000540)="9ad9f394aab9bf93aaa9a3d37b54fb32550cc52bd977dbfde2270a25b9255e22c1b3604cec66e682ac70ea20028050ae2200542dc8ce24c780309755f7549f651ae367a5d69e4f6ea496edf8155b9e6c49ea565c9991b88e043ef9f5", 0x5c, 0x80000000}, {&(0x7f00000005c0)="2359d671e673cfef072cb396ac42c0cc2b9027bb7a08103c2cda7abb4de35639fe41720e3f89e84a25d7a58bc7d80fff0891e79a14bedd4e824fba3d0c", 0x3d}, {&(0x7f0000000600)="b6c12ef75a984fc565a7f2ffd0415063e0c8ce0df8941f3ccae323a8965b3236f3153421bb56082c53aad2300e1691d54d92fbf5046d31a5bbdf501d5c657160", 0x40, 0x40}, {&(0x7f0000000640)="db87d111e0eb17b1e12b16dfa472813351aa6451a92aa2ab5f50941e469a91d88df4912fa2008c807c3cf30325d7ad353642e7d1a3a8199b77ffb07851f5d73f11ac8afcf5b9dbc1186a87b073418f88d311e8781340c7fc96435edb8ad6b451248f138dd4e0613da270d9b4f85842da6112ebe028a22bbdefa8e57e7564cb510fb63b47dfb50ffd7b4af8742ea3474bf0249688e5c65a2e567d9ccfb076327754b01b10707f6e7c6253ed02de27ea8ee23863fbf11359b60f9c1b8085a0c24d826957bc252808c4e2e7c46f3fc52d54d6dfe551677f28e4096cb2569c78ccc205653d5f276576461d6a22e6c3a57bc152f988", 0xf3, 0x9}, {&(0x7f0000000740)="a959ddf66e4a1a777a0bf6bcafc99bea0ee850768b93222f215a2e2d7ae89af7a4b6a6be2078251421647b7b6c62f4290fb0cdec3003576d7280935ceac9ab2addfac687085bea5f3baed9c0482d2cc30acbb69c931b4e86e3bca5d13053bef0c57efb6c72d3634dce1e919bad9e0a6c44563724afa8e5cf48d2217f8905101ec4d5e64e6508063a89c6de0ac935e3a9ce43a037172b9efc1d21c98c26f91d7dca492350a49b78b8f3bb4f66f7f1844dd13b35ca59991d2b4f6a7f14155b7577af8c6e281240ea7bca1b89f55152ab22606c9c651dd04bc08cb193970e7b94d2eef123d5726f15a30b767822fa31f546998cd158c6af193f637fd1", 0xfb, 0x1}], 0x1, &(0x7f0000000bc0)={[{@fat=@check_strict='check=strict'}, {@numtail='nonumtail=0'}, {@shortname_winnt='shortname=winnt'}, {@utf8no='utf8=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}, {@nonumtail='nnonumtail=1'}, {@shortname_lower='shortname=lower'}, {@nonumtail='nnonumtail=1'}], [{@euid_gt={'euid>', r0}}, {@smackfsdef={'smackfsdef', 0x3d, '{{]self*'}}, {@fsmagic={'fsmagic', 0x3d, 0x391}}, {@subj_role={'subj_role'}}]}) [ 2578.248068][T28115] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='uppardir=./filee1,workdir=./file1\x00'/49]) chdir(&(0x7f0000000280)='./file0\x00') fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000340)={0x0, 0xfb, 0x87, 0x0, 0x8001, "da13930385e667a4834b5a6769b587df", "0a6580277621fe6f13473f606f24c6243fec37dfd253781b07589eaa6dba422d091e18b802b6e43b3aff4e08c981ad6ab7370503f027cfdf43adfcd875d399ec5b5ffcf280424b9b20a5a2a47961a823e3519c1caad40e4eeb63ff5d4e9bbd8ff5d8083bf492cd1dd432268a3c9e8511c161"}, 0x87, 0x2) r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) [ 2578.378144][T28254] EXT4-fs (sda1): quotafile must be on filesystem root [ 2578.389632][T28115] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:45 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:45 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000bc0)={{{@in=@empty, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000000cc0)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000d00)={0x0, 0x0}, &(0x7f0000002d80)=0xc) r2 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002dc0)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000002ec0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002f00)={{{@in6=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@empty}}, &(0x7f0000003140)=0xe8) stat(&(0x7f0000003180)='./file0\x00', &(0x7f00000031c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003240)={0x0, 0x0, 0x0}, &(0x7f0000003280)=0xc) r8 = getegid() setxattr$system_posix_acl(&(0x7f0000000b40)='./file1/file1\x00', &(0x7f0000000b80)='system.posix_acl_default\x00', &(0x7f00000032c0)={{}, {0x1, 0x2}, [{0x2, 0x4, r0}, {0x2, 0x4, r1}, {0x2, 0x2, r2}, {0x2, 0x3, r3}, {0x2, 0x1, r4}, {0x2, 0x7, r5}], {0x4, 0x5}, [{0x8, 0x1, r6}, {0x8, 0x2, r7}, {0x8, 0x4, r8}], {0x10, 0x4}, {0x20, 0x2}}, 0x6c, 0x1) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r9, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) fcntl$getownex(r9, 0x10, &(0x7f00000001c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0x7, 0x4, 0x2, 0x8000, 0x0, 0x10000, 0x2020, 0x0, 0xfffffffffffff801, 0xfffffffffffffc00, 0x4, 0x0, 0x0, 0x4, 0x20, 0x401, 0x0, 0x3, 0x6, 0x7fffffff, 0x5, 0x7, 0x1000, 0xd5ce, 0xfffffffffffffff7, 0x9, 0x2c0, 0x4, 0x3, 0x4, 0x8, 0x53, 0x7, 0x2, 0x1ff, 0x7ff, 0x0, 0x7fff, 0x1, @perf_config_ext={0x8, 0x5}, 0x200c, 0x8, 0x4, 0x3, 0x7, 0x4, 0x6}, r10, 0xd, r9, 0xa61c27d480109ca6) write$P9_RXATTRCREATE(r9, &(0x7f0000000080)={0x7}, 0x7) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) fstat(r9, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, &(0x7f0000000880)={{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f0000000980)=0xe8) syz_mount_image$reiserfs(&(0x7f0000000200)='reiserfs\x00', &(0x7f0000000240)='./file1/file0\x00', 0x7a, 0x7, &(0x7f0000000740)=[{&(0x7f0000000280)="a9f044d576f260b12d94a55e69ed7049615042bad6683cb087b90341c641d2472c2d5425699018afb5a280f0e0a6a05f96e8f85e73f98b76239f66d652a61d3901b2d1c4fafb3a0a164f0db8f21f2627ef8ed8a9e6aca84b1cfad7c11393f69774ae1d85ecd34fed95563a0fd31cf7da7e2dba969b9c0da8859122b61554a48f0ed84d458d6ead5162f379eba3231e981d625a07b77c5b33c047034420a88f483b2a04a480305fd6eab8d6b95305599f095cf3381df6981452035262d404a8a5fc43bb7c2bb0104abbe5bc120ea8b0c53f8e4cc95af7fe145ff24082fc02d908feebc13ce6e4614ad34214aa365ce413706a1c9e4ac50fa41f", 0xf9, 0xfffffffffffffffd}, {&(0x7f0000000500)="0f9fa306e3f4fec5362cacfc8f763a4a3acdaa23ca7ed3c7f7412c1810c202a2be25b1acbcba4b7e82397dc490aab26233f60f7f19ee306b375ae96b33259ae58216106b9da1fe794a8d8f7075935578499c6720bd47a8869e89841bf4ef59954bb07d12c47f7e311a47e43b46d8329ae6c01d901ffd8e87cd7b54546dee4dbe3e100512d18de9980a9c394ea970fd17f5e8a459ef27238de984b3d6", 0x9c, 0x7}, {&(0x7f0000000400)="15126ce148b3d0add3ceda3e3ca288189d1c9da2ccc39ab392555f6cfe98f1a6548d46db54d931ccb8ccfa65e269cd40a56e9f03999e4a02e43a57b440e970ecdeaf6f6e30d7e0073c16fbfdb3e2f8ad3d3191778b2a919234274c8f4d79f8b585c837fa2f93d5da94987fa1de6173da3b1c", 0x72, 0x7}, {&(0x7f0000000d80)="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", 0x1000, 0x1}, {&(0x7f0000000380)="5b1fa8c3ca5de66e60dfe14a335991090465911a7354f262845ea35617b50c0901d56b5be7279c859c789fdae7f7166d556c736a226f031814", 0x39, 0x6}, {&(0x7f0000001d80)="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", 0x1000, 0xffff}, {&(0x7f00000005c0)="565a470b9c2c4f871266c6a2c45754479b2263484998d10040c11b9a3164a64cf0d02b569ea9608f43e7dbe3df0d4afb8fe09e8edcaa46ee1a0a9e6d186724f4f1b0bbdfaecfd2e57dc0660679a5e65a233bc7cfa91f6138acefa98e31cbac91ecca1585c973974feec293bf4eeb0b3bb268ba5320999e4408e180a53144cb309446120424090bc3a8c100eaa423ef1fcdf7ab206a24322c37f30a73a01944736d3fcc58af", 0xa5, 0xd0}], 0x22000, &(0x7f00000009c0)={[{@data_writeback='data=writeback'}, {@jdev={'jdev', 0x3d, '.'}}, {@noacl='noacl'}, {@balloc_no_unhash_reloc='block-allocator=no_unhashed_relocation'}, {@usrjquota='usrjquota'}, {@balloc_notest4='block-allocator=notest4'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@usrquota='usrquota'}], [{@euid_lt={'euid<', r11}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, '\xf1lo^'}}, {@euid_lt={'euid<', r12}}, {@fowner_gt={'fowner>', r13}}, {@obj_user={'obj_user', 0x3d, 'eth0cgroup\\lo'}}, {@smackfsroot={'smackfsroot'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x0, 0x34, 0x32, 0x39, 0x77, 0x7d, 0x77], 0x2d, [0x65, 0x7f, 0x0, 0x77], 0x2d, [0x0, 0x33, 0x0, 0x34], 0x2d, [0x0, 0x66, 0x39, 0x30], 0x2d, [0x35, 0x31, 0x7f, 0x30, 0x37, 0x30, 0x77, 0x36]}}}]}) 15:14:45 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x1, 0x0) syz_open_dev$video(&(0x7f0000000380)='/dev/video#\x00', 0x3, 0x8002) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000340)=0x4) r1 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x2, 0x2) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000280)) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000002c0)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x1) accept4$x25(r1, 0x0, &(0x7f0000000240), 0x80000) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xfff, 0x2000) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000100)={0x0, 0x0, @ioapic}) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r3, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) ioctl$VIDIOC_G_AUDIO(r2, 0x80345621, &(0x7f00000003c0)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000440), &(0x7f0000000480)=0x4) 15:14:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003070000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) [ 2578.533065][T28414] vivid-004: ================= START STATUS ================= [ 2578.541347][T28414] vivid-004: Interlaced VBI Format: false 15:14:45 executing program 2: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) socket$rxrpc(0x21, 0x2, 0x2) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726440a6a9e02f66696c65312c776f726b6469723d2e2f6634161fb0"]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) [ 2578.623326][T28414] vivid-004: ================== END STATUS ================== [ 2578.637017][T28424] overlayfs: unrecognized mount option "uppardir=./filee1" or missing value [ 2578.662704][T28425] vivid-004: ================= START STATUS ================= 15:14:45 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x10040, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000100)=0xb) [ 2578.670398][T28425] vivid-004: Interlaced VBI Format: false [ 2578.670439][T28425] vivid-004: ================== END STATUS ================== [ 2578.748015][T28446] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2578.750291][T28462] overlayfs: unrecognized mount option "lowerd@¦©à/file1" or missing value [ 2578.780068][T28483] EXT4-fs (sda1): quotafile must be on filesystem root 15:14:45 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f00000001c0)={0x0, @reserved}) r2 = syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x20, 0x403ffd) ioctl$VIDIOC_TRY_DECODER_CMD(r1, 0xc0485661, &(0x7f0000000000)={0x3, 0x1, @stop_pts=0x9}) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f0000000100)=""/170) bind$netrom(r0, &(0x7f0000000080)={{0x6, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}, [@netrom, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom, @null, @null]}, 0x48) 15:14:45 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f00000001c0)='./file1\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1, 0x400402) write$P9_RREAD(r2, &(0x7f00000000c0)={0xb, 0x75, 0x2}, 0xb) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 15:14:46 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400001) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000100)={0x0, 0x7f, 0x7f, [], &(0x7f0000000040)=0x401}) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000140), &(0x7f0000000180)=0x14) bind$netrom(r1, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) 15:14:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003080000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:46 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x2000)=nil, 0x2000}, 0x3}) bind$netrom(r0, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0xe) 15:14:46 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=*/file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) 15:14:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clock_gettime(0x7, &(0x7f0000000180)) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) nanosleep(&(0x7f0000000080), &(0x7f0000000100)) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 15:14:46 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000002c0)=0x0) fcntl$lock(r0, 0x0, &(0x7f0000000340)={0x0, 0x0, 0x3, 0x8b2, r1}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="e3f87065726469723d2e2f66696c65302c00000000000000056c65392c776f72116569723d2e2f66696c6531f8eeb873aa5283498fa298bdfdab030000000000fad68e5b20811325c9258d49e809f52df5138eb4f4a79e1c7f442b8e0b4f169b79b3351178fd1fda3ae4c7f820d7b221622cfcb5667b332466d32d2460b444b9efc4dd34a7141ffe1dc64225a2456ec7cd4a35e5880b06b6eac90bf9e0deb1b4b1081fc1cfb473f5a02e40379de1906d7f34e8453fa1c9e43bb1f4282d78831b7593a99825ea20cd5496211033a8990c8f71c651c956f98c2877083b75db5f91a7548ba90c49187d8faa4c5d723c9c79f5c62d47443fdfa88c9418004847239df2586c91071279564a11b52de902ff6c1544ba09274980ba04dc0e3456ea7e75f9996a1c"]) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f0000000240)={0x0, 0x0, {0x8f7, 0x80000000, 0x2, 0x6}}) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x20001, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='lo\x00', 0x10) ioctl$VIDIOC_ENUMAUDOUT(r2, 0xc0345642, &(0x7f0000000100)={0x80000001, "894e8de899cd44c1f446627b852915a5ba6d1e9a4e1d879ab5d6d98df426fc49", 0x2, 0x1}) chdir(&(0x7f0000000280)='./file0\x00') r3 = open$dir(&(0x7f0000000080)='.\x00', 0x100, 0x185) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r4, 0xc034564b, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) socket$unix(0x1, 0x0, 0x0) socket$inet(0x2, 0x5, 0x9) bind$unix(0xffffffffffffffff, 0x0, 0x0) [ 2579.153979][T28866] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:46 executing program 4: prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000200)) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x0, 0x2) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000140)) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000180)=0x10000) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x140) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000040)={0x8, 0x41646aea}) [ 2579.203313][T28877] overlayfs: failed to resolve '*/file1': -2 15:14:46 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) [ 2579.250970][T28874] EXT4-fs (sda1): quotafile must be on filesystem root [ 2579.299468][T28866] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) lookup_dcookie(0x8da8, &(0x7f0000000340)=""/229, 0xe5) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) bind$unix(r2, 0x0, 0xfffffffffffffff6) 15:14:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003090000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:46 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="75361b6c3abce6a59370706572646966696c65302c6c6f7765726469723d2e2f66696c010000006f726b6469723d2e0002696c6531861ea78b81604f1139c35ff9540c057eee827b70e655de2cfc507040777ca4d67550d6180084d94448aaf24ae2cf83c22d4130afbbcd9a012b37e136a2487e0517ea69ff453565b85b70b080003a620611e30f128fffbf42e8b1d196a85d4708b05ca0a38963536c16cd2ad0a6bda6987e654dc1d2d0dc"]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) 15:14:46 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x400000009, 0x1, 0xcc, 0x9}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f00000000c0)={r2, &(0x7f0000000040), 0x0}, 0x20) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, &(0x7f0000000080)={0x10001, 0x0, 0xf7ffffffffff0000, 0xfffffffffffffffd, 0x0, 0x1}) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x14c, r4, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xb7}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}]}, @IPVS_CMD_ATTR_DAEMON={0x64, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lapb0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xffff}]}, @IPVS_CMD_ATTR_DEST={0x18, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0xa}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x56}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfffffffffffff801}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1c}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x8000}, 0x40) bind$netrom(r3, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)="6c3403ed1c6fdd430611f30f24f592bf06499b8c343c2ddd79225eaf2a5ddb36c5a0d90c6e8265e01dab8db6d80d6e0c55e6ef4593a0257a9a1f08a7bc6eb7a174b7f2870411b1ee200c22a7a0d2322fa469389b2532ec9286da81d6dbb97592bdb3591dbb4c7247c22a2242eba8693d3a", 0x71) 15:14:46 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x3, 0x0, 0x0, 0x120020, &(0x7f0000000180)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@dont_measure='dont_measure'}]}) [ 2579.559339][T29127] overlayfs: unrecognized mount option "u6l:¼æ¥“pperdifile0" or missing value [ 2579.579060][T29129] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:46 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000140)={0x9, 0x0, 0x9, 0x3, 0x9, 0x7ffe}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000180)={0x87, @local, 0x4e24, 0x1, 'wlc\x00', 0x20, 0x0, 0x15}, 0x2c) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) bind$netrom(r1, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom, @null, @null]}, 0x48) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x800, 0x0) [ 2579.610341][T29139] EXT4-fs (sda1): quotafile must be on filesystem root 15:14:46 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./fiZe1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f00000000c0)='./file1/file0\x00', 0x1000000000000000, 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps_rollup\x00') ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f00000001c0)=""/148) r3 = socket$unix(0x1, 0x0, 0x0) accept4$unix(r3, &(0x7f0000000340), &(0x7f00000003c0)=0x6e, 0x800) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000440)={0x3, &(0x7f0000000400)=[{0x0}, {}, {}]}) ioctl$EVIOCGPHYS(r2, 0x80404507, &(0x7f0000000500)=""/50) ioctl$KVM_ASSIGN_SET_MSIX_NR(r2, 0x4008ae73, &(0x7f00000004c0)={0x9, 0xfd}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000480)={r5}) syz_open_procfs(r4, &(0x7f00000002c0)='stack\x00') bind$unix(0xffffffffffffffff, 0x0, 0x0) 15:14:46 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000080)={0x7}, 0x7) [ 2579.756488][T29129] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$9p_virtio(&(0x7f0000000080)='\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x1, &(0x7f00000001c0)={'trans=virtio,', {[], [{@hash='hash'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'usrjquota'}}]}}) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="04120004232aaafd853cc57b80c3a2a8b56dfa7a00000000610900006dfb869ce50000"]) 15:14:46 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x10002, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x117, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r2, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f00000002c0)={0x1, 0x0, {0x100000000, 0x5, 0x91, 0xa100000000000}}) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$SIOCX25SCALLUSERDATA(r3, 0x89e5, &(0x7f0000000180)={0x26, "6f46f82fcd7f016cd3f9df9d4c770ae69e71f334c0f5727e32984a4c7f5d6737036949754d0116f1ddb13620ac101d9ed7374526fc3e5d5bf40ac1489fa2bf2decfc152904e1d51781d95ec481ca8f338c4609fee27504b138e33be715c78720cf6124af5c8986416afb91eb0476a46c0da869621c9eb72547ef763edae2af6d"}) 15:14:46 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) [ 2579.849499][T29416] overlayfs: failed to resolve './fiZe1': -2 [ 2579.858300][T29436] overlayfs: unrecognized mount option "J— [ 2579.858300][T29436] 2®·Æ߃h„eÖ¡uúðR¯ M¹¶fdÚϨ2&zÙ7G‹þ ŽçJ€Î‡Î”qþ‰â$n÷ È5Wyôs&˜Ç®ñâžJ›5˜% eA Åsnó}Ê„û." or missing value 15:14:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d1900030a0000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:47 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = dup2(r0, r0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f00000003c0)={0x7, 0x81}) bind$netrom(r0, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x84000) r3 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x20, 0x80000) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f0000000240)=""/220) getsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000340), &(0x7f0000000380)=0x10) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) perf_event_open$cgroup(&(0x7f0000000000)={0x7, 0x70, 0x3, 0x7fffffff, 0x8, 0x8000, 0x0, 0x1, 0x808, 0x2, 0xff, 0x20, 0x8000000000000, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x62, 0x1, 0xe225, 0x40, 0x6, 0x864, 0x0, 0x9, 0x5, 0x0, 0x200, 0x6, 0x10000, 0xa2c1, 0x3, 0xfffffffffffeffff, 0x37a0, 0x7, 0x9, 0x0, 0x80, 0x3, @perf_config_ext={0xe5, 0x3}, 0x20100, 0x7, 0x8, 0x4, 0x6, 0x99e, 0xfffffffffffffffb}, r2, 0xc, r3, 0x0) [ 2580.007575][T29466] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 2580.027771][T29601] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:47 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file1/file0\x00', 0x42) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x81, 0x0) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f00000000c0)=0x400) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) bind$unix(r3, 0x0, 0x0) 15:14:47 executing program 2: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000500)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f00000001c0)=0xe8) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) llistxattr(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)=""/154, 0x9a) setxattr$security_capability(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)='security.capability\x00', &(0x7f00000008c0)=@v3={0x3000000, [{0x6, 0x7}, {0x4, 0x4}], r2}, 0x18, 0x1) stat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="02000000010000000000000002000600", @ANYRES32=r1, @ANYBLOB="2000d34c", @ANYRES32=r2, @ANYBLOB="040002000000000008000300", @ANYRES32=r3, @ANYBLOB="10000200000000002000030000000000"], 0x3c, 0x1) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) execve(&(0x7f0000000680)='./file0\x00', &(0x7f0000000780)=[&(0x7f00000006c0)='\x00', &(0x7f0000000740)='nodeveth1\xb4\x00'], &(0x7f0000000800)=[&(0x7f00000007c0)='self&proc*@keyring\x00']) 15:14:47 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200800, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000040)={0x2, 0x800}, 0x2) bind$netrom(r0, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) [ 2580.195061][T29601] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2580.216876][T29680] overlayfs: unrecognized mount option "uppdrdir=./fikIóp:le0" or missing value 15:14:47 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d1900030b0000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:47 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000140)) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) mbind(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, &(0x7f00000002c0)=0x3, 0x3, 0x1) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000000)=0x10000, &(0x7f0000000040)=0x4) mlockall(0x6) bind$netrom(r1, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f0000000180)=0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f00000001c0)=r2) fsetxattr(r0, &(0x7f0000000200)=@random={'osx.', '/selinux/commit_pending_bools\x00'}, &(0x7f0000000240)='eth0]keyringsecurity\x00', 0x15, 0x1) 15:14:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYBLOB="7561462c678769ec65302cc800000000000000"]) r0 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x8, 0x40) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0xfffffffffffffffe, 0x2f, 0x1, 0x8, 0x42}, 0x14) 15:14:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x400, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 15:14:47 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./file1\x00', 0x100) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm_plock\x00', 0x80, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f00000000c0)={0x2, 0x3ff, 0x100000001}, 0x6) fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000080)={0x7}, 0x7) 15:14:47 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) [ 2580.459672][T29990] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:47 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05, 0x200}) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/12]) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r1, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) 15:14:47 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) [ 2580.570534][T29990] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2580.593718][T30059] EXT4-fs (sda1): Unrecognized mount option "uaF" or missing value 15:14:47 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file2\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x3) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) 15:14:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003100000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:47 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000005c0)={0x400, 0xffffffffffff1310, 0x2, 0x722, 0x5, [{0x0, 0x8, 0x1, 0x0, 0x0, 0x8}, {0x6, 0x4, 0x3, 0x0, 0x0, 0x2000}, {0x7, 0x9, 0x7, 0x0, 0x0, 0x2}, {0x80, 0xfffffffffffffffc, 0x2, 0x0, 0x0, 0x2880}, {0x5, 0x2, 0xfffffffffffffffe, 0x0, 0x0, 0x1085}]}) r1 = syz_open_dev$dmmidi(&(0x7f00000007c0)='/dev/dmmidi#\x00', 0x3, 0x204182) perf_event_open(&(0x7f0000000740)={0x5, 0x70, 0x4, 0x522e6ed5, 0x80000001, 0x6c2, 0x0, 0x4, 0x4000, 0x3, 0x2, 0x6, 0xc8, 0xff, 0x1e32, 0x200, 0x3, 0x6, 0xffffffff, 0x1, 0x0, 0xff, 0x0, 0x1, 0xffff, 0x7, 0x4, 0xfffffffffffffffe, 0x8001, 0xffffffffffffffff, 0x4, 0x400, 0x0, 0x7ff, 0x1, 0x0, 0x1ff, 0x7, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000700), 0x5}, 0x50f3, 0x9, 0x20, 0x0, 0x9, 0xfffffffffffffff8, 0x6}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xa) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c02, 0x2000}) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x104) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r3, &(0x7f00000004c0)="0f5c6804d6a94538a8acb25004c011d8f2afd7392f9da8194c2af03fb2307f5ea2ec08d79f177153278991cd2f6edf995d5f98bfd90c3a38e583f0c38818b8381ac42cf2", &(0x7f0000000540)="6b4b98491572e04fcd9ddd0ef7a76d7ddddca0afebc449ace1ec4e2d24e32644522795ced40c02cc26909ab5272db7f25b655131143c8ff75aba1c0113492300000ed3b20d5db05666661630b39f4812818c12ff96828619e0f912f33f", 0x2}, 0x20) bind$netrom(r2, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) readv(r2, &(0x7f0000000440)=[{}, {&(0x7f0000000100)=""/190, 0xbe}, {&(0x7f00000001c0)=""/222, 0xde}, {&(0x7f00000002c0)=""/71, 0x47}, {&(0x7f0000000340)=""/235, 0xeb}], 0x5) 15:14:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") exit_group(0x200) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x800) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000340)={0x3, 0x0, @pic={0xffffffffffffffc1, 0x81, 0xdb, 0x6, 0x9, 0x8d5a, 0x4, 0x3, 0x2, 0x6, 0xc23b, 0x2, 0x40, 0xbf, 0xfff, 0x5}}) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x100, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 15:14:47 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)) [ 2580.875504][T30361] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:48 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x200, 0x101) setsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f0000000040)="a0aa40c03ef73f167df50ac0830e3ffdcfcf6b8d409d2a90", 0x18) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r1, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) 15:14:48 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240)) lsetxattr$security_capability(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='security.capability\x00', &(0x7f0000000280)=@v3={0x3000000, [{0x0, 0x1}, {0x73, 0x7}], r0}, 0x18, 0x1) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000080)={0x7}, 0x7) 15:14:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) uselib(&(0x7f00000002c0)='./file1/file0\x00') chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000ac0)={0x0, 0x0}, &(0x7f0000000b00)=0xc) fstat(r0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000600)='vfat\x00', &(0x7f0000000640)='./file0\x00', 0x200, 0x7, &(0x7f0000000a00)=[{&(0x7f0000000680)="8de234bf91b96cccdae9b2f251a7a668952088a33d81144e5a1afd1907880f99a613ee22c956a3a407280c080929316c217ca4d6aefb646d8dd0fc718a8f4fa5e0", 0x41, 0x9}, {&(0x7f0000000740)="2805df02d57b1041066e8df5722f688cb2655f10d4041ea6d863a9d005a068f2c1b882e849ed39b7176451e7bafd8d93c251702772685a66a3b4542d51047a9dcd5725c0476e449ffd94d5abec5e798438b841f0b65a3f89e449f4dfb8e0e59748004b6790111d3815cd13529b1ab8a07d5ecd44961b0ea06af54a86c54dd43ec337d33f7d6f5a11f7f1494bf988774d871f", 0x92, 0x3}, {&(0x7f0000000800)="1706189338a73afa45869425e393cab2a837a509edd9acb7a476ae0afbaf4730068572de37ca", 0x26, 0x7}, {&(0x7f0000000840)="51e3218649b16a91d356a86aaa0131cd7b9602a3484284a676c7ac3bdd5d274c5b4ba1ee4deb85aaa9dd59832ea7161b56263b56a4f62fd835f47f2292f06f62af94933aed7b425a3ac68d9619b4b4f3b5dd2093812bb86fe33c6fa1ecf3324ca0000a64bd81cd86d51584006c88e377dd749abbb6f94c947431a93e39a6b95056ea045e186b89307ddc2fdd7438", 0x8e, 0x7}, {&(0x7f0000000c80)="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", 0x1000, 0x55d3}, {&(0x7f0000000900)="87264c154230608976982868588204cf0aa75308f8694da80cedc56ca14b80fa14c795ef0c137989be1915e7e2da2f2890de7e", 0x33, 0x1000}, {&(0x7f0000000940)="88a9998b0c03586ac8c36f7f3406f382db96b402914cce976aa6ca7afd6f445b499dd83041dde70750d20e83145d44aadb5af4402f1989334803ae6bb35710f274e0502fd0ba2df1b1e5e2eb8319c66bf6800e242cad69f9d9fe7cc333d6db20395add9b2baab3d7521d9ea4ed36124910460773c945fe66a4e36f910b6b916648a765133592347b431e87ad2804d9169a6049b00d44cd78d21b", 0x9a, 0x5}], 0x80, &(0x7f0000000bc0)={[{@utf8no='utf8=0'}, {@shortname_mixed='shortname=mixed'}, {@uni_xlate='uni_xlate=1'}], [{@smackfshat={'smackfshat', 0x3d, 'nodevprocppp0'}}, {@euid_gt={'euid>', r2}}, {@euid_lt={'euid<', r3}}]}) lstat(&(0x7f00000001c0)='./file1/file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000000100)="596d8eee", 0x4, 0x2df}, {&(0x7f0000000340)="4c526c3dfc66de28f21dcf1d751e7e884ec999d536d02efa4d96e0b90c94b01f6c4891016a39769717ee5a753ea2c32ba60cf870bdbb3ab7a843e9b71f3e4d452e783fe98fec406c1d38338beef6af8e86ace24e8c9dce33204f4b7e8fefd8b64e758eb5bb9a61c53523126f2a38a2967faf99a97187b46c5bd0b6c208c9f6ab6b56de80c21316711e65a706488d00dff9677dabff1ae9db90c14e3e7cd3ef9a0e28b9e168f4b25ee0c3600e45d23c074739fc63e0533ab47c069a0e122cf5cf342852592a3a8f1195c1f3fdd72045ee599a9ae689c959fa6d13d5b21d39ccde8d139ec2fd", 0xe5, 0x7ff}, {&(0x7f0000000440)="e2638c5ad7fd8035ac913fb305fa2def3ae2a351a764d977a3167ce83592dded909eba64165cdf7861910f1c138c06d89b0978cc40fc1339ad97bcbda2b95becd72039719f564bdcdb6c3b14ef9dccc1354d8e4d6e9fdf209601a9c349a1eabd6702c0130714bfa56507f029f8252075460b121728a9553d6aaa10fc4daad8c4ddab4eb675ac21b1e85c0d1ad27a75ea26065a2b5dfc65c6b68a5ade", 0x9c, 0x33}], 0x1000000, &(0x7f0000000240)={[{@nouuid='nouuid'}], [{@obj_role={'obj_role', 0x3d, 'overlay\x00'}}, {@fowner_gt={'fowner>', r4}}]}) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x1fffffffffc, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 15:14:48 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) [ 2580.958023][T30438] EXT4-fs (sda1): re-mounted. Opts: [ 2580.964524][T30361] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:48 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$update(0x2, r0, 0x0, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) 15:14:48 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.e\x01\x00\x00\x00\x9f\xd8P\x01\xb2\xa7c\x8f\x82s\x00', 0x26e1, 0x0) fsetxattr$security_capability(r0, &(0x7f00000001c0)='security.capability\x00', &(0x7f0000000180)=@v2, 0x18a, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) 15:14:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003230000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:48 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000000)=0x400, 0x4) 15:14:48 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) [ 2581.164702][T30501] overlayfs: unrecognized mount option "uppeYò^K=./file0" or missing value 15:14:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x220000, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000200)={@multicast1, @multicast1, 0x0}, &(0x7f0000000240)=0xc) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000500}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000002e0000002bbd7000ffdbdf2500000000", @ANYRES32=r2, @ANYBLOB="0f2fffff0400e6ff0e00f2ff08000b0001f8ffff08000b000600000008000b00090000001e22e320e32d394de6bd33756b831d6f6442917c41682c800e1ebfdb2eb3ff7492fad3b593b3"], 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x8010) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000400)={r1}) ioctl$sock_bt_hci(r0, 0xc00448f7, &(0x7f0000000340)="2b0ce80db983116b7e22b6847645cd005836ce611c47b1b3fb4d8d6292bac2") [ 2581.274377][T30651] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:48 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) connect(r0, &(0x7f0000000000)=@ethernet={0x306, @local}, 0x80) 15:14:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 15:14:48 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:48 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x21a) [ 2581.409772][T30651] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2581.439962][T30778] EXT4-fs (sda1): quotafile must be on filesystem root 15:14:48 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000100)={'eql\x00', {0x2, 0x4e20, @broadcast}}) bind$netrom(r0, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000040)='ns/ipc\x00') 15:14:48 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d1900032d0000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:48 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x2, 0x80000) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000100)={'filter\x00', 0x2, [{}, {}]}, 0x48) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r1, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) 15:14:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x8, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)=ANY=[@ANYBLOB="7573726a71756f746100c3303d2e2f02006c61d8fba4d94c48c02706009a906e600e83269d961d6f15000000002f7ee77e8e2eeba25bdc7d4cf6d2ab3ed9d27c97166edfa393fe4f094665"]) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='./file1\x00') r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000300)={0x0, 0x69}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="b5000000ba770507632e344a98aed3d777da94ce3a9a67af8f34a322315c97b451be59c7c165df772ca6f113832d07a8f01a00ade731fcbe9008c220a486db21450819c0ec34417a1d52d9a3f6a87793f7601c97bc039b736c64178a1e4959f04493e95c945fb6f94d3cae1ce3f32f8766952418cf80a9e255f6192d4a12aa7df68e21157f6b950fadf5d73337c1d8387c9bc4384059bb0e78c017b1c137b8b51d9050e27049b73975578599b77c5d6fbb6122f0d095be43a6"], &(0x7f0000000440)=0xbd) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000480)={r1, 0x0, 0x4ab, 0x5, 0x9, 0xfffffffffffffffd, 0x1, 0x7, {r2, @in={{0x2, 0x4e21, @multicast1}}, 0x0, 0x1, 0x1f, 0x2, 0x9}}, &(0x7f0000000540)=0xb0) r3 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x8, 0x8000) ioctl$TIOCSERGETLSR(r3, 0x5459, &(0x7f0000000180)) bind$netlink(r3, &(0x7f0000000200)={0x10, 0x0, 0x25dfdbfb, 0x84000004}, 0xc) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f00000000c0)) 15:14:48 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,loierdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) 15:14:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) sendto$inet(r0, &(0x7f0000000340)="bb8f4915ebf590caf13ea8985b413f664ac5876016fb8f5599725964ae4eba11bada4e505ebf9dc2d2b48efb32ddc08b128c20486c980a10cdfba3fcfc08e418038de34ddb29f24ae0d134782d60fd4dc4778ec217db7b254cf42ae56c59ce2257a43ee484585ceb52c6146c79a7e6641490f6de71f3fdb34702eecd5c64f1aae00474847d7716a648a1b2cf88b067ab6df0ce17864cd9d7155ec3e7111723259cea882626aabad720de795938a20c4ad9a91591bd5eb8da490c7ffbb91fd0aadc7aec9e49ec2282c89154fa7f7c9459c8e8614354a9c9dc6fda087adc9f0dec490755a082c1ae3d", 0xe8, 0x10, &(0x7f0000000040)={0x2, 0x7, @multicast2}, 0x10) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) bind$unix(r2, 0x0, 0x349) 15:14:48 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) [ 2581.772266][T31024] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:48 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05, 0x0, 0xc}) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2000, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r1, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) 15:14:48 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) [ 2581.855065][T31118] overlayfs: unrecognized mount option "loierdir=./file1" or missing value 15:14:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x100000046) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) [ 2581.958114][T31024] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x1d4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="75707065726469f33d2e2f66696c65302c6c6ff765726469723d2e2f6669f9a7063e256d312c7730792111c9354b2c6f726b646986"]) chdir(&(0x7f0000000100)='./file1\x00') r1 = getuid() syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000140)='./file1\x00', 0x2, 0x6, &(0x7f0000000740)=[{&(0x7f0000000340)="bb98d5fc5170c13655bc5e69c5ad909fda91a5613b3b07779de2d11f46560706c9c644a6d39531e990926a974a535823d1faddf61d6c78e86b1203f22de8096cb29c2a1ea0a656e3f3ecc1f412133221e96d75c38b8ae725c01090c6578a3cfd57b3f88f2805a3e702e3689f5090057bb6df4bb281bff1e44aac4e2b29ff484b506b0bc6274a0d5d2bf254fa410dd380ab2dba07e0e7a5e053d726de58b88d3685440856450cef5b6c64892d3f40a4f86de4aa819e7af75620d8c8397ae999830083f3fc15315a8d217cc13512e9bb3eb4f853629106a4dd894afb53080637faafeffd3ffc", 0xe5, 0xff}, {&(0x7f0000000440)="797846e97966e81fb21a9cf38399b284d777df11b89fbca70229b7dfa59a6719c49ee05e95d1053589c4c4390a3a92b8f771700e09d2c23888cbef2ca4e8fbc27c54fbf3acb0ffa1b7888dcf77efefa73eaaeae566569d04d08c7861f175e52b9b506fa0698682925136e767703f6b28b97ac29c3cfe73f23655168e2816123062515b1b9b0aa74b2a40d28b098e4a0a68265a303984548e09ca8e5f3e0b8ae2da9258cf67c4e6f7f4e9d718919de7648f9b1200273a8374416dc9b41a7b882194fd108dbfe4f552f83962c2040ceeed7db12887929e58c01d02aadc08", 0xdd}, {&(0x7f0000000540)="e3b3cc88948ffa1b23c77338e6972965fbceaedeae4e0e026b0c1c3e516326f281d32954af8374c94540d645b9e554eaa4668bcf022d2cf945a2021976a242fded5cdd882dfadd8f7fe81bc7b9c578ef7b1b8c272f8aaa2c4c80a79b293ed654c85a3de96470181054f10cda960d69b28d11515f635cbbc8c25e0494d2c16758c44dceb42e8feaa630ff28b61056e8449dbbf743c8a6f346d036ecfbc8940c67fd77397b6ad437e7ae6e6d1a372b18a0c16e9fd834bad33d2254e2a22e3920372656f0cd7674dd91526bf4934e8c2e82ed076b3cdae7d6990ca4b11985790888c4b3c46b9a017d597b7105c41fecb0081de7ea993afa1c", 0xf7, 0x8a78}, {&(0x7f00000001c0)="5d49a568aef9083286a7a5e1955dbe0afed9e5c0", 0x14, 0x4}, {&(0x7f0000000640)="92c4e46cdbb653be022534e0c4c4aa74d7a82f48c6df18af1ce7fdf784807a3d27cafe6b42e183252305f533c08c9b9d762635fa038e38164f769ec492d1d6066ebdcc520d223005b8d4a57f5487df95d82dd394c5eb0e5c55dfc44877cf8652ddf7e2197531047aff4f3e6275e3db0cb2d31ff781f4d0dde66e90409819ec55f1b57d16a2f081078ddffd8163eee46d38a2153abfb0c2465900dccfa930e96e321ec450c0105660c28a4a2c12fc204d191f878ec35ac059ef", 0xb9, 0xff}, {&(0x7f0000000280)="98096f9abc73c14e47d877cd6b944816458638a6fbc1b08fa5708da267167b074c12c43214d90d862659ac6005", 0x2d, 0x7ff}], 0x800000, &(0x7f0000000800)={[{@dots='dots'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}, {@dots='dots'}, {@fat=@check_relaxed='check=relaxed'}, {@dots='dots'}, {@nodots='nodots'}, {@dots='dots'}, {@nodots='nodots'}, {@dots='dots'}], [{@fsmagic={'fsmagic', 0x3d, 0xc985}}, {@hash='hash'}, {@fowner_eq={'fowner', 0x3d, r1}}, {@smackfshat={'smackfshat', 0x3d, 'overlay\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, 'overlay\x00'}}]}) r2 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000240)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 15:14:49 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05, 0x274e5be1}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000000)) bind$netrom(r0, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x8000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x9, 0x3, 0x390, 0x0, 0x0, 0x0, 0x118, 0x0, 0x2c0, 0x2c0, 0x2c0, 0x2c0, 0x2c0, 0x3, &(0x7f0000000180), {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffffff, 0xffffffff], [0x0, 0xffffffff, 0x0, 0xff], 'bond0\x00', 'netdevsim0\x00', {0xff}, {}, 0x2c, 0x9, 0x2, 0x21}, 0x0, 0xf0, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x118}}, {{@uncond, 0x0, 0x138, 0x1a8, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x20, 0x2, 0x1, [0xd560, 0x7ff, 0x9, 0x0, 0x800, 0x8, 0x1, 0x80000001, 0x1, 0x4, 0x1, 0x29b, 0x4, 0xffffffffffffffb9, 0x7, 0x1], 0xe}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x6}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x100000001, 0x0, 0x1, 0x0, 0x0, "fcbd68fea6ac23d61dbcb6519b7357a7b172a975f7ee035fa77b1e5e412ca722b6cbfd2a45522484af436718cdfb21942c74afb0cb6def718a60e1095fb42a6f"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SIOCX25SDTEFACILITIES(r2, 0x89eb, &(0x7f0000000100)={0x3, 0x3, 0x0, 0x7, 0x40, 0x16, 0x2, "86eb4d70dcb672488476c22ac8346d9bba700c69", "f61153756664fab5c34acb0b28719d2e1c148932"}) 15:14:49 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003480000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:49 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x3, 0x400000) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000180)) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000080)={0x7}, 0x7) [ 2582.117584][T31441] EXT4-fs (sda1): quotafile must be on filesystem root [ 2582.137615][T31445] overlayfs: unrecognized mount option "upperdió=./file0" or missing value 15:14:49 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:49 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000140)={0x0, 0xdf, 0x20}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e23, 0x1, @ipv4={[], [], @rand_addr=0x9}, 0x4}}, 0x20, 0x727, 0x4, 0xfffffffffffffff7, 0xc852}, &(0x7f0000000280)=0x98) mlockall(0x4) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x123600, 0x0) setsockopt$packet_fanout_data(r3, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f0000000040)}, 0x10) bind$netrom(r0, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) [ 2582.267399][T31445] FAT-fs (loop1): Unrecognized mount option "fsmagic=0x000000000000c985" or missing value [ 2582.305003][T31563] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:49 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000140)={'ip6gre0\x00', 0xa8, 0x20}) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) 15:14:49 executing program 3: r0 = socket(0x13, 0x8000a, 0x7fff) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000240), &(0x7f00000001c0)=0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x1000000}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f0000000200)=0x4) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 15:14:49 executing program 4: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000080)={0x0, 0x0, 0x5c05}) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x801, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x1f, 0x1000, &(0x7f0000000100)="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"}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r1, &(0x7f0000000080)={{0x6, @rose}, [@netrom, @bcast, @default, @default, @default, @netrom, @null, @null]}, 0x48) [ 2582.438303][T31563] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:49 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f00000000c0)='./file1/file0\x00', 0xfffffffffffffffc, 0x1) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 15:14:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x80000, 0x20) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x94, 0x0, 0x0, 0x4edd}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000280)={0x4, r1}) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) getsockname$unix(r2, &(0x7f0000000180)=@abs, &(0x7f0000000100)=0x6e) [ 2582.549989][T31783] Unknown ioctl 1074808211 15:14:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d1900034c0000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:49 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = accept$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x8000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x54c15b114d6030c6}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r3, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x801) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x6, 0x9}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000340)={r4, 0x1, 0x95, "0f5f0e4005561c97a5203310c5930cbbcb705cdeb358d71e20d9846c0464a2aff2fd08432b00f1c583b5638ab7c8c70b74154369af2c4c96a4f135acce769580a3a798d9423461b92bcd14632786a77053d7b2bf445fcc1bc04faf10c685e0bcf2c2027feb84e6bbe15ef96c2e2bb0dd336188fb77ddd6947c5933f322e0e9bd77251730eedf09bafc2a92d42504190a7e6325e718"}, 0x9d) chdir(&(0x7f0000000280)='./file0\x00') r5 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000140)='./file1\x00', 0x0) r6 = shmget(0x2, 0x2000, 0x10, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r6, 0x3, &(0x7f0000000580)=""/162) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x1) link(&(0x7f0000000040)='./file2\x00', &(0x7f00000000c0)='./file0\x00') ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 15:14:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f00000001c0)=ANY=[@ANYBLOB="7573726a71756f74613d2e2f66696c65302c0026b397002ff631614a3a486c9a86bb578eabfddfc23284357a0d2ec362a3157d8eb377cdf2806943e6f0d578d905a8a64f7951b6b296f24c2cb3e15a220d8f31cb59"]) r0 = accept4$rose(0xffffffffffffff9c, &(0x7f0000000080)=@full={0xb, @remote, @bcast, 0x0, [@netrom, @rose, @rose, @bcast, @remote, @null]}, &(0x7f0000000100)=0x40, 0x80800) ioctl$sock_netdev_private(r0, 0x89f8, &(0x7f0000000180)="1a81c32e0dc7bf61c97bb080f6bdb1b4cb4636871f5f4224aab3084d091881760489e0a31395258cb8025e27d344a0fc18773a9d806066") 15:14:49 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="7570723d2e2f66696c06302c6c6f77ffffff7f000000006669e850312c776f726b64694edd3c77aa1f05723dd6cb734b2c52325f683a903f8f0000000000"]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) [ 2582.710806][T31905] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="75bd886ca7c79b707065726469723d2e2f66696c65302c6c6f7765726469723d2efd551807a7858d9b6f726b6469623d2e2f66696c6531"]) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) [ 2582.827174][T32010] overlayfs: unrecognized mount option "upr=./fil0" or missing value 15:14:50 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = accept$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x8000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x54c15b114d6030c6}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r3, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x801) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x6, 0x9}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000340)={r4, 0x1, 0x95, "0f5f0e4005561c97a5203310c5930cbbcb705cdeb358d71e20d9846c0464a2aff2fd08432b00f1c583b5638ab7c8c70b74154369af2c4c96a4f135acce769580a3a798d9423461b92bcd14632786a77053d7b2bf445fcc1bc04faf10c685e0bcf2c2027feb84e6bbe15ef96c2e2bb0dd336188fb77ddd6947c5933f322e0e9bd77251730eedf09bafc2a92d42504190a7e6325e718"}, 0x9d) chdir(&(0x7f0000000280)='./file0\x00') r5 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000140)='./file1\x00', 0x0) r6 = shmget(0x2, 0x2000, 0x10, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r6, 0x3, &(0x7f0000000580)=""/162) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x1) link(&(0x7f0000000040)='./file2\x00', &(0x7f00000000c0)='./file0\x00') ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) [ 2582.881503][T31905] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2582.903049][T32012] EXT4-fs (sda1): quotafile must be on filesystem root 15:14:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003600000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) [ 2582.960888][T32079] overlayfs: unrecognized mount option "u½ˆl§Ç›pperdir=./file0" or missing value 15:14:50 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0xfbfffffffffffffd) io_setup(0x7, &(0x7f0000000140)=0x0) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) io_cancel(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2, 0x0, r1, &(0x7f0000000d80)="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", 0x1000, 0x401, 0x0, 0x2, r2}, &(0x7f0000000200)) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000280)=0x7) fsetxattr$security_capability(r3, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r3, &(0x7f0000000080)={0x7}, 0x7) 15:14:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x200002) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400000, 0x1) umount2(&(0x7f0000000080)='./file0\x00', 0x2) 15:14:50 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6b6f7765726469723d2e2f66696c65312c77a9726b647f6a0700000000000031"]) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f00000001c0)=@req3={0x0, 0x3ff, 0xad, 0xc8d0, 0x1ff, 0x8000000000, 0x3}, 0x1c) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000340)='/dev/adsp#\x00', 0x1, 0x40200) getsockopt$netlink(r3, 0x10e, 0x6, &(0x7f00000000c0)=""/34, &(0x7f0000000100)=0x22) socket$unix(0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000240)={'bond_slave_1\x00', {0x2, 0x4e24, @broadcast}}) bind$unix(0xffffffffffffffff, 0x0, 0x0) [ 2583.139947][T32308] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:50 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = accept$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x8000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x54c15b114d6030c6}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r3, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x801) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x6, 0x9}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000340)={r4, 0x1, 0x95, "0f5f0e4005561c97a5203310c5930cbbcb705cdeb358d71e20d9846c0464a2aff2fd08432b00f1c583b5638ab7c8c70b74154369af2c4c96a4f135acce769580a3a798d9423461b92bcd14632786a77053d7b2bf445fcc1bc04faf10c685e0bcf2c2027feb84e6bbe15ef96c2e2bb0dd336188fb77ddd6947c5933f322e0e9bd77251730eedf09bafc2a92d42504190a7e6325e718"}, 0x9d) chdir(&(0x7f0000000280)='./file0\x00') r5 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000140)='./file1\x00', 0x0) r6 = shmget(0x2, 0x2000, 0x10, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r6, 0x3, &(0x7f0000000580)=""/162) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x1) link(&(0x7f0000000040)='./file2\x00', &(0x7f00000000c0)='./file0\x00') ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) [ 2583.252542][T32308] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2583.265130][T32397] overlayfs: unrecognized mount option "kowerdir=./file1" or missing value 15:14:50 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) pipe2(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)=0x0) fstat(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000006c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000800)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x22000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x7c, r4, 0x8, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x44, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffff80000001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2de}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xb8e}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) stat(&(0x7f0000000380)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000140)='hfs\x00', &(0x7f0000000180)='./file1\x00', 0x6, 0x2, &(0x7f0000000280)=[{&(0x7f0000000d80)="f08b7287dd0f59b041108430629d83738e18282ef184e7bb86c89ce8d203b29f91572d76851b4b6dabcad6ebf2b4cd18a699f4cb619319c9f4ddfbde852a44c102640b4c69142366673df667ce3500db866def0c1c2300f439e16f3a7c9371b89e541d25867883f4ffc0a26dbbccd089576240d133ce1b14b0d8d22407a79767a188c930105104e8aa0c4d1cf3364f8b851fe42b728ab1943e8346b6fcd8ab52823f518b8f470cddda52bd069c390db600754cb30ec07220149423064dcc696c552bcf377ffa987413f0eee609a2e7736ac25810ff29bf326352d038b849fefef74a7bda5ce175a21fd65b9b6bf3b4d81e8aa41adcef232450a83fceab494da505299338a97e878b9d7fab953868dbb439f80e5184612d2c9f95c782084c7a409b230ac6c930b8c7557953bad6a0bd2eeaeb9d3ce97fbc0911e6e14218ac8abb81f999f8234a1edad06e606e4418d1d3305cb0add36d58dd2e0a650616e6830f65e5c2736580c41d3e19cc081abc2793165da3fdbff0297e64606c3f086eaec6c3e8a711ed886e09e12a9e26a1b2eabb8d5b9001edede4ce48d2206a146df0384c1b1a3262967a4b4c03cdb6eeedfde1412a5a19c25e0ea021dbbac413841deb9e34e59acb3cb85a95b75445e87c57422765ef52b78cd7001a75440f08a494db38454dc5a1d6d32533a4f4ca0f228a6cd72872d08d97b6b24f8db1ac2b8128d8a1a6f2a3b07506fbaed270fd3ae0c20263c0f21dc698739fbfde3cdd83f26ee8e539e7af9ebbe2d73ab346ec30281c9dbfba19ae40ec9872e49aecfeb68a46cd61a38dfd2703dfccf607ae4c7210eff328f3fbbc4cba0d79ec63425c43aafac15fa3e48ebd2c1d9aedb23ac8a49a5912278d14b4f74c3b4ae6da029e0bcd5bb8eb43d328180b5dd4483a4b5ef3d687545fb7b308a4065263e6dd082450e574ed1f99a8f91610534b0b3f3aeea0154977a63c283756638bb42dbc3e49495fa69b365e4fe19146530e60c3497591e40e744ddf051868e750683267dc5ced7fe3f8cbf195ffa3bb74810d68923845582f19fb1d71c050526b11a9795bf1a3bb750cac29b40118997591040c944ee63937294eee59006323961b8fd2d8bdc9a44c172e32f771185e0c868fadc4467f6b66d8ab3d49e7d85ded462a0aebfe352e2713e73b957690b58eb8483f3658f26b63645805bd69ec4a27307436d55995bfb5f41dbb2ba53ad446abf897f87bc51e5e34ba6ef568efea59bd2fb43442151edaf5353154dde4af1390c33994d83ec9fb46a48880bda8d5146fbb2a7d640a7e91084ef8b0d752c3e123d2464b4c3c21b9a449cf467b666eed8156714550d52324ae5c68af8db71a81c9cef9c4590671f2bcf9d95c0fd2bbc4b76ecc0352e440aad15df5f0f3a1d7f03292d18e7d0ed83b71545bf382ec878abd542dd2a7a535917c351650d457cb9eb715763049dfa09db6360742765f2639966cbfd1a7d30324d65d3388253c1b7d2bd2e418c03a20e7747d1d85aefef05f27fcd4bccdea14479e1ef903eabdab8321ea1fd5fa21bf9bfe3b590b220e4668de45faec61d91b43040b4aa86edff346d602e433103957c218b410d9f13dae73058935747b6e3307436da11d9324d2c2947076a0656b31bb9ab04fe094ca7d22f82bb0384a6385975de93286a8c087a10a766976ef74fa72bafc49b5fd92603dcd8614a28ef737e219472d5d03a88409db34903ae9eb2f364c3b711ca6daf36467a4d098d026612adeffcc02741a2f900cf2ba2bf7286b94098911fd95faf33bd60f9bf6de6283c55a0afc54099340d395fc8f1c72bcefac37b85e4da638e27fcc7353c079a9853bd31586e8d4bcb2349a5ab535628be27872b5634cf10c8c84b093af4005401e19b266121d296a73716c8f8e0c0226192d42bc8fb9533d28bd2c9a451078b696cb4728ef5b23bc83d86debd949d29b114491f2644a0c91760fd6a9dba2fdb4866ff04bac82f24f493403b34e7bf4e6d40cb281b689f5f11118ec9e5b75d6949244a3d546c6714a59356a3762082ab5c6eaef63a79c73f2e8b716404cc30baf2aee907527eef0d1d80c35657e9067ad556b9c873c964dee0142398f69d34f08c6256b7e8f4f0156ee8428a138a8d79921a8ce668089aa4a2e9f4b376f1f3676ba74e20239e84f58db160d1d5be833001c280f2a5177bb7881c1290742dff296e19d099f67ec04c1b9ac4dc537adc7eb9c4135ad7295bb8f816aa3675d0819a236b4d567a656edc8fdbe1782222c4fdd7b8f6d0d599509b1f430c69a6236b238b79663580c63111edbe0d3a3ca8fef18534d024e6a66bb4af619442cbc811cd6bfe7a2c57b8a87280fa1e2bac19bdd1e9cfbec0dd05b80e2ae7131d8701c65082d732aac84a146a07432030c745697952f9180fde169d4b7b2377b6524c4e145f9caf5390b157c6739bebafb745cfd637142a3a04f192c9e45de956bdafafe9bb499d83ea4d0ba20b096b3af2fce3e81c460d5bb5e24197e78e6afd8d9830b5c307e9101ed284a32eb3915b5ad5f9330e874702cb7367ab095a99c22bfeadf6ae235703c88551f40825cf5ba412bcb21cc2dd97bbc0ec6f82520501d5e07d328157a4101afe7afeb208e5d5e9354308537403de6643b51e003d4ceb378008fd2a3d59a696263284a848a2d55b7d4f3a1e5ef4ec1a5b39cf39da753276444387454266388373f236e7f9073fa611f0dfe4e329d05116c9614adc03591fbc7dcfb374e61fe2afac5f3541a00c0e473437f36702fb966d7de6f5ea0cd491cec0c2e6177b970580525578f1f2354aef65ff28a8bbd5a8318a7f2760f68959d721183d2628e4f22426876d34891e4e6cfe1d2a7671b8fc899c1cc389d350f240662d0c668351b81d06e72b4e31d11e10339d2461fe1399d601b32e9027a6178b90ebd1f78ea981ba80852bccb0f1ab2279735d57fbcacd3d5432183bbeb5f8e9134914638ab69cabd64b47c4ec288c635a1f5d1e4e0c18b5a31de8a6bc5cc7dc9caebfa1a4277cfb4942df611f1299bab00abfab200ece11edca90bae916f35a96bd43fef8eb6adaa7455a0eb6d8bd42b2fd4b589d4d61ef2cfa4d822f8d1027bc243b2249a435cfe3594d3c44257bd4aa5578ba45cbb9434abba231ab562f697abfa159ac83c1d77f5b94f314498d80b055f7b63c523d6134f1c71d44ce0d5cacd1fda2c5039e40a41b79458ca29307b90ad7ebf705faaa22417e7052002014cd80e45d1149f310e3a36ff3ca9a965bb9b926246651684568721aa2f4842d6c349329d3c58ed4f1ac854f1a3fdefbe761c8000c2193ab147464d315237ea14b1c24ccfaebe617d8df5f4b7366a1b2dcc12f9f11cf40a8de33cdd9a2c279b0cd292d27462e5cee9d68c1d179f21722c11fab35f6b47faae49652ad69333b0137b16e3e16aef8841005f5e060168d39b00cb3802186a4bc574a29a76f009cb93a754444ef68b83bdcdddef3235818b253301fa83f00bfe7fadde3968a177bb584c1d482d260ebf1ebc7e2f4550706c37e93990e9645c6eefb96b9361a358a8dc11805986dfecfd63f981ceade5cfadffe3c91c51783261a57a1eee77caeac6f10c76c7fce0be9b5970957932e8c5057544cc0e7f758b7a770f7e98d7cc85c69572eafd091bb7bd1caaad1740cd84f63835b5d3bd5a96dc06f60c3e6459389b61cff9efe38e123b7c1abd1996c2371eb9f5846ab4ea3e86fa3e592e91ec458f21909dd961273876dafb56f1c0b83d089f45a4d9f1569c832f0408761f92019a2b3bcf1a2c4a0362a2b69c21f6e6aee6d8abb0eb639e17c25e8422e219f160f665cf911171ae8134092a281fe83879d001349c25292fb816deeeac675bf702fe55f01efc14c667dab313dad54b59cb136759f818fb2d12efddfa668aded7bfa515a2be7880781b0a19640f0b7fce2e2dd30ce536e35ab50aef329e5af1a5b6d229c2267c40ebbc8f5fdb0ff1b2ba21a7119664026c599b52d0042bb994e74bbc9d213fe2a948b2a9f26cc9cdca1b645ed19bd26560cf3f8ed16bc61fec8dae5ac1055490ff0e947ae747aea0972f836916f17d78ae53edbcdea132a51fb7c5386a9204ca3bc8896f953575586b3b95aa4bbd23ff1fc63ebccc621d012008fa13cbe87841154a43eb9df758fa191c81bf1048bbcfdc4584b5a9e904cd742dd1c3989bf7809a22ff954f5478d918840d8ec377c8832e65b90e184607c24b0fd385a3940711880ffea1ec6a0cc3077c692f1050a47e675bc01524183db1697f0adf8e7d3cd983eab553f03c596c8c46ab5aa6e0dbc090eac4e07ebbfe85fc889ac2d42751342d6ede72d8cd21d0907330dc052abcaa6d4cea3b3d3e15779329767af42ede92287b18ba0e4f34700a045382a6d6b2294605b6a1635d002b7122c3417052f459454dcca288533a7304bb3aae3d8b22a609316f3af50635266b81f574768db97a586def462d741a648de4bd3b7d36a0843fc742017f14cd4c25f1012b1c35ba2c1bd7845a677a7a5ecea4ff334981bb369cab274ae2aa36bd5352b7e28f0a379e5eee8000cf67039b90ab4b8bb91c05ab6ad9a9fad3a9820ac65d142f1f615029aa66db930a6e37c87b891872cb476df96724922da5f5e02b550816956adf6ad0c96bbe62ccc13a34981765e28a3f69a0779bac14d7121e725eec3d102a37f24c6e111fcd0aa6dae6bd76599cf7714d7a64e585bc6184357cc8937186cc2426d170d4269e4f171460d05e3dddd3ec47d9bf3a6bf6b475da1248caaa6925644e32a2610fd00572697ff99f4f974d5688d7b3fb57bcd426ad2c19ba8e637064076391c5c1cf1504f8e8e18c29070adb8f25d3f3bfbf4b582dae4cd8a15a5cbd184accf170346e49e197678a4fd3c6ef9b1bfb5a6555c62d9967eb7dfec0399d12bb4431250e91904bcdecd6bcced30c82e6f24bab5fa2010c225256e3b61dbde64174f4483f2f4801ed455c0860ec426170f0e823a7f6276f58d0769ce35b44898343ab103024fef0fa48d6c726dd25ae47154d20674cd08fae6169dafe7d82bf03c27630fc6850ec37f66c7b0188f3ba20b127203713126926f691fbfc30fe82d589628671276d483cf832c282d671a38d2c31ea4bb78dc97ddfda3ecb5a10c6cac4758d5b330de16659f32550490025de1c66428d8b04f76508946224bf9e8ab545926e308af5f63d9f4a96938e2c0e74af7c00fe0d2a7b8b1257071d35e96db8a1ecadce0f7fc938b3a05a47310ee65f4f8393d3926e7453ba2acbc025bb48e168c8fceda801a19d23262b3c4b5b431bedb46b1b15c7b7b64fe24b335b8c86db53e192d8d3bc669a06109161ecbe422608b6f5c853fc9527df46872596a76f7d4774428a2171853efdcfa9e664177a262e6bf5f2da5abb434d00b9573015c40d35964eefcf4f6b1f59adf4931a832e2adc6c7004a5ea5ab2940b9b9a63d81c65868dbb2aa64adae5af0e04c7449ef7eaf91b902c6708999e450fc72c6140416cf9ea94b60cf2c1629445bdc80bc3b03d667089656e5280405397034f883c4c94f03b334c3466eab5db613159960c18ef9aca4fcfb4bf72bfd111d063b8b4fe7f49d61b5016218b4cea4f34da0a7dc32df20ce26243e99212025e0a80ac7f4089c15f539946fbee6ef20ac11916ad92fcdcc085d113552dbb58b1899ba053bed5e1ae83811f0daf984378e9550eeab25ace13a1dd31006bb372a76aed1e05080e1779eb63113594fcb12e194e1431c26ad7adc908b8bbd871bcfb90e28377d2bf575479", 0x1000, 0x67}, {&(0x7f00000001c0)="63b3fcb758e1f5f1f1dc71be753d63115100c4a21f25aba04da7d89f0e9c6b88ddc5490c4daa34b25216a2aa5b4bf15f0ccd223b95094cb42a5702e1750d35a551108757ba1952e0869ba022cb6e433b4bcbc773b4966df2b55a8977acce998b42435cfebc1073475f9d8ce047d75d625719e1a251213c763dfcfc6bf19393a6d45c422ab03321d2dddf9e6a", 0x8c, 0x8a51}], 0x4, &(0x7f0000000580)={[{@creator={'creator', 0x3d, "af5480d1"}}, {@file_umask={'file_umask', 0x3d, 0x5}}, {@gid={'gid', 0x3d, r2}}, {@session={'session', 0x3d, 0x2}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}, {@gid={'gid', 0x3d, r3}}], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'md5sumppp0'}}, {@euid_lt={'euid<', r5}}]}) fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000080)={0x7}, 0x7) 15:14:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 15:14:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003680000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:50 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:50 executing program 2: mkdir(&(0x7f0000000040)='./file1\x00', 0x50) r0 = socket$alg(0x26, 0x5, 0x0) getsockname(r0, &(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x19) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_ro(r1, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x26e1, 0x0) sendto$unix(r1, &(0x7f00000002c0)="52fdccc62f12436d32c2b236e784112325a09c02a9956029df2599f00c3b7d5d4d9b1b3c8e26b6e5449379c0f57b59e89605ec9c58efecb8a5aec73715b1ac2082d830fd9d736ef6448f9cfed21ff075bc4b14cc455d633ac8ebc9190be91f39f4bd55d8a23f474478003431de80e600e5d633f2b71a3e4a98ec12fc49119b0be7b5ce49464ca520117f4c388fb65aafbbc819b7ce769ee3fbfbffa0b0313832d1535e831c14ca8bc5e8bab5af1cbaeecf47c2ae6cf58dc02a8d3034e4dd87e0abab6f238a98e50a9677fc81b8104eaf5e11056f6d", 0xd5, 0x800, &(0x7f0000000400)=@file={0x0, './file0\x00'}, 0x6e) fsetxattr$security_capability(r2, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r2, &(0x7f0000000080)={0x7}, 0x7) 15:14:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = accept$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x8000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x54c15b114d6030c6}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r3, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x801) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x6, 0x9}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000340)={r4, 0x1, 0x95, "0f5f0e4005561c97a5203310c5930cbbcb705cdeb358d71e20d9846c0464a2aff2fd08432b00f1c583b5638ab7c8c70b74154369af2c4c96a4f135acce769580a3a798d9423461b92bcd14632786a77053d7b2bf445fcc1bc04faf10c685e0bcf2c2027feb84e6bbe15ef96c2e2bb0dd336188fb77ddd6947c5933f322e0e9bd77251730eedf09bafc2a92d42504190a7e6325e718"}, 0x9d) chdir(&(0x7f0000000280)='./file0\x00') r5 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000140)='./file1\x00', 0x0) r6 = shmget(0x2, 0x2000, 0x10, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r6, 0x3, &(0x7f0000000580)=""/162) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x1) link(&(0x7f0000000040)='./file2\x00', &(0x7f00000000c0)='./file0\x00') ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) 15:14:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=6/file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) [ 2583.559444][T32571] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2583.568619][T32570] overlayfs: unrecognized mount option "upperdFir=./fÿÿÿÿ" or missing value [ 2583.586832][T32577] overlayfs: failed to resolve '6/file1': -2 15:14:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = accept$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x8000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x54c15b114d6030c6}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r3, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x801) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x6, 0x9}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000340)={r4, 0x1, 0x95, "0f5f0e4005561c97a5203310c5930cbbcb705cdeb358d71e20d9846c0464a2aff2fd08432b00f1c583b5638ab7c8c70b74154369af2c4c96a4f135acce769580a3a798d9423461b92bcd14632786a77053d7b2bf445fcc1bc04faf10c685e0bcf2c2027feb84e6bbe15ef96c2e2bb0dd336188fb77ddd6947c5933f322e0e9bd77251730eedf09bafc2a92d42504190a7e6325e718"}, 0x9d) chdir(&(0x7f0000000280)='./file0\x00') r5 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000140)='./file1\x00', 0x0) r6 = shmget(0x2, 0x2000, 0x10, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r6, 0x3, &(0x7f0000000580)=""/162) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x1) link(&(0x7f0000000040)='./file2\x00', &(0x7f00000000c0)='./file0\x00') ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) 15:14:50 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) [ 2583.618542][T32573] EXT4-fs (sda1): quotafile must be on filesystem root [ 2583.646880][T32571] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d1900036c0000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:50 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75905065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469f23d2e2f66696c6531"]) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000180)) chdir(&(0x7f0000000040)='./file0\x00') setxattr$trusted_overlay_opaque(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000140)={0x6, 0x29, 0x11, 0x1, 0x3, 0x6, 0x2, 0xb2, 0x1}) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) 15:14:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x22) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="75707065726469723d0e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726bb069723d2e2f66696c65316a56379c2b556d002bcfa59b88e451bf541c43814ca59f48811284aac30a0e1f7141583b81493267406f9a333ebad4ced8e0563980050894f0501721495b85066a1223b2cd9d63d6a4eebafe2107a79a73025ab5d46a65c92d5570bfd4d59fe81c43999c4a186d4482baf0424489826ba9e0cda2b6ebd36d82f96ad0d568e745c7150cb1f46cc38a4e7ba8b608b3c1cc0000000000009f9685d077146221dd2f22ce9a546473bcaf5770d015da642ebb5d4c7dc89f624fdc1d322fe547143189e4f703eaceee8b16520052905f28dc9665d8fb1b83c4605e9342f7e22aae3b564519bd6f"]) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 15:14:50 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) [ 2583.838490][ T424] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYBLOB="7573726a71956f7461d9c85a18b20200000000"]) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) 15:14:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = accept$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x8000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x54c15b114d6030c6}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r3, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x801) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x6, 0x9}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000340)={r4, 0x1, 0x95, "0f5f0e4005561c97a5203310c5930cbbcb705cdeb358d71e20d9846c0464a2aff2fd08432b00f1c583b5638ab7c8c70b74154369af2c4c96a4f135acce769580a3a798d9423461b92bcd14632786a77053d7b2bf445fcc1bc04faf10c685e0bcf2c2027feb84e6bbe15ef96c2e2bb0dd336188fb77ddd6947c5933f322e0e9bd77251730eedf09bafc2a92d42504190a7e6325e718"}, 0x9d) chdir(&(0x7f0000000280)='./file0\x00') r5 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000140)='./file1\x00', 0x0) r6 = shmget(0x2, 0x2000, 0x10, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r6, 0x3, &(0x7f0000000580)=""/162) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x1) link(&(0x7f0000000040)='./file2\x00', &(0x7f00000000c0)='./file0\x00') [ 2583.881422][ T433] overlayfs: unrecognized mount option "uPerdir=./file0" or missing value [ 2583.950820][ T438] overlayfs: unrecognized mount option "work°ir=./file1jV7œ+Um" or missing value [ 2583.986293][ T424] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:51 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) [ 2584.037413][ T496] EXT4-fs (sda1): Unrecognized mount option "usrjq•otaÙÈZ²" or missing value 15:14:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003740000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:51 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x80) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x800, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x2e, &(0x7f00000001c0)={@multicast2, @loopback, @multicast2}, 0xc) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000080)={0x7}, 0x7) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x83) 15:14:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000040)={0x3, 0x1f8, 0xec, 0x6, 0x4, 0x622}) 15:14:51 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_S_HW_FREQ_SEEK(r0, 0x40305652, &(0x7f0000000040)={0x9, 0x2, 0x4, 0x101, 0x824, 0x2, 0x100000001}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x7c, 0xa, &(0x7f0000000740)=[{&(0x7f0000000180)="926176de27eb6be118ae824a898adde5fbe51fb15ff27940733034b3f17b970b35b12e3de2ed7a26ee5be02c58ffa9730c10422d033a2ea506cb1907bbd6076780032dfbbee4be20930a12cf9a834c52faf090e4deded396b61bde9adc998c391292a970de4ec36ab78551f27b7a0d9287a9d07b257862af5c09dc7fe6d80d4eedbc311e3f35", 0x86, 0x1}, {&(0x7f0000000240)="594cb32980268ab3fbcee624a7767045863142b7f18f84d9daa2975a", 0x1c, 0x3fe0}, {&(0x7f0000000280)="c82c3a65713a73efcdf30c52d8c4a82983c880ba9746398ccddf19fdfe0a7bbc46c532bb16e835f9c616229226cbf5b99248f7171510abeae43762096079a07f697e56fbe1999a524b5a60e33cd832f7cf13fa39f6fbb0f40a0c20ba558e08ff3ca4387212621267d322a0ffdaedc8ecd010983db88e141cbd9f15a6e5faa69a80f7610100eb818446cd06210133538a9764616ea83ee69bcbeae4cf26e2cca9ab3edb7bd248d5580622a3ab941f9b43ec2ce7eb172c20687a7fac215f9e4baccf0522080ab49ec92c19fa6ef95b51978df0258862f40a0b76183a57883529cca5fb8c530b4cec945c", 0xe9, 0x1}, {&(0x7f0000000380), 0x0, 0x8}, {&(0x7f00000003c0), 0x0, 0x7ad}, {&(0x7f0000000400)="8180f210acbc20e8ff7d91983b4b66f6575e05bf0b417ba1c6a41066041edcb50437c287440c42f6e420a9370a2e60708dce555f029048b15328406763ee7654660cbedad78ebf586047a7fe142a7581448f24cecefe11feac3826ef8d2c4a9084bfe1488fdef46fe0823358077ddf0f02b6ab92122d1f2fb2b0cf501af25536e7505f17ae158d137542", 0x8a, 0x7309}, {&(0x7f00000004c0)="426237da04244c50914d881e54d8901bbfb857047076319dc0f3", 0x1a, 0x20}, {&(0x7f0000000500)="e3089e90b4d0fb36656d5b1b4ce012e4128be1d28ddb2d994a2c1064eae0f6c8d68d077f3b8955d1bb952c547cfbc6e27e7fba5ab631e7b0631b205e1e1c8717a8f389b7513b2367015f2f78783651037ce8dcabdcfe47b84deb3878629f389af692053b69b670df5807ba0f9c8b2754ae1491cd98235e127b6486cf596e289b43984a2a5e95e25b3e74f2fcd672d5cee395e032f6e8c851f7fd66c548299cf0be45a19842fdf3a2bba9005f42bdcc050aff11eb97b6b012103e5728811cacd488dd813dd3c4c3a442becd93c70cf4365244d79b46d3859e2dfe6570c299fac5757ea2", 0xe3, 0x6}, {&(0x7f0000000600)="89325a6d8dbc98bd40fd7e48606083574ad4400fc9c477bec5053a9cfd97cd8932563bbc658283e3e28c58a0a10ccea325ea30699db1f9b870dc78285c", 0x3d, 0x80}, {&(0x7f0000000640)="cef88e3ad2c520b933293d6b3a17c6b0c64da69d265fdc268bdfee68337623aaba5487a85295284f4fed775c98e1b1d0af9d487af689ce4ddb56f6ec162bcb5195648b618c01446005e16aae1aa701408e059dc7f664c85a9fcf70d3bceecac92a0a58a16fe8c4aad49a0e8e723f628498fcc96d9b607249d2ea0d138268119b6e50dedce3a8f44b00c1680ca0be5e93a91b661509736cb54ad3c69b34c31290f532158c6c34345172971dcf2410be475e93ab3b89bc28ebaaecd83cff82f15a0d1d7db6", 0xc4, 0x400}], 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="6e5167727069642c62696f73697a653d30303030303030303030303030303030323034382c696e6f246536342c67727071756f74612c6e6f61877472322c6765696f2c7379737667726f7570732c6e6f61747472322c62696f73697a653d20303030303030303030303030303030303030322c66640dd4f40633a4736e616d653d7573726a1b756f74612c00a66ce319c0350a6270b2ba03072d738b479354884c52bad10498c8130ca83ae8fe396885e71ad1a320095d5f56283f5d73224e9072c56594f341f9dfa1dd3fc5a223520e20e811b221669b72afa0aeb500000000000000"]) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0\x00', 0x0, 0x2800000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000009c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000b00)=ANY=[@ANYBLOB="7573726a71756f74613d2e2f66696c65302c00dadbe923778c21f75f0a0787c8e8ea9046bdeebd1c0ce3d178923e5c0aee7bd0034c0387c19e7d6dfa83f292967e29dc4adefcdb57c765b5cb053fbf08f0c2282c81d19758e0fb68f4b8e689e542bae05bb1c07d79d544ff6015ddea95e53ddc1a5a9a32e195392dda5cbe7ccc6ee8fdb3491e63a8e8a050f3d1c29a6dd7b68d0c9a0629339d70fe709151cd65e686b3d503a00b6428610413eec0c7455d143e06e2a0b28060ac687693f27cb6ef9f2f3a31f5162bf6789b7e0c986cb9d51749d7b58e2ebd68ebac9908a2114501df6201c325b68aa4"]) setxattr$security_smack_transmute(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000900)='TRUE', 0x4, 0x3) 15:14:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = accept$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x8000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x54c15b114d6030c6}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r3, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x801) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x6, 0x9}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000340)={r4, 0x1, 0x95, "0f5f0e4005561c97a5203310c5930cbbcb705cdeb358d71e20d9846c0464a2aff2fd08432b00f1c583b5638ab7c8c70b74154369af2c4c96a4f135acce769580a3a798d9423461b92bcd14632786a77053d7b2bf445fcc1bc04faf10c685e0bcf2c2027feb84e6bbe15ef96c2e2bb0dd336188fb77ddd6947c5933f322e0e9bd77251730eedf09bafc2a92d42504190a7e6325e718"}, 0x9d) chdir(&(0x7f0000000280)='./file0\x00') r5 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000140)='./file1\x00', 0x0) r6 = shmget(0x2, 0x2000, 0x10, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r6, 0x3, &(0x7f0000000580)=""/162) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x1) link(&(0x7f0000000040)='./file2\x00', &(0x7f00000000c0)='./file0\x00') 15:14:51 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) [ 2584.235700][ T762] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2584.320699][ T762] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2584.340760][ T781] XFS (loop3): unknown mount option [nQgrpid]. 15:14:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d1900037a0000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:51 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = accept$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x8000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x54c15b114d6030c6}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r3, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x801) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x6, 0x9}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000340)={r4, 0x1, 0x95, "0f5f0e4005561c97a5203310c5930cbbcb705cdeb358d71e20d9846c0464a2aff2fd08432b00f1c583b5638ab7c8c70b74154369af2c4c96a4f135acce769580a3a798d9423461b92bcd14632786a77053d7b2bf445fcc1bc04faf10c685e0bcf2c2027feb84e6bbe15ef96c2e2bb0dd336188fb77ddd6947c5933f322e0e9bd77251730eedf09bafc2a92d42504190a7e6325e718"}, 0x9d) chdir(&(0x7f0000000280)='./file0\x00') r5 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000140)='./file1\x00', 0x0) r6 = shmget(0x2, 0x2000, 0x10, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r6, 0x3, &(0x7f0000000580)=""/162) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x1) 15:14:51 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000300)=0xe8) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = geteuid() fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000140)='/dev/loop0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='fuseblk\x00', 0x80002, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x8}}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@subj_role={'subj_role', 0x3d, 'security.capability\x00'}}, {@fowner_eq={'fowner', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '!'}}, {@audit='audit'}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@fowner_gt={'fowner>', r4}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x65, 0x32, 0x30, 0x37, 0x61, 0x0, 0x30], 0x2d, [0x38, 0x66, 0x75, 0x31], 0x2d, [0x35, 0x7f, 0x65, 0x30], 0x2d, [0x73, 0x63, 0x36, 0x7f], 0x2d, [0x0, 0x31, 0x35, 0x77, 0x77, 0x33, 0x37]}}}]}}) [ 2584.527517][ T1082] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x80800, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f00000000c0)=0x2, 0x4) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 15:14:51 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYBLOB='usrjquot\x00=./file0,\x00']) [ 2584.663322][ T1082] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = accept$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x8000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x54c15b114d6030c6}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r3, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x801) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x6, 0x9}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000340)={r4, 0x1, 0x95, "0f5f0e4005561c97a5203310c5930cbbcb705cdeb358d71e20d9846c0464a2aff2fd08432b00f1c583b5638ab7c8c70b74154369af2c4c96a4f135acce769580a3a798d9423461b92bcd14632786a77053d7b2bf445fcc1bc04faf10c685e0bcf2c2027feb84e6bbe15ef96c2e2bb0dd336188fb77ddd6947c5933f322e0e9bd77251730eedf09bafc2a92d42504190a7e6325e718"}, 0x9d) chdir(&(0x7f0000000280)='./file0\x00') r5 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000140)='./file1\x00', 0x0) r6 = shmget(0x2, 0x2000, 0x10, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r6, 0x3, &(0x7f0000000580)=""/162) 15:14:51 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003fe0000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) [ 2584.745310][ T1145] EXT4-fs (sda1): Unrecognized mount option "usrjquot" or missing value 15:14:51 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x0, 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000080)={0x7}, 0x7) 15:14:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file2\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) [ 2584.945850][ T1357] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:52 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) rename(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x3deb8db4485fb241, 0x0) syz_mount_image$minix(&(0x7f0000000200)='minix\x00', &(0x7f0000000240)='./file0\x00', 0x3b040d2c, 0x9, &(0x7f0000000700)=[{&(0x7f0000000280)="fafe6bd61a", 0x5, 0x8}, {&(0x7f00000002c0)="9431e79eff90a0b1c5d48d5b003998be5a9feb7848301f9264ecb2a2b6c8ecb695f7a9ed503d1d33ccd5655117b26eef26e8f7", 0x33, 0x6}, {&(0x7f0000000300)="db4ba813e38bc8646d3bb18f4da944a0a7c84a2014a723f45e1aa11aac81d6620a949e4bbc449c572d3aef84ec8c45c35253abe1d10cc2858f20eb355081c0f91cd7abc064a412cc3719c8eb719afabd772d39e4e41895a31547e43f222bbe5facab0269205bb9ca7682eceb464c19431d56d0ea6d67d6ee8d7f64558ac61fedf0f5bc5b4546278220803954799d561d3dd8aaf6600a1c1f455f183e971077a2ae365d961bcf2d29d3b19d2f96ab6aca461ad807a2816438710df53fc5ce02c6c98653e2d036c4f741963e02a8b05af567e93419c358", 0xd6, 0xffff}, {&(0x7f0000000400)="0b917b181d457c0fd23129d5531e9a636838b62a77666923907b9c80e7bc471017b3622d6e7ad4a4f1ed36b4a2a5a175d057ade201f3dff4bc1c54c597d2078a9f52", 0x42, 0x7ff}, {&(0x7f0000000480)="053600ea5df1bca4c780e1f57176b4ebb6bbf2d589f90d70b754c9725cb65751ba580d060ecc942200de5dd4a2835d88e62dd1f74dcfc018399d0d45", 0x3c, 0x1}, {&(0x7f00000004c0)="366ac4414c5e83c9ccc32f5d69fea2dbe67c5474126dfce0e60254fb26eb1e2aa20ff7a27e2379c331f2c08bc2927f56580058e0628f349bc01af146cfc0991f646d5d9b1343328a2202d1a84a4f43dcf6af00652624cf2cd60bdb6f530d73ca5e37aa3069fa95718a4438895b26de1f5d674c858da61e2c843e34e33b2ac31dcda806a3c202f40875701e9222fade9a96d25d572ea78a75036981e6", 0x9c, 0x64}, {&(0x7f0000000580)="19151e73a5c5f7e8342078c02c75e1f9e41935", 0x13, 0x2}, {&(0x7f00000005c0)="4997db17fa53a1de8150f891fd536c24c964d61094736cb33776ed1b640529d3efbfaaef4b24232543f05b53abf00798a5b1dcea173d35e46a263910bf0f1834d71597f4980b384d45313a7bc333f0bcab73997459e0981ac86624f1694cedeb2e21a9cfa7", 0x65, 0x9}, {&(0x7f0000000640)="75e65c3b9fea9c2bce4e3f871dd6fd29d953ae0319501577861947744c30632f392b0ee2c4dec419099e7c648d43ec795495369690f63acc563610913602c5995ad3a8983aea4c27a0ecc440db980d64b8c3af9f7c767aa5243084072949a38394fb7ac1d39470563d01581dc3369f44cf2f529089046018772f36490bd93bda8fdb4b715e372c3869e5f6e94ce36ae75b36", 0x92, 0x6}], 0x804000, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x4) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000800)) 15:14:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = accept$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x8000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x54c15b114d6030c6}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r3, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x801) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x6, 0x9}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000340)={r4, 0x1, 0x95, "0f5f0e4005561c97a5203310c5930cbbcb705cdeb358d71e20d9846c0464a2aff2fd08432b00f1c583b5638ab7c8c70b74154369af2c4c96a4f135acce769580a3a798d9423461b92bcd14632786a77053d7b2bf445fcc1bc04faf10c685e0bcf2c2027feb84e6bbe15ef96c2e2bb0dd336188fb77ddd6947c5933f322e0e9bd77251730eedf09bafc2a92d42504190a7e6325e718"}, 0x9d) chdir(&(0x7f0000000280)='./file0\x00') r5 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000140)='./file1\x00', 0x0) shmget(0x2, 0x2000, 0x10, &(0x7f0000ffe000/0x2000)=nil) [ 2585.120706][ T1357] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:52 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) lstat(&(0x7f0000000080)='./file0/file0\x00', 0xfffffffffffffffe) mount$overlay(0x400000, &(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYRES16]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000200)={0x3, 0x21, 0x2}, 0x7) 15:14:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="6f707065726469723d2e2f66696c65302c6c6f7765726469723d749898cc36d7ad54776f726b6469723d2e2f66696c6531"]) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 15:14:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003000300000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) [ 2585.229210][ T1640] EXT4-fs (sda1): quotafile must be on filesystem root 15:14:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = accept$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x8000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x54c15b114d6030c6}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r3, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x801) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x6, 0x9}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000340)={r4, 0x1, 0x95, "0f5f0e4005561c97a5203310c5930cbbcb705cdeb358d71e20d9846c0464a2aff2fd08432b00f1c583b5638ab7c8c70b74154369af2c4c96a4f135acce769580a3a798d9423461b92bcd14632786a77053d7b2bf445fcc1bc04faf10c685e0bcf2c2027feb84e6bbe15ef96c2e2bb0dd336188fb77ddd6947c5933f322e0e9bd77251730eedf09bafc2a92d42504190a7e6325e718"}, 0x9d) chdir(&(0x7f0000000280)='./file0\x00') r5 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000140)='./file1\x00', 0x0) [ 2585.302487][ T1692] overlayfs: unrecognized mount option "ÿÿ" or missing value 15:14:52 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) [ 2585.385102][ T1756] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2585.416017][ T1799] overlayfs: unrecognized mount option "opperdir=./file0" or missing value 15:14:52 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) fcntl$getownex(r0, 0x10, &(0x7f0000000140)) 15:14:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000180)={{{@in=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000080)=0xe8) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000480)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@smackfsroot={'smackfsroot', 0x3d, 'usrjquota'}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@uid_eq={'uid', 0x3d, r0}}, {@uid_gt={'uid>', r0}}, {@euid_gt={'euid>', r0}}, {@seclabel='seclabel'}, {@dont_measure='dont_measure'}, {@appraise='appraise'}, {@fowner_gt={'fowner>', r0}}]}) 15:14:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = accept$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x8000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x54c15b114d6030c6}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r3, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x801) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x6, 0x9}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000340)={r4, 0x1, 0x95, "0f5f0e4005561c97a5203310c5930cbbcb705cdeb358d71e20d9846c0464a2aff2fd08432b00f1c583b5638ab7c8c70b74154369af2c4c96a4f135acce769580a3a798d9423461b92bcd14632786a77053d7b2bf445fcc1bc04faf10c685e0bcf2c2027feb84e6bbe15ef96c2e2bb0dd336188fb77ddd6947c5933f322e0e9bd77251730eedf09bafc2a92d42504190a7e6325e718"}, 0x9d) chdir(&(0x7f0000000280)='./file0\x00') open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) 15:14:52 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) [ 2585.560239][ T1756] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB='upperdir=./filele1,workdir=./file1\x00'/49]) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f00000006c0)=0xe8) syz_mount_image$gfs2(&(0x7f0000000440)='gfs2\x00', &(0x7f0000000480)='./file1/file0\x00', 0x9, 0x3, &(0x7f0000000640)=[{&(0x7f00000004c0)="10de97eda9527cb63086db395b4e8e5d3968222f966367fb3dacad0c9e90053c6ec2e3eee7ba16741c3b7b3e83e883ecc87c86f340a741b1aca7f07fd2b645b2bd74a2682db416c8f42585a861141b75b8cf735a781985300b203c53980d7af2ef202fcbcb9dafe7ab0333db5b1d3bbf7fea9cae3ef67d3a6166099f2b5ae3123c5523bd88cfdadb49f5256f20618a36f1d4", 0x92, 0x6}, {&(0x7f0000000580)="ddc55afb470690dde0b4fc9bf340af717d7ec102f5a76cc937657beac9737260edb8e12211dc468c2cf1c6492bcc954b0509be189f2568c205d4f9da816be93979da3ad83076efcd7edbdaa399551f27efde83a4cd9b06e7dd22300f4c0ba5a5893d2306a5ddf044f57e9afb322f", 0x6e, 0x7fff}, {&(0x7f0000000600)="e855f7555c351897f4dff44d", 0xc, 0x10001}], 0x2a010, &(0x7f0000000840)={[{@locktable={'locktable', 0x3d, 'veth1_to_hsr\x00'}}], [{@obj_role={'obj_role', 0x3d, ',em1vboxnet1'}}, {@subj_type={'subj_type', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@subj_role={'subj_role', 0x3d, 'veth1_to_hsr\x00'}}, {@fowner_lt={'fowner<', r2}}, {@appraise='appraise'}]}) r3 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3, 0x2000) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$xdp(0x2c, 0x3, 0x0) accept4$tipc(r3, 0x0, &(0x7f0000000400), 0x0) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8300120}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c010000", @ANYRES16=r4, @ANYBLOB="10002cbd7000fbdbdf25060000001800070008000200040000000c00030000fcffffffffffff"], 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x50d97d02631d287a) socket$unix(0x1, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(r3, 0x890c, &(0x7f0000000380)={0x0, {0x2, 0x4e21}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x28}}, {0x2, 0x4e22, @rand_addr=0x9}, 0x42, 0x0, 0x0, 0x0, 0x79, &(0x7f0000000340)='veth1_to_hsr\x00', 0x8, 0x4, 0x3}) 15:14:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003100400000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:52 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:52 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000140)={0x0, 0x401}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r1, 0x5, 0x30}, &(0x7f0000000200)=0xc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$nfs4(&(0x7f0000000240)='nfs4\x00', &(0x7f0000000280)='./file0\x00', 0x3, 0x2, &(0x7f00000003c0)=[{&(0x7f00000002c0)="7249e25338117c0d4aafdec432f0783857c1bf46f2d23b49e1efa6c3668871cd5998274a4306f87cce5a08b4641fc7433aea5354959a2640f20b698134e33fc508478e1f732f873904c63e9cfe622017b5", 0x51, 0xd8a2}, {&(0x7f0000000340)="7a6774901bf34282140a3a381f3b2106343e2cb0945e87f545022b989146309507795cccafb44db5b04121908a253e6d4861d686dbed756374224b8be268726a8eb1109faed931be7f0c6d6790622d7c1474b1d33a3e7249eaf081177aaf3dfebc507f9e", 0x64, 0xef3}], 0x0, &(0x7f0000000400)='/dev/vga_arbiter\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000080)=ANY=[@ANYBLOB="7573726a71756f74613d2e2f66696c65302c0045b7c86af0a708645619206179103a"]) [ 2585.727915][ T2065] overlayfs: missing 'lowerdir' 15:14:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = accept$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x8000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x54c15b114d6030c6}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r3, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x801) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x6, 0x9}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000340)={r4, 0x1, 0x95, "0f5f0e4005561c97a5203310c5930cbbcb705cdeb358d71e20d9846c0464a2aff2fd08432b00f1c583b5638ab7c8c70b74154369af2c4c96a4f135acce769580a3a798d9423461b92bcd14632786a77053d7b2bf445fcc1bc04faf10c685e0bcf2c2027feb84e6bbe15ef96c2e2bb0dd336188fb77ddd6947c5933f322e0e9bd77251730eedf09bafc2a92d42504190a7e6325e718"}, 0x9d) chdir(&(0x7f0000000280)='./file0\x00') open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) 15:14:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000001c0)={0x1, 0x0, [], {0x0, @reserved}}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x1, 0x2) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000100)={0x4, 0x1, 0x9, 0x1}, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000180)=ANY=[@ANYBLOB="7573726a71756f7461fc86f4e59c2af505001e3d2e4966696c65302c00"]) [ 2585.800312][ T2124] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:52 executing program 2: rseq(&(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x67e98434, 0x6, 0x3}, 0x6}, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) 15:14:52 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) [ 2585.905023][ T2124] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="75307065726469723d2e2f66696c65302c6c6f7793a58ee165726469723d2e2f664e68696c65312c776f720000000000002504696c6531"]) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 15:14:53 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x3) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="757070657264fc4321372f66696c4530c220d51065726469723d2e2f26696c65312c776f726b646972680f92f7696c6531"]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) write(r0, &(0x7f00000001c0)="0720060db457335c2ae195c0075884f0d0f8bb37f52cf7d1d11329e1d5de5f3d82acd2c94dbc599b670adcb594d2361550758f63f0ff591ad5cbd055db846e51064af0fc3405a1f2cce3e96f59da538c2ea3d58257225898ebec06e913797d1bb7f04dccbd31bf50f67d87801782110144a11f5879ca6e81cb", 0x79) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000180)) [ 2585.980719][ T2246] EXT4-fs (sda1): Unrecognized mount option "usrjquotaü†ôåœ*õ" or missing value 15:14:53 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003000500000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = accept$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x8000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x54c15b114d6030c6}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r3, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x801) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x6, 0x9}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000340)={r4, 0x1, 0x95, "0f5f0e4005561c97a5203310c5930cbbcb705cdeb358d71e20d9846c0464a2aff2fd08432b00f1c583b5638ab7c8c70b74154369af2c4c96a4f135acce769580a3a798d9423461b92bcd14632786a77053d7b2bf445fcc1bc04faf10c685e0bcf2c2027feb84e6bbe15ef96c2e2bb0dd336188fb77ddd6947c5933f322e0e9bd77251730eedf09bafc2a92d42504190a7e6325e718"}, 0x9d) chdir(&(0x7f0000000280)='./file0\x00') [ 2586.087570][ T2256] overlayfs: unrecognized mount option "u0perdir=./file0" or missing value [ 2586.102020][ T2258] overlayfs: unrecognized mount option "upperdüC!7/filE0 Õerdir=./&ile1" or missing value 15:14:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000100)=0xb) 15:14:53 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:53 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000140)={@remote, @multicast2, 0x1, 0x3, [@rand_addr=0x6, @remote, @local]}, 0x1c) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) [ 2586.284971][ T2482] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = accept$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x8000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x54c15b114d6030c6}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r3, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x801) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x6, 0x9}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000340)={r4, 0x1, 0x95, "0f5f0e4005561c97a5203310c5930cbbcb705cdeb358d71e20d9846c0464a2aff2fd08432b00f1c583b5638ab7c8c70b74154369af2c4c96a4f135acce769580a3a798d9423461b92bcd14632786a77053d7b2bf445fcc1bc04faf10c685e0bcf2c2027feb84e6bbe15ef96c2e2bb0dd336188fb77ddd6947c5933f322e0e9bd77251730eedf09bafc2a92d42504190a7e6325e718"}, 0x9d) 15:14:53 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2000000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYBLOB="0400726a71756f74613d2e2f66696c65302c00"]) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x3, 0x400100) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x4}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={r1, 0xca}, &(0x7f0000000200)=0x8) [ 2586.382089][ T2482] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lower\b\x00\x00\x00\x00\x00\x00\x00le1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 15:14:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003000600000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:53 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x50) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) 15:14:53 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) accept$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x8000, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x54c15b114d6030c6}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r2, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x801) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x6, 0x9}, &(0x7f00000002c0)=0x8) [ 2586.657521][ T2898] overlayfs: unrecognized mount option "lower" or missing value [ 2586.676805][ T2905] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) syz_mount_image$nfs4(&(0x7f0000000080)='nfs4\x00', &(0x7f0000000100)='./file1\x00', 0x1, 0x5, &(0x7f0000000500)=[{0xffffffffffffffff, 0x0, 0x400}, {&(0x7f0000000180)="3a4581a8025474b7533a12616bc9c1d4d35977c34c4d6854da947b8709101c9c4fe023fbf0783f2386d42d1f06c057a7d97b24850ec3ade518e1a1c8398540afaa61238ddfb6", 0x46, 0x1}, {&(0x7f0000000200)="ec0ff776c8f9de6d007ea18f564263479702009c5230c9adae77f6a6eb359d11b430bb4b7cb996b0f8b3e93b399c6494e6ad098209bc1c48789424892e20fd9fb0ff1f4ddd1c50448fb5a0eca7affce684c33f7408c37f6a83a843b8caa9f46c5649c476e384132ba5e21a292178bd6b0d51881af1c164cc2c1613997521b115d633117071e41f2f3fa66ebda66f5670a870d3e10a6446aff015235a1a1c1ffaf91a0d4f0fe6f9d0c5d4a2c3ba877def9bdd5a8aa758507c6cf290b8439f9f57cfcd734a48e79e53d7d7", 0xca, 0x5}, {&(0x7f0000000300)="a4693cd466b1c8cfc96ab06fca8c2427d788005e1cf6ad7e5037688ba7fb055ad2720d6bb5a3ca2641e5905616ef3581d03bec48cb4dfe163077cee4dd709bed379adade3a636d1f111e50698701e353056a91ff7facdd215f4a31e45e7f8701354836fbbab85300775167eed2c151c93b2b227bd342f0e168927acb0c27f1964f69c7b3b87fd4fd3dc258f05b9ac5cc9fe2d74476483301463d14d13674e9c5ecdb202fc54e21282bd6ffc64b6ec36b2c042c16d8bfe7b6d86b56750bf1f07c0859ed6141b6236ad38a398a4e8ad80266484891484b92", 0xd7, 0x9}, {&(0x7f0000000400)="6d57502701a38336228115ff1537d0eab54914c8b486513f353e921dcf162064555bf58f78a64436cc883dbd1b003b653ea2d7bf27be1dce551dd04b5f8526bcaeb5a78c6644cac1040b06206b91e5a8b31ff26e60dcb43e5695d63cf5103ab63570c652e4ee9d4005525142d93aad9e456f46af5e272ba3b747b38ca65a79a49d333328658178bfd064f58d6a37a5b626617d5acd44be679d6be1191aa0731270fc2a5eb80232899ce2d45ffa87f2d613008ec532c0912680539fcd189b54a232c7cc3c35080d23f6aaf7ec294a6f482819813758dac57546d41167109c2be0547074af0ee83320387bdb62997773aaa1ef", 0xf2, 0x5}], 0x800, &(0x7f0000000580)='usrjquota') 15:14:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) accept$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x8000, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x54c15b114d6030c6}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r2, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x801) 15:14:53 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:53 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file1\x00', 0x8, 0x2) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) msync(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1) r0 = open(&(0x7f0000000200)='./file1/file0\x00', 0x183301, 0x80) futimesat(r0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000280)={{}, {0x77359400}}) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000080)={0x7}, 0x7) [ 2586.838399][ T2905] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='uppevdir=./file01,workdir=./file1\x00'/49]) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x7, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) [ 2586.915025][ T3092] EXT4-fs (sda1): quotafile must be on filesystem root 15:14:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003000700000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) [ 2586.987846][ T3182] overlayfs: unrecognized mount option "uppevdir=./file01" or missing value 15:14:54 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) accept$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x8000, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') 15:14:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) r2 = creat(&(0x7f0000000040)='./file1/file0\x00', 0x2) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r2, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0xffffffec) 15:14:54 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:54 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) 15:14:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) r0 = semget(0x1, 0x4, 0x8) semctl$SEM_INFO(r0, 0x3, 0x13, &(0x7f0000000180)=""/199) [ 2587.204593][ T3520] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003000900000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) accept$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x8000, 0x0) 15:14:54 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) [ 2587.348715][ T3546] EXT4-fs (sda1): quotafile must be on filesystem root [ 2587.385211][ T3559] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x2840, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') r2 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) r3 = socket(0x0, 0x805, 0x5) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e24, @broadcast}}, 0x6774, 0x0, 0x11ef, 0x1, 0x6}, &(0x7f00000001c0)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000240)={r4, 0x8, 0x10}, &(0x7f00000002c0)=0xc) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 15:14:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 15:14:54 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r1, 0xc, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040040}, 0x20048000) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r2 = getuid() getresuid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) getresuid(&(0x7f00000005c0), &(0x7f0000000600)=0x0, &(0x7f0000000640)) fstat(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='system.posix_acl_access\x00', &(0x7f0000000740)={{}, {0x1, 0x5}, [{0x2, 0x2, r2}, {0x2, 0x6, r3}, {0x2, 0x1, r4}], {0x4, 0x6}, [{0x8, 0x2, r5}], {0x10, 0x1}, {0x20, 0x7}}, 0x44, 0x3) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="757070657264696c6530b5b06f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531"]) chdir(&(0x7f0000000040)='./file0\x00') r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000380)={0x20, 0x100, 0x10000, 0x3}) sendto$unix(r6, &(0x7f0000000140)="b9c3e2eb6556b00f933c53f2d158b0cad9a7243db6e441eefaa98f550a4d1ba6446b30011a6312b276cbef3e7caa43d5e19d5bef1e0fed006aa2", 0x3a, 0x4000, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) fsetxattr$security_capability(r6, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r6, &(0x7f0000000080)={0x7}, 0x7) 15:14:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003000a00000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) accept$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) 15:14:54 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:54 executing program 2: mkdir(&(0x7f0000000300)='./file1\x00', 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getdents64(r1, &(0x7f0000000740)=""/4096, 0x1000) fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f0000000080)={0x32a01bc9, 0x4, [0x7]}) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f00000002c0)={0x0, 0x0, {0x1a, 0x2, 0xe, 0x7, 0x5, 0x6, 0x0, 0xa9, 0x1}}) write$P9_RXATTRCREATE(r1, &(0x7f0000000180)={0x7, 0x21, 0x1}, 0xfffffffffffffdde) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x800020, &(0x7f0000000200)=ANY=[@ANYBLOB="64656661756c745f7065706d697373696f6e732c64656661756c745f7065726d697373696fedd00000000000006c745f7065726d697373696f6e732c78696e6f3d6f66662c6d657461636f70793d6f6e2c75707064656661756c745f7065726d697373696f6e732c96517461636f70793d6f66662c61707072616973652c646ffbffffff6173682c61756469742c6f626a5f757365723d6f7665726c6179002c00"/175]) 15:14:54 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x83, &(0x7f0000000480)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file1/file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) r2 = creat(&(0x7f0000000340)='./file1\x00', 0x20) ioctl$VIDIOC_G_JPEGCOMP(r2, 0x808c563d, &(0x7f0000000380)) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x2000) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r4, 0x400, 0x70bd26, 0x25dfdbff, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'ib', 0x3a, 'bcsf0\x00'}}}, ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x3b0d08eb00ee381a}, 0x8000) [ 2587.811961][ T3881] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 15:14:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:14:55 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) [ 2587.956302][ T4001] overlayfs: missing 'lowerdir' 15:14:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003000b00000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) [ 2588.055416][ T4008] EXT4-fs (sda1): quotafile must be on filesystem root 15:14:55 executing program 2: setxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) 15:14:55 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) [ 2588.097963][ T4099] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:14:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x101000, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000006c0)={@local, @dev, 0x0}, &(0x7f0000000c00)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000c40)={{{@in6=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000d40)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@multicast2, @in6=@local, 0x4e20, 0xd1, 0x4e20, 0x80, 0xa, 0xa0, 0x80, 0xff, r2, r3}, {0x3, 0x3ff, 0x101, 0x0, 0x913a, 0x6, 0x80000000, 0x3c6}, {0x4, 0x1, 0x4f, 0x1}, 0x1f, 0x0, 0x2, 0x1, 0x1, 0x1}, {{@in=@loopback, 0x4d6}, 0xa, @in6=@ipv4={[], [], @loopback}, 0x0, 0x2, 0x0, 0x923, 0x18, 0x6, 0x300}}, 0xe8) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653199e5ec8e6b8680aedb86f2ea6e164854e834ddc488f65d0c9e8f5fccbe5093222d5c3964e45bbb14124a0bc03e8b233a1ccb6d77099774384eafa1cbf3a1091782277f383f9ab773173500191a97beb1241160163c27226ec8414d3d2f7cf77a70ed60116cfadea3c63231c7f97b8e41e5473e5aae4fdf63bbc2ada30ad4abc8351e57b93ecb7e997d315de479a8e41286e16c96420a4dec806310f07ea3517b73e788edac256896563cfbd014b692e995d235e5b73d63018a5c20058e7383665513027612"]) chdir(&(0x7f0000000280)='./file0\x00') r4 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r4, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) r5 = socket$unix(0x1, 0x0, 0x0) bind$unix(r5, 0x0, 0xfffffd40) [ 2588.219703][ T4099] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:55 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003230f00000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@noblock_validity='noblock_validity'}]}) 15:14:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 15:14:55 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdirA./file1']) chdir(&(0x7f0000000040)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x1, 0x2) bind$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x1, 0x2, 0x3, 0x2, 0x5, "a56876db30e6cd3d19e19d9d72f9f818f80f1634e4f8ec2624dc3efd3e1545405731c11e662b336e9206d8fde89aa055b907da6f5fc1cebfe2b074651fda3d", 0x25}, 0x60) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f00000001c0)={0x0, 0xff, 0x1, &(0x7f0000000180)=0x1}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000080)={0x7}, 0x7) 15:14:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:14:55 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) [ 2588.489426][ T4445] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2588.567978][ T4459] overlayfs: unrecognized mount option "workdirA./file1" or missing value [ 2588.584742][ T4451] EXT4-fs (sda1): re-mounted. Opts: noblock_validity, 15:14:55 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2588.637500][ T4445] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:55 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d372f6600000000000005bf65726468723d2e2f66696c6531d7d26f726b6469723d2e2f66696c6531"]) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x800, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x101000) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x6060}, {r1, 0x8}, {r0, 0x2201}], 0x4, &(0x7f00000001c0), &(0x7f0000000240), 0x8) getsockopt$inet_buf(r1, 0x0, 0x4, &(0x7f0000000340)=""/151, &(0x7f0000000100)=0x97) socket$unix(0x1, 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f00000002c0)={0x200, 0x7033777f, 0x2, 0x1, 0x0, @discrete={0x1000, 0xffffffffffffffc1}}) bind$unix(0xffffffffffffffff, 0x0, 0x0) 15:14:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003041000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:55 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c686f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531c4f04f18c94512a9f8cb30a1ae809591113ff42f9c7aa0d6dccc45ac64819f0ec9296a73c8723bfacfd9d780d7c2339e83f2c8353a6b450fc75ca586a42cfdb55bc8074e5f0d040a87d8cb3da4bfad5c6fc2bc8f1421c42136fc3667cec723062be237e1d4f1f0d91b8b33f03efc4156a6e1ce93155629a42950073fdaf6db50b8c29ef0512b3850d3c3757db0d9722dac42d280bc282014ef970e827383c8fb675ccb0e2d"]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) [ 2588.789176][ T4736] overlayfs: failed to resolve './file1': -2 15:14:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="91000000797c15b92c30ab48268e7f0300000000000000cc8df018ddbd41ff6843c676e9d98383c5d8f37380b164fb70e69ecb75bb33868278253d209b5e181133ab10f9d38ac583e8888dde507270318fa893413717a68350319fcc5aa344d8f88ec34b9b68a46d24fe45917236a09c37f537315d3bb4b4eb4456f528d187c9f6495e7ca9909b00"], &(0x7f0000000100)=0x99) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000240)={r1, 0x1f, 0xfffffffffffffffd, 0xcc}, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000300)=ANY=[@ANYBLOB="7573726a71756f71613d0200000000000000001530af74f7be4b12d797ff0df05db86c6f127706f0c59a68346679c23e1e631b46821f83611b9cd8c301aaddc41e58592e0367f8626f3d66f5a49ff805ed7b935db7df025979559ad8423bce81694ea90142a193217851437d31444107f0fe5a931c0644c45584f00f33def2773dfe0afaf98fd010db46f91d184aaf443a6a295f97dfb47385503ae35f5f773def58c7b92ffcf07a2f8357d84100"/183]) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000002c0)=0x4) 15:14:55 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2588.872544][ T4779] overlayfs: missing 'lowerdir' [ 2588.919662][ T4781] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2588.951970][ T4792] overlayfs: unrecognized mount option "howerdir=./file1" or missing value 15:14:56 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) [ 2588.986548][ T4816] overlayfs: failed to resolve './file1': -2 15:14:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000080)) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYBLOB='usrjquote\'./fiLe0,\x00']) 15:14:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2589.058053][ T4781] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') r1 = ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x2180, 0x0) write$rfkill(r2, &(0x7f00000001c0)={0x9e, 0x0, 0x1, 0x0, 0x1}, 0x8) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f00000000c0)={0x0, 0x8}) r3 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) r4 = shmget(0x0, 0x3000, 0x54000080, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_STAT(r4, 0x2, &(0x7f0000000040)=""/58) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) [ 2589.146114][ T4988] overlayfs: failed to resolve './file1': -2 15:14:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003201000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:56 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:14:56 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) close(r0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file1\x00', r1}, 0x10) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696cb5e42c6c6f7765726469723d2e2f66696865312c776f726b6469723d2e2f66696c6531"]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r2, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r2, &(0x7f0000000080)={0x7}, 0x7) 15:14:56 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) [ 2589.236551][ T5005] EXT4-fs (sda1): Unrecognized mount option "usrjquote'./fiLe0" or missing value 15:14:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) [ 2589.371671][ T5120] overlayfs: failed to resolve './filµä': -2 [ 2589.413477][ T5122] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:56 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:14:56 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x100002001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) socketpair(0x1, 0x2, 0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x7, 0x8, 0xd2a, 0x4}, &(0x7f0000000180)=0x14) getpeername$tipc(r1, &(0x7f0000000240), &(0x7f0000000280)=0x10) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000001c0)={r2, 0x5, 0x2, [0x5, 0x0]}, &(0x7f0000000200)=0xc) [ 2589.525107][ T5122] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003611500000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./1']) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x4001, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)={r0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)={0x0}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000001c0)={0x18, 0x0, &(0x7f0000000100)=[@increfs_done={0x40106308, r3, 0x4}, @enter_looper], 0xc9, 0x0, &(0x7f0000000340)="12c849301bdcee2d7609ca4a58305a9cd4de725f0bb7ef0e0b471ca928829ae14e20cfeb14ce8772c311e55755468264de0308b3dbffdfd3fc01bba96f96ab26c5a96d365fd744627e30deb94f99e74edc27c7bf6162952aeef91e8b7c05a36b2335a3169030ea96315ec74f24bc18f95ffe1ff3948f61441b8edb5687ad347c0de25e04cc95eda854a7e0247d4d6cbb2bcfad1df8eda7218566efcd1adadd948abf829d5debede2c92debd4c127f1c199acb37b630142a73b6624325b96cb9c2151360a58d20a1ef3"}) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) chroot(&(0x7f0000000240)='./file1\x00') mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 15:14:56 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696e65312c776f726b6469723d2e2f66696c6531740fa26ab14db63395a7128c35923caf6f0d462f097012600f31d3d64116fbfdf0862f0a5bdc2f40ce81ef1fc550"]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) 15:14:56 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:56 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:14:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x17ffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) [ 2589.779159][ T5557] overlayfs: failed to resolve './1': -2 [ 2589.783164][ T5554] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2589.809290][ T5560] overlayfs: failed to resolve './file1t¢j±M¶3•§Œ5’<¯o F/ p`1ÓÖAûýð†/ [ 2589.809290][ T5560] [Ü/@ÎïÅP': -2 15:14:56 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:56 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:14:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469727d2e2f66696c6531e831fa42a44bd28642a94aa9bd0949768345f2ab45727f09311bd4e3edaf996ab503113c989d8bba09d58c0350777e5a572fe6c5539fa9cd5db107b7f1ba62fcba8442f87de9238985a7494ab968f631cca6a3ceaa2a28cec8b3fe8556520f85b8c75f762f7705b4aa2e5a962d982b1d915241089c3d2d7050db1bcaadcba42eed"]) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x401, 0x400000) ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f00000000c0)={0x4, 0x7, 0x7a5, 0x3, 0x1}) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) [ 2589.965228][ T5554] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2590.042901][ T5793] overlayfs: unrecognized mount option "workdir}./file1è1úB¤KÒ†B©J©½ IvƒEò«Er 1Ôãí¯™jµ<˜‹º ÕŒPw~ZW/æÅSŸ©Í]±·ñºbüº„Bø}é#‰…§IJ¹hö1̦£Îª*(Îȳþ…VR…¸Ç_v/w´ª.Z–-˜+‘RAœ=-pPÛʭˤ.í" or missing value 15:14:57 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:57 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@mcast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000280)=@v3={0x3000000, [{0x200, 0x7ff}, {0x5, 0x1}], r1}, 0x18, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) chmod(&(0x7f0000000100)='./file1\x00', 0x70) 15:14:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$CAPI_NCCI_GETUNIT(r0, 0x80044327, &(0x7f0000000140)=0x6) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000180)=ANY=[]) 15:14:57 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:14:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003001f00000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:57 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:57 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x3, 0x1) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000080)={0x7}, 0x7) 15:14:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d8b1566696c65302c6c6f7765726469723d2e2f66698765312c776f72000000803d2e2f66696c6531"]) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000008}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x28, r3, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0xc, 0x4, [0x1, 0xffffffffffffffe7]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x8000) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 15:14:57 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:14:57 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) [ 2590.371013][ T6007] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:57 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0xfffffffffffffe75, 0x0, 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="0c452b2768d7182fa0e4d3d4299e3e18c1d2729ffea9d3bcdad361c3cf95acf7e0c4b2fdfc129cb506d6f7be798b76ffb1a108ee004cdd5d07674dbcbb9b57e9d54b0d6d0f20a178bb4a00edc65ca519ed5bd0c3cc202aa6674352e1674dae8df9d6eecca5dabf5aa9666a0b98c923857670b4a9d7cd6733c3c9a1d6b278ca9850279e538765df6c"]) 15:14:57 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2590.506405][ T6007] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2590.531662][ T6123] overlayfs: unrecognized mount option "wor" or missing value 15:14:57 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003002000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00, 0x0, 0x3f00000000000000}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x15, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x0, 0x0, @fd}]}]}, 0x24c}}, 0x0) 15:14:57 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000180)='./file2\x00', &(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)=@v2={0x2000000, [{0x9, 0x33d5}, {0x7ff, 0x8}]}, 0x14, 0x3) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000140)={0x2c, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x2, 'none\x00', 0x6, 0x9, 0x15}, 0x2c) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000b40)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f0000000c40)=0xe8) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000c80)={@rand_addr=0x1, @rand_addr=0x2, r1}, 0xc) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r2, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x8001}]}, 0xc, 0x0) write$P9_RXATTRCREATE(r2, &(0x7f0000000080)={0x7}, 0x7) 15:14:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="757003d285902766696c65302c6c6f043af069f27ded8825a688161fef738877657264a700c5aa1863acc4935e3743586fbc18d22b2c081624fbe9510e082bd67c8efe642a4e10406237eb3c553dae21e08d32da90165cfb4ba2daefea1a54380f3d7d60d7b96bd8d45fe411534f23217088299ce39891c2e7818852a4179346d1475199fce2cecde4b4d2f580a8e974e35e600a8192b14f333a13f8c18f8936a2e1eb15a0fe65b560e852dd6c48ffaebbdd48a2148798bbafd5459fc09c7885e9bd552dce8bad601022a76fa072aa18fb7ede9c155152d5a7a0b399b100"]) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) getresuid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) [ 2590.716521][ T6293] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:57 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:57 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2590.805576][ T6405] IPVS: set_ctl: invalid protocol: 44 172.30.1.3:20004 15:14:57 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x100) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2, 0x0) sendmsg$rds(r0, &(0x7f0000000980)={&(0x7f00000001c0)={0x2, 0x4e23, @rand_addr=0x3}, 0x10, &(0x7f00000008c0)=[{&(0x7f0000000200)=""/255, 0xff}, {&(0x7f0000000d80)=""/4096, 0x1000}, {&(0x7f0000000500)=""/201, 0xc9}, {&(0x7f0000000300)=""/157, 0x9d}, {&(0x7f0000000600)=""/139, 0x8b}, {&(0x7f00000006c0)=""/132, 0x84}, {&(0x7f0000000780)=""/143, 0x8f}, {&(0x7f0000000400)=""/109, 0x6d}, {&(0x7f0000000840)=""/127, 0x7f}, {&(0x7f0000001d80)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x4}, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000080)={0x7}, 0x7) [ 2590.869106][ T6442] overlayfs: unrecognized mount option "upÒ…'file0" or missing value 15:14:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00, 0x0, 0x3f00000000000000}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x15, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x0, 0x0, @fd}]}]}, 0x24c}}, 0x0) [ 2590.928916][ T6293] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:58 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003102000000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:58 executing program 3: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, 'clien\x00\x00\x00\x00\x00\x00\x04\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0x0, "7fd82d5e02ca3901", "88e70700000000000000fff77711be18a3d918e000"}) 15:14:58 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2591.055199][ T6522] overlayfs: failed to resolve './file1': -2 15:14:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 15:14:58 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:58 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,gorkdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7}, 0x7) [ 2591.207554][ T6662] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:58 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_mr_cache\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, &(0x7f000001c000)) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, &(0x7f0000000280)) chdir(&(0x7f0000000180)='./file0\x00') open(&(0x7f00000001c0)='./file0\x00', 0x200000, 0x1) r1 = getpgrp(0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000000)=0x7) getsockname$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8001, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) write$eventfd(r2, &(0x7f0000000080), 0xfffffe5e) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x4400, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000340)) 15:14:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2591.344628][ T6662] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2591.356782][ T6849] overlayfs: unrecognized mount option "gorkdir=./file1" or missing value 15:14:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312cb0df80f63eb99abb43b04a21a177776f726b6469723d2e2f66696c6531d7f11c22771e25f753addc12a6511065e479eda31979211ba2af4d09cf405bd1173a7badfe940313519fcf89c7104783aee4dda959ea6e8be110f57999b878063fc72e38c3d373a88f71e8c1f7e969b89d99dc8a67baf54286663bed104f5105a39cea99"]) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x101080, 0x0) write$apparmor_exec(r2, &(0x7f00000000c0)={'exec ', 'overlay\x00'}, 0xd) mkdirat(r1, &(0x7f0000000100)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 15:14:58 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:58 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/netfilter\x00') getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f00000001c0)=0x4) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000080)={0x7}, 0x7) 15:14:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003002300000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2591.560875][ T7102] overlayfs: unrecognized mount option "°ß€ö>¹š»C°J!¡wworkdir=./file1×ñ"w%÷S­Ü¦Qeäyí£y!¢¯M Ï@[Ñ:{­þ”QŸÏ‰ÇGƒ®äÝ©Yên‹áõy™¸x?Ç.8ÃÓs¨qèÁ÷éi¸™ÜŠgºõB†f;íOQ£œê™" or missing value [ 2591.650494][ T7108] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:14:58 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_mr_cache\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, &(0x7f000001c000)) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, &(0x7f0000000280)) chdir(&(0x7f0000000180)='./file0\x00') open(&(0x7f00000001c0)='./file0\x00', 0x200000, 0x1) r1 = getpgrp(0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000000)=0x7) getsockname$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8001, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) write$eventfd(r2, &(0x7f0000000080), 0xfffffe5e) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x4400, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000340)) 15:14:58 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x0}}], 0x22b, 0x0) 15:14:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d1900030f2300000000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:14:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:14:58 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in={0x2, 0x0, @initdev}, 0x10, 0x0, 0x0, &(0x7f0000000340)=[@dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @dstaddrv6={0x20, 0x84, 0x8, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}], 0x40, 0x20000000}, 0x8000) 15:14:58 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0xa0) r0 = open(&(0x7f0000000000)='./file1\x00', 0x10000, 0x28) mknodat(r0, &(0x7f0000000240)='./file1\x00', 0x8000, 0x900000) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65477ddf5ae05e5e5871b51a8b302c6c6f7765726469723d002f66696c65312c776f726b6469723d2e2f66696c6531"]) chdir(&(0x7f0000000040)='./file0\x00') write$eventfd(r0, &(0x7f00000000c0)=0x7f, 0x8) r1 = openat$cgroup_ro(r0, &(0x7f0000000400)='memOry.events\x00\x8a\xb6\x99\aC\xd3\x06y\xb3\xa0\x1d\xdd\x8c@ \xac\x97YQ0x0, @ANYBLOB="91000000797c15b92c30ab48268e7f0300000000000000cc8df018ddbd41ff6843c676e9d98383c5d8f37380b164fb70e69ecb75bb33868278253d209b5e181133ab10f9d38ac583e8888dde507270318fa893413717a68350319fcc5aa344d8f88ec34b9b68a46d24fe45917236a09c37f537315d3bb4b4eb4456f528d187c9f6495e7ca9909b00"], &(0x7f0000000100)=0x99) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000240)={r1, 0x1f, 0xfffffffffffffffd, 0xcc}, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000300)=ANY=[@ANYBLOB="7573726a71756f71613d0200000000000000001530af74f7be4b12d797ff0df05db86c6f127706f0c59a68346679c23e1e631b46821f83611b9cd8c301aaddc41e58592e0367f8626f3d66f5a49ff805ed7b935db7df025979559ad8423bce81694ea90142a193217851437d31444107f0fe5a931c0644c45584f00f33def2773dfe0afaf98fd010db46f91d184aaf443a6a295f97dfb47385503ae35f5f773def58c7b92ffcf07a2f8357d84100"/183]) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000002c0)=0x4) 15:15:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x0, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@noblock_validity='noblock_validity'}]}) 15:15:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003000000030000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:07 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x11000000}], 0x22b, 0x0) [ 2600.189260][T10553] overlayfs: unrecognized mount option "lowerdir" or missing value 15:15:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir']) [ 2600.295307][T10560] EXT4-fs (sda1): re-mounted. Opts: noblock_validity, 15:15:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="91000000797c15b92c30ab48268e7f0300000000000000cc8df018ddbd41ff6843c676e9d98383c5d8f37380b164fb70e69ecb75bb33868278253d209b5e181133ab10f9d38ac583e8888dde507270318fa893413717a68350319fcc5aa344d8f88ec34b9b68a46d24fe45917236a09c37f537315d3bb4b4eb4456f528d187c9f6495e7ca9909b00"], &(0x7f0000000100)=0x99) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000240)={r1, 0x1f, 0xfffffffffffffffd, 0xcc}, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000300)=ANY=[@ANYBLOB="7573726a71756f71613d0200000000000000001530af74f7be4b12d797ff0df05db86c6f127706f0c59a68346679c23e1e631b46821f83611b9cd8c301aaddc41e58592e0367f8626f3d66f5a49ff805ed7b935db7df025979559ad8423bce81694ea90142a193217851437d31444107f0fe5a931c0644c45584f00f33def2773dfe0afaf98fd010db46f91d184aaf443a6a295f97dfb47385503ae35f5f773def58c7b92ffcf07a2f8357d84100"/183]) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000002c0)=0x4) 15:15:07 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x2a020000}], 0x22b, 0x0) [ 2600.362213][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2600.368182][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2600.400398][T10576] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@noblock_validity='noblock_validity'}]}) 15:15:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2600.482986][T10580] overlayfs: unrecognized mount option "lowerdir" or missing value 15:15:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="91000000797c15b92c30ab48268e7f0300000000000000cc8df018ddbd41ff6843c676e9d98383c5d8f37380b164fb70e69ecb75bb33868278253d209b5e181133ab10f9d38ac583e8888dde507270318fa893413717a68350319fcc5aa344d8f88ec34b9b68a46d24fe45917236a09c37f537315d3bb4b4eb4456f528d187c9f6495e7ca9909b00"], &(0x7f0000000100)=0x99) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000240)={r1, 0x1f, 0xfffffffffffffffd, 0xcc}, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000300)=ANY=[@ANYBLOB="7573726a71756f71613d0200000000000000001530af74f7be4b12d797ff0df05db86c6f127706f0c59a68346679c23e1e631b46821f83611b9cd8c301aaddc41e58592e0367f8626f3d66f5a49ff805ed7b935db7df025979559ad8423bce81694ea90142a193217851437d31444107f0fe5a931c0644c45584f00f33def2773dfe0afaf98fd010db46f91d184aaf443a6a295f97dfb47385503ae35f5f773def58c7b92ffcf07a2f8357d84100"/183]) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000002c0)=0x4) 15:15:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,wor']) 15:15:07 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x40000000}], 0x22b, 0x0) 15:15:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2600.543495][T10586] EXT4-fs (sda1): re-mounted. Opts: noblock_validity, 15:15:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003000000040000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="91000000797c15b92c30ab48268e7f0300000000000000cc8df018ddbd41ff6843c676e9d98383c5d8f37380b164fb70e69ecb75bb33868278253d209b5e181133ab10f9d38ac583e8888dde507270318fa893413717a68350319fcc5aa344d8f88ec34b9b68a46d24fe45917236a09c37f537315d3bb4b4eb4456f528d187c9f6495e7ca9909b00"], &(0x7f0000000100)=0x99) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000240)={r1, 0x1f, 0xfffffffffffffffd, 0xcc}, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000300)=ANY=[@ANYBLOB="7573726a71756f71613d0200000000000000001530af74f7be4b12d797ff0df05db86c6f127706f0c59a68346679c23e1e631b46821f83611b9cd8c301aaddc41e58592e0367f8626f3d66f5a49ff805ed7b935db7df025979559ad8423bce81694ea90142a193217851437d31444107f0fe5a931c0644c45584f00f33def2773dfe0afaf98fd010db46f91d184aaf443a6a295f97dfb47385503ae35f5f773def58c7b92ffcf07a2f8357d84100"/183]) 15:15:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@noblock_validity='noblock_validity'}]}) [ 2600.743888][T10604] overlayfs: unrecognized mount option "wor" or missing value [ 2600.744408][T10610] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x10, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:07 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x43ff0000}], 0x22b, 0x0) 15:15:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,wor']) 15:15:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="91000000797c15b92c30ab48268e7f0300000000000000cc8df018ddbd41ff6843c676e9d98383c5d8f37380b164fb70e69ecb75bb33868278253d209b5e181133ab10f9d38ac583e8888dde507270318fa893413717a68350319fcc5aa344d8f88ec34b9b68a46d24fe45917236a09c37f537315d3bb4b4eb4456f528d187c9f6495e7ca9909b00"], &(0x7f0000000100)=0x99) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000240)={r1, 0x1f, 0xfffffffffffffffd, 0xcc}, 0x10) [ 2600.882387][T10617] EXT4-fs (sda1): re-mounted. Opts: noblock_validity, [ 2600.896331][T10610] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:08 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x60000000}], 0x22b, 0x0) 15:15:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x10, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@noblock_validity='noblock_validity'}]}) 15:15:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003000000050000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) [ 2601.041154][T10633] overlayfs: unrecognized mount option "wor" or missing value 15:15:08 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0xc3ff0000}], 0x22b, 0x0) 15:15:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="91000000797c15b92c30ab48268e7f0300000000000000cc8df018ddbd41ff6843c676e9d98383c5d8f37380b164fb70e69ecb75bb33868278253d209b5e181133ab10f9d38ac583e8888dde507270318fa893413717a68350319fcc5aa344d8f88ec34b9b68a46d24fe45917236a09c37f537315d3bb4b4eb4456f528d187c9f6495e7ca9909b00"], &(0x7f0000000100)=0x99) 15:15:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,wor']) 15:15:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x10, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@noblock_validity='noblock_validity'}]}) [ 2601.219301][T10648] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:08 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0xe8030000}], 0x22b, 0x0) 15:15:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x100, 0x0) [ 2601.287017][T10660] overlayfs: unrecognized mount option "wor" or missing value 15:15:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=.']) 15:15:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@noblock_validity='noblock_validity'}]}) 15:15:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) [ 2601.419281][T10648] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2601.508826][T10679] overlayfs: workdir and upperdir must be separate subtrees 15:15:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003000000060000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:08 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0xeffdffff}], 0x22b, 0x0) 15:15:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 15:15:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=.']) 15:15:08 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0xf4010000}], 0x22b, 0x0) 15:15:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:08 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@noblock_validity='noblock_validity'}]}) [ 2601.749858][T10702] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2601.756668][T10704] overlayfs: workdir and upperdir must be separate subtrees 15:15:08 executing program 3: mkdir(0x0, 0x0) 15:15:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=.']) 15:15:08 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0xfffffdef}], 0x22b, 0x0) [ 2601.869953][T10702] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003000000070000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, 0x0, &(0x7f0000000040)) [ 2601.936030][T10722] overlayfs: workdir and upperdir must be separate subtrees 15:15:09 executing program 3: mkdir(0x0, 0x0) 15:15:09 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@noblock_validity='noblock_validity'}]}) 15:15:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./fi']) 15:15:09 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0xffffff7f}], 0x22b, 0x0) 15:15:09 executing program 3: mkdir(0x0, 0x0) 15:15:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, 0x0, &(0x7f0000000040)) [ 2602.187740][T10749] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2602.191307][T10745] overlayfs: failed to resolve './fi': -2 15:15:09 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x4000000000000}], 0x22b, 0x0) 15:15:09 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@noblock_validity='noblock_validity'}]}) 15:15:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./fi']) [ 2602.338353][T10749] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, 0x0, &(0x7f0000000040)) [ 2602.434995][T10772] overlayfs: failed to resolve './fi': -2 15:15:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) setxattr(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000000c0)=@known='security.apparmor\x00', &(0x7f0000000100)='overlay\x00', 0x8, 0x2) 15:15:09 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x40030000000000}], 0x22b, 0x0) 15:15:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003000000080000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./fi']) 15:15:09 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@noblock_validity='noblock_validity'}]}) 15:15:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x0) 15:15:09 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x100000000000000}], 0x22b, 0x0) [ 2602.641421][T10779] overlayfs: failed to resolve './fi': -2 [ 2602.660955][T10785] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file']) 15:15:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x3, 0x10001, 0xfffffffffffff000}) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x5c000) setsockopt$inet6_buf(r1, 0x29, 0x2f, &(0x7f00000002c0)="7412cedc9771ee97d439e10be5a992099e109dba5e8502f1d9f4ab9c8ad934564bfc5c31211a0eb0e965b18a3210c2d515d85d89e4b1e25f710c17330cb9e14bc57c7ed18b68184abd623e38642f1d0dec2e645a4d75d855ee0c22eb5d45f946aeb6dd6b21da51a6c5d62c9fecdbe7b6ec2f535509a682ebaf721284efeddc6b48fa579f404db82a9f7659cafff184534434a533282821b92f908a54e0eb37d8ef9b5dc169699315d4073d34c26b184b5a6dbd8dcf051ee6e6dd9bb90000000000", 0xc1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000240)={0x1000, 0x9bd, &(0x7f00000001c0)="44c1d1caa691ed72411ef1ee87dc057ca59ff0f295fe71249ec249df391d121cf5a2be837c728fd1ab65c7eb5eeef9d78f5ca645f7422810e884a98b8a007e3766bdac0a48c88f7b07da5d", &(0x7f00000003c0)="26087dfd72510e0eba4beb52a4c7b151f24f8e5c8510c1d8c6c64544dc9a9f14609a18e7998d511ebc64565cb3be445279dcb520cb3de71a1c399fc89e79e7bcaa3a90ac136559b9a3e16caaca2269b44d7ac3fb213d6eb984bb75a7886956322039d738a10df82fe4ad330e541e5667fd66da18adf56a25148f2b58ae55a9be4f49ea9f4203fa80f5a108db1d79c72743c06a9a7aef44b4b4be63d65efb6f5a290f9ee3c29c46d4a273601ee1689cd8ae027ee52251010b437b321b7fbf253d66129ab40a5bef60a823f23f2a7466eba2bc9743646405414268d076912677aa0baaf02f84c968", 0x4b, 0xe7}) symlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:09 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@noblock_validity='noblock_validity'}]}) 15:15:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x0) 15:15:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003000000090000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) [ 2602.864488][T10802] overlayfs: failed to resolve './file': -2 15:15:10 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x200000000000000}], 0x22b, 0x0) 15:15:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file']) 15:15:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x0) [ 2603.042406][T10810] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000003, [ 2603.078446][T10815] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:10 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@noblock_validity='noblock_validity'}]}) 15:15:10 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x300000000000000}], 0x22b, 0x0) 15:15:10 executing program 2 (fault-call:4 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2603.141745][T10828] overlayfs: failed to resolve './file': -2 15:15:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file']) 15:15:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x3, 0x10001, 0xfffffffffffff000}) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x5c000) setsockopt$inet6_buf(r1, 0x29, 0x2f, &(0x7f00000002c0)="7412cedc9771ee97d439e10be5a992099e109dba5e8502f1d9f4ab9c8ad934564bfc5c31211a0eb0e965b18a3210c2d515d85d89e4b1e25f710c17330cb9e14bc57c7ed18b68184abd623e38642f1d0dec2e645a4d75d855ee0c22eb5d45f946aeb6dd6b21da51a6c5d62c9fecdbe7b6ec2f535509a682ebaf721284efeddc6b48fa579f404db82a9f7659cafff184534434a533282821b92f908a54e0eb37d8ef9b5dc169699315d4073d34c26b184b5a6dbd8dcf051ee6e6dd9bb90000000000", 0xc1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000240)={0x1000, 0x9bd, &(0x7f00000001c0)="44c1d1caa691ed72411ef1ee87dc057ca59ff0f295fe71249ec249df391d121cf5a2be837c728fd1ab65c7eb5eeef9d78f5ca645f7422810e884a98b8a007e3766bdac0a48c88f7b07da5d", &(0x7f00000003c0)="26087dfd72510e0eba4beb52a4c7b151f24f8e5c8510c1d8c6c64544dc9a9f14609a18e7998d511ebc64565cb3be445279dcb520cb3de71a1c399fc89e79e7bcaa3a90ac136559b9a3e16caaca2269b44d7ac3fb213d6eb984bb75a7886956322039d738a10df82fe4ad330e541e5667fd66da18adf56a25148f2b58ae55a9be4f49ea9f4203fa80f5a108db1d79c72743c06a9a7aef44b4b4be63d65efb6f5a290f9ee3c29c46d4a273601ee1689cd8ae027ee52251010b437b321b7fbf253d66129ab40a5bef60a823f23f2a7466eba2bc9743646405414268d076912677aa0baaf02f84c968", 0x4b, 0xe7}) symlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2603.213988][T10815] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d1900030000000a0000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2603.344473][T10845] overlayfs: failed to resolve './file': -2 [ 2603.376997][T10847] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000003, 15:15:10 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x400000000000000}], 0x22b, 0x0) 15:15:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@noblock_validity='noblock_validity'}]}) 15:15:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:10 executing program 4 (fault-call:4 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2603.501032][T10855] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x3, 0x10001, 0xfffffffffffff000}) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x5c000) setsockopt$inet6_buf(r1, 0x29, 0x2f, &(0x7f00000002c0)="7412cedc9771ee97d439e10be5a992099e109dba5e8502f1d9f4ab9c8ad934564bfc5c31211a0eb0e965b18a3210c2d515d85d89e4b1e25f710c17330cb9e14bc57c7ed18b68184abd623e38642f1d0dec2e645a4d75d855ee0c22eb5d45f946aeb6dd6b21da51a6c5d62c9fecdbe7b6ec2f535509a682ebaf721284efeddc6b48fa579f404db82a9f7659cafff184534434a533282821b92f908a54e0eb37d8ef9b5dc169699315d4073d34c26b184b5a6dbd8dcf051ee6e6dd9bb90000000000", 0xc1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000240)={0x1000, 0x9bd, &(0x7f00000001c0)="44c1d1caa691ed72411ef1ee87dc057ca59ff0f295fe71249ec249df391d121cf5a2be837c728fd1ab65c7eb5eeef9d78f5ca645f7422810e884a98b8a007e3766bdac0a48c88f7b07da5d", &(0x7f00000003c0)="26087dfd72510e0eba4beb52a4c7b151f24f8e5c8510c1d8c6c64544dc9a9f14609a18e7998d511ebc64565cb3be445279dcb520cb3de71a1c399fc89e79e7bcaa3a90ac136559b9a3e16caaca2269b44d7ac3fb213d6eb984bb75a7886956322039d738a10df82fe4ad330e541e5667fd66da18adf56a25148f2b58ae55a9be4f49ea9f4203fa80f5a108db1d79c72743c06a9a7aef44b4b4be63d65efb6f5a290f9ee3c29c46d4a273601ee1689cd8ae027ee52251010b437b321b7fbf253d66129ab40a5bef60a823f23f2a7466eba2bc9743646405414268d076912677aa0baaf02f84c968", 0x4b, 0xe7}) symlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:10 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x500000000000000}], 0x22b, 0x0) [ 2603.597407][T10890] FAULT_INJECTION: forcing a failure. [ 2603.597407][T10890] name failslab, interval 1, probability 0, space 0, times 0 [ 2603.622342][T10890] CPU: 1 PID: 10890 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2603.630283][T10890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2603.640343][T10890] Call Trace: [ 2603.643641][T10890] dump_stack+0x172/0x1f0 [ 2603.647989][T10890] should_fail.cold+0xa/0x15 [ 2603.652585][T10890] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2603.658407][T10890] ? ___might_sleep+0x163/0x280 [ 2603.663278][T10890] __should_failslab+0x121/0x190 [ 2603.668226][T10890] should_failslab+0x9/0x14 [ 2603.673977][T10890] __kmalloc_track_caller+0x2d8/0x740 [ 2603.679382][T10890] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2603.685796][T10890] ? fput_many+0x12c/0x1a0 [ 2603.690214][T10890] ? strndup_user+0x77/0xd0 [ 2603.694758][T10890] memdup_user+0x26/0xb0 [ 2603.699005][T10890] strndup_user+0x77/0xd0 [ 2603.703333][T10890] ksys_mount+0x3c/0x150 [ 2603.708118][T10890] __x64_sys_mount+0xbe/0x150 [ 2603.712798][T10890] do_syscall_64+0x103/0x610 [ 2603.717399][T10890] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2603.723599][T10890] RIP: 0033:0x458c29 [ 2603.727500][T10890] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:15:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2603.747114][T10890] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2603.757992][T10890] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2603.766152][T10890] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2603.774136][T10890] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2603.782104][T10890] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2603.790330][T10890] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@noblock_validity='noblock_validity'}]}) 15:15:10 executing program 4 (fault-call:4 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2603.855046][T10855] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:10 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x700000000000000}], 0x22b, 0x0) [ 2603.923582][T10981] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000003, 15:15:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d1900030000000b0000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:11 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0xa00000000000000}], 0x22b, 0x0) 15:15:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@noblock_validity='noblock_validity'}]}) [ 2604.053600][T11096] FAULT_INJECTION: forcing a failure. [ 2604.053600][T11096] name failslab, interval 1, probability 0, space 0, times 0 [ 2604.066412][T11096] CPU: 1 PID: 11096 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2604.074405][T11096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2604.084572][T11096] Call Trace: [ 2604.087880][T11096] dump_stack+0x172/0x1f0 [ 2604.092223][T11096] should_fail.cold+0xa/0x15 [ 2604.096811][T11096] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2604.102620][T11096] ? ___might_sleep+0x163/0x280 [ 2604.107479][T11096] __should_failslab+0x121/0x190 [ 2604.112429][T11096] should_failslab+0x9/0x14 [ 2604.116932][T11096] __kmalloc_track_caller+0x2d8/0x740 [ 2604.122390][T11096] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2604.128628][T11096] ? strndup_user+0x77/0xd0 [ 2604.133144][T11096] memdup_user+0x26/0xb0 [ 2604.137379][T11096] strndup_user+0x77/0xd0 [ 2604.141715][T11096] ksys_mount+0x7b/0x150 [ 2604.146235][T11096] __x64_sys_mount+0xbe/0x150 [ 2604.150905][T11096] do_syscall_64+0x103/0x610 [ 2604.155497][T11096] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2604.161398][T11096] RIP: 0033:0x458c29 [ 2604.165370][T11096] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2604.185138][T11096] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2604.193550][T11096] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2604.201539][T11096] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2604.209501][T11096] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2604.217462][T11096] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2604.225421][T11096] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:11 executing program 4 (fault-call:4 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x3, 0x10001, 0xfffffffffffff000}) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x5c000) setsockopt$inet6_buf(r1, 0x29, 0x2f, &(0x7f00000002c0)="7412cedc9771ee97d439e10be5a992099e109dba5e8502f1d9f4ab9c8ad934564bfc5c31211a0eb0e965b18a3210c2d515d85d89e4b1e25f710c17330cb9e14bc57c7ed18b68184abd623e38642f1d0dec2e645a4d75d855ee0c22eb5d45f946aeb6dd6b21da51a6c5d62c9fecdbe7b6ec2f535509a682ebaf721284efeddc6b48fa579f404db82a9f7659cafff184534434a533282821b92f908a54e0eb37d8ef9b5dc169699315d4073d34c26b184b5a6dbd8dcf051ee6e6dd9bb90000000000", 0xc1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000240)={0x1000, 0x9bd, &(0x7f00000001c0)="44c1d1caa691ed72411ef1ee87dc057ca59ff0f295fe71249ec249df391d121cf5a2be837c728fd1ab65c7eb5eeef9d78f5ca645f7422810e884a98b8a007e3766bdac0a48c88f7b07da5d", &(0x7f00000003c0)="26087dfd72510e0eba4beb52a4c7b151f24f8e5c8510c1d8c6c64544dc9a9f14609a18e7998d511ebc64565cb3be445279dcb520cb3de71a1c399fc89e79e7bcaa3a90ac136559b9a3e16caaca2269b44d7ac3fb213d6eb984bb75a7886956322039d738a10df82fe4ad330e541e5667fd66da18adf56a25148f2b58ae55a9be4f49ea9f4203fa80f5a108db1d79c72743c06a9a7aef44b4b4be63d65efb6f5a290f9ee3c29c46d4a273601ee1689cd8ae027ee52251010b437b321b7fbf253d66129ab40a5bef60a823f23f2a7466eba2bc9743646405414268d076912677aa0baaf02f84c968", 0x4b, 0xe7}) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2604.358954][T11109] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:11 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0xe00000000000000}], 0x22b, 0x0) [ 2604.413114][T11114] FAULT_INJECTION: forcing a failure. [ 2604.413114][T11114] name failslab, interval 1, probability 0, space 0, times 0 15:15:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@noblock_validity='noblock_validity'}]}) [ 2604.463181][T11114] CPU: 0 PID: 11114 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2604.471127][T11114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2604.481220][T11114] Call Trace: [ 2604.484621][T11114] dump_stack+0x172/0x1f0 [ 2604.489006][T11114] should_fail.cold+0xa/0x15 [ 2604.493615][T11114] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2604.499428][T11114] ? ___might_sleep+0x163/0x280 [ 2604.504282][T11114] __should_failslab+0x121/0x190 [ 2604.509214][T11114] should_failslab+0x9/0x14 [ 2604.513824][T11114] kmem_cache_alloc_trace+0x2d1/0x760 [ 2604.519187][T11114] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2604.525507][T11114] ? _copy_from_user+0xdd/0x150 [ 2604.530350][T11114] copy_mount_options+0x5c/0x3a0 [ 2604.535365][T11114] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2604.541594][T11114] ksys_mount+0xa7/0x150 [ 2604.545825][T11114] __x64_sys_mount+0xbe/0x150 [ 2604.550494][T11114] do_syscall_64+0x103/0x610 [ 2604.555074][T11114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2604.560952][T11114] RIP: 0033:0x458c29 [ 2604.564831][T11114] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2604.584779][T11114] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2604.595781][T11114] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2604.603742][T11114] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2604.611714][T11114] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2604.619694][T11114] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2604.627663][T11114] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 [ 2604.658290][T11162] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000003, 15:15:11 executing program 4 (fault-call:4 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:11 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0xf00000000000000}], 0x22b, 0x0) [ 2604.808279][T11109] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x3, 0x10001, 0xfffffffffffff000}) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x5c000) setsockopt$inet6_buf(r1, 0x29, 0x2f, &(0x7f00000002c0)="7412cedc9771ee97d439e10be5a992099e109dba5e8502f1d9f4ab9c8ad934564bfc5c31211a0eb0e965b18a3210c2d515d85d89e4b1e25f710c17330cb9e14bc57c7ed18b68184abd623e38642f1d0dec2e645a4d75d855ee0c22eb5d45f946aeb6dd6b21da51a6c5d62c9fecdbe7b6ec2f535509a682ebaf721284efeddc6b48fa579f404db82a9f7659cafff184534434a533282821b92f908a54e0eb37d8ef9b5dc169699315d4073d34c26b184b5a6dbd8dcf051ee6e6dd9bb90000000000", 0xc1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003000000100000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@noblock_validity='noblock_validity'}]}) [ 2604.891792][T11271] FAULT_INJECTION: forcing a failure. [ 2604.891792][T11271] name failslab, interval 1, probability 0, space 0, times 0 [ 2604.953412][T11271] CPU: 1 PID: 11271 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2604.961351][T11271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2604.971722][T11271] Call Trace: [ 2604.971750][T11271] dump_stack+0x172/0x1f0 [ 2604.971770][T11271] should_fail.cold+0xa/0x15 [ 2604.971787][T11271] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2604.971805][T11271] ? ___might_sleep+0x163/0x280 [ 2604.971822][T11271] __should_failslab+0x121/0x190 15:15:12 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x1100000000000000}], 0x22b, 0x0) 15:15:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2604.971835][T11271] should_failslab+0x9/0x14 [ 2604.971861][T11271] kmem_cache_alloc+0x2b2/0x6f0 [ 2604.971876][T11271] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2604.971892][T11271] ? find_held_lock+0x35/0x130 [ 2604.971908][T11271] getname_flags+0xd6/0x5b0 [ 2604.971927][T11271] user_path_at_empty+0x2f/0x50 [ 2605.029369][T11271] do_mount+0x150/0x2c40 [ 2605.033633][T11271] ? copy_mount_options+0x5c/0x3a0 [ 2605.038756][T11271] ? copy_mount_string+0x40/0x40 [ 2605.043706][T11271] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 15:15:12 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x2a02000000000000}], 0x22b, 0x0) [ 2605.050043][T11271] ? _copy_from_user+0xdd/0x150 [ 2605.055176][T11271] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2605.064669][T11271] ? copy_mount_options+0x280/0x3a0 [ 2605.070585][T11271] ksys_mount+0xdb/0x150 [ 2605.074867][T11271] __x64_sys_mount+0xbe/0x150 [ 2605.079571][T11271] do_syscall_64+0x103/0x610 [ 2605.084186][T11271] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2605.090088][T11271] RIP: 0033:0x458c29 [ 2605.094080][T11271] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2605.114543][T11271] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2605.122961][T11271] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2605.130923][T11271] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2605.138908][T11271] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 15:15:12 executing program 4 (fault-call:4 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2605.146985][T11271] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2605.155748][T11271] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 [ 2605.230233][T11357] FAULT_INJECTION: forcing a failure. [ 2605.230233][T11357] name failslab, interval 1, probability 0, space 0, times 0 15:15:12 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x4000000000000000}], 0x22b, 0x0) [ 2605.271984][T11357] CPU: 1 PID: 11357 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2605.280020][T11357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2605.290091][T11357] Call Trace: [ 2605.293402][T11357] dump_stack+0x172/0x1f0 [ 2605.298106][T11357] should_fail.cold+0xa/0x15 [ 2605.302866][T11357] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2605.308845][T11357] ? ___might_sleep+0x163/0x280 [ 2605.314923][T11357] __should_failslab+0x121/0x190 [ 2605.319854][T11357] should_failslab+0x9/0x14 [ 2605.324371][T11357] kmem_cache_alloc+0x2b2/0x6f0 [ 2605.329254][T11357] ? cache_grow_end+0xa4/0x190 [ 2605.334010][T11357] ? kasan_check_write+0x14/0x20 [ 2605.339043][T11357] getname_flags+0xd6/0x5b0 [ 2605.343587][T11357] user_path_at_empty+0x2f/0x50 [ 2605.348452][T11357] do_mount+0x150/0x2c40 [ 2605.352775][T11357] ? copy_mount_options+0x5c/0x3a0 [ 2605.357890][T11357] ? copy_mount_string+0x40/0x40 [ 2605.362828][T11357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2605.369152][T11357] ? copy_mount_options+0x280/0x3a0 [ 2605.374349][T11357] ksys_mount+0xdb/0x150 [ 2605.378581][T11357] __x64_sys_mount+0xbe/0x150 [ 2605.383246][T11357] do_syscall_64+0x103/0x610 [ 2605.387831][T11357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2605.393720][T11357] RIP: 0033:0x458c29 [ 2605.397635][T11357] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:15:12 executing program 4 (fault-call:4 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2605.419247][T11357] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2605.427673][T11357] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2605.435647][T11357] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2605.443613][T11357] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2605.451580][T11357] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2605.459649][T11357] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@noblock_validity='noblock_validity'}]}) [ 2605.495335][T11364] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2605.521873][T11368] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000003, 15:15:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x3, 0x10001, 0xfffffffffffff000}) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x5c000) setsockopt$inet6_buf(r1, 0x29, 0x2f, &(0x7f00000002c0)="7412cedc9771ee97d439e10be5a992099e109dba5e8502f1d9f4ab9c8ad934564bfc5c31211a0eb0e965b18a3210c2d515d85d89e4b1e25f710c17330cb9e14bc57c7ed18b68184abd623e38642f1d0dec2e645a4d75d855ee0c22eb5d45f946aeb6dd6b21da51a6c5d62c9fecdbe7b6ec2f535509a682ebaf721284efeddc6b48fa579f404db82a9f7659cafff184534434a533282821b92f908a54e0eb37d8ef9b5dc169699315d4073d34c26b184b5a6dbd8dcf051ee6e6dd9bb90000000000", 0xc1) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2605.587855][T11455] FAULT_INJECTION: forcing a failure. [ 2605.587855][T11455] name failslab, interval 1, probability 0, space 0, times 0 [ 2605.612372][T11364] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:12 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x43ff000000000000}], 0x22b, 0x0) [ 2605.679086][T11455] CPU: 0 PID: 11455 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2605.687034][T11455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2605.697119][T11455] Call Trace: [ 2605.700447][T11455] dump_stack+0x172/0x1f0 [ 2605.704911][T11455] should_fail.cold+0xa/0x15 [ 2605.709603][T11455] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2605.730209][T11455] ? ___might_sleep+0x163/0x280 [ 2605.735078][T11455] __should_failslab+0x121/0x190 [ 2605.740002][T11455] should_failslab+0x9/0x14 [ 2605.744498][T11455] kmem_cache_alloc_trace+0x2d1/0x760 [ 2605.749882][T11455] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 2605.764380][T11455] ? rcu_read_lock_sched_held+0x110/0x130 [ 2605.770114][T11455] ? kmem_cache_alloc_trace+0x354/0x760 [ 2605.775668][T11455] legacy_init_fs_context+0x48/0xe0 [ 2605.780849][T11455] ? generic_parse_monolithic+0x200/0x200 [ 2605.786552][T11455] alloc_fs_context+0x365/0x640 [ 2605.791393][T11455] fs_context_for_mount+0x25/0x30 [ 2605.796403][T11455] do_mount+0x13d7/0x2c40 [ 2605.800736][T11455] ? copy_mount_string+0x40/0x40 [ 2605.805688][T11455] ? _copy_from_user+0xdd/0x150 [ 2605.810533][T11455] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2605.816773][T11455] ? copy_mount_options+0x280/0x3a0 [ 2605.822145][T11455] ksys_mount+0xdb/0x150 [ 2605.826404][T11455] __x64_sys_mount+0xbe/0x150 [ 2605.831086][T11455] do_syscall_64+0x103/0x610 [ 2605.835672][T11455] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2605.841555][T11455] RIP: 0033:0x458c29 [ 2605.845456][T11455] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2605.865235][T11455] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2605.873649][T11455] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2605.881642][T11455] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2605.889613][T11455] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2605.897570][T11455] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2605.905642][T11455] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@noblock_validity='noblock_validity'}]}) 15:15:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003000004100000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:13 executing program 4 (fault-call:4 fault-nth:6): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:13 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x6000000000000000}], 0x22b, 0x0) [ 2606.131748][T11563] FAULT_INJECTION: forcing a failure. [ 2606.131748][T11563] name failslab, interval 1, probability 0, space 0, times 0 15:15:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@noblock_validity='noblock_validity'}]}) [ 2606.228609][T11620] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2606.249808][T11563] CPU: 0 PID: 11563 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2606.257844][T11563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2606.267914][T11563] Call Trace: [ 2606.271226][T11563] dump_stack+0x172/0x1f0 15:15:13 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0xc3ff000000000000}], 0x22b, 0x0) [ 2606.275590][T11563] should_fail.cold+0xa/0x15 [ 2606.280202][T11563] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2606.286116][T11563] ? ___might_sleep+0x163/0x280 [ 2606.290984][T11563] __should_failslab+0x121/0x190 [ 2606.295940][T11563] should_failslab+0x9/0x14 [ 2606.300460][T11563] kmem_cache_alloc_trace+0x2d1/0x760 [ 2606.305840][T11563] alloc_fs_context+0x5a/0x640 [ 2606.310832][T11563] fs_context_for_mount+0x25/0x30 [ 2606.315879][T11563] do_mount+0x13d7/0x2c40 [ 2606.320206][T11563] ? copy_mount_string+0x40/0x40 [ 2606.325135][T11563] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2606.331359][T11563] ? copy_mount_options+0x280/0x3a0 [ 2606.336541][T11563] ksys_mount+0xdb/0x150 [ 2606.341053][T11563] __x64_sys_mount+0xbe/0x150 [ 2606.345721][T11563] do_syscall_64+0x103/0x610 [ 2606.350297][T11563] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2606.356172][T11563] RIP: 0033:0x458c29 15:15:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x3, 0x10001, 0xfffffffffffff000}) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x5c000) setsockopt$inet6_buf(r1, 0x29, 0x2f, &(0x7f00000002c0)="7412cedc9771ee97d439e10be5a992099e109dba5e8502f1d9f4ab9c8ad934564bfc5c31211a0eb0e965b18a3210c2d515d85d89e4b1e25f710c17330cb9e14bc57c7ed18b68184abd623e38642f1d0dec2e645a4d75d855ee0c22eb5d45f946aeb6dd6b21da51a6c5d62c9fecdbe7b6ec2f535509a682ebaf721284efeddc6b48fa579f404db82a9f7659cafff184534434a533282821b92f908a54e0eb37d8ef9b5dc169699315d4073d34c26b184b5a6dbd8dcf051ee6e6dd9bb90000000000", 0xc1) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2606.360072][T11563] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2606.379850][T11563] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2606.388256][T11563] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2606.396210][T11563] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2606.404164][T11563] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2606.412129][T11563] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2606.420094][T11563] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 [ 2606.486663][T11620] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:13 executing program 4 (fault-call:4 fault-nth:7): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:13 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0xe803000000000000}], 0x22b, 0x0) 15:15:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003000061150000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) [ 2606.723165][T11755] FAULT_INJECTION: forcing a failure. [ 2606.723165][T11755] name failslab, interval 1, probability 0, space 0, times 0 [ 2606.745437][T11755] CPU: 1 PID: 11755 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2606.753383][T11755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2606.763467][T11755] Call Trace: [ 2606.766782][T11755] dump_stack+0x172/0x1f0 [ 2606.771132][T11755] should_fail.cold+0xa/0x15 [ 2606.775750][T11755] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2606.781566][T11755] ? ___might_sleep+0x163/0x280 [ 2606.786421][T11755] __should_failslab+0x121/0x190 [ 2606.791354][T11755] should_failslab+0x9/0x14 [ 2606.795854][T11755] __kmalloc_track_caller+0x2d8/0x740 [ 2606.801278][T11755] ? vfs_parse_fs_string+0xe8/0x170 [ 2606.806499][T11755] kmemdup_nul+0x31/0xa0 [ 2606.810746][T11755] vfs_parse_fs_string+0xe8/0x170 [ 2606.815758][T11755] ? vfs_parse_fs_param+0x510/0x510 [ 2606.820942][T11755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2606.827179][T11755] ? alloc_fs_context+0x3bb/0x640 [ 2606.832624][T11755] do_mount+0x6e9/0x2c40 [ 2606.836914][T11755] ? copy_mount_string+0x40/0x40 [ 2606.841848][T11755] ? _copy_from_user+0xdd/0x150 [ 2606.846701][T11755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2606.852947][T11755] ? copy_mount_options+0x280/0x3a0 [ 2606.858136][T11755] ksys_mount+0xdb/0x150 [ 2606.862503][T11755] __x64_sys_mount+0xbe/0x150 [ 2606.867193][T11755] do_syscall_64+0x103/0x610 [ 2606.871787][T11755] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2606.877757][T11755] RIP: 0033:0x458c29 [ 2606.881653][T11755] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2606.902475][T11755] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2606.910898][T11755] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 15:15:14 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0xeffdffff00000000}], 0x22b, 0x0) 15:15:14 executing program 4 (fault-call:4 fault-nth:8): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2606.918865][T11755] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2606.926831][T11755] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2606.935764][T11755] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2606.944013][T11755] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@noblock_validity='noblock_validity'}]}) 15:15:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x3, 0x10001, 0xfffffffffffff000}) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x5c000) setsockopt$inet6_buf(r1, 0x29, 0x2f, &(0x7f00000002c0)="7412cedc9771ee97d439e10be5a992099e109dba5e8502f1d9f4ab9c8ad934564bfc5c31211a0eb0e965b18a3210c2d515d85d89e4b1e25f710c17330cb9e14bc57c7ed18b68184abd623e38642f1d0dec2e645a4d75d855ee0c22eb5d45f946aeb6dd6b21da51a6c5d62c9fecdbe7b6ec2f535509a682ebaf721284efeddc6b48fa579f404db82a9f7659cafff184534434a533282821b92f908a54e0eb37d8ef9b5dc169699315d4073d34c26b184b5a6dbd8dcf051ee6e6dd9bb90000000000", 0xc1) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2607.092535][T11857] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2607.154277][T11869] FAULT_INJECTION: forcing a failure. [ 2607.154277][T11869] name failslab, interval 1, probability 0, space 0, times 0 15:15:14 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0xf401000000000000}], 0x22b, 0x0) [ 2607.206222][T11869] CPU: 1 PID: 11869 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2607.214162][T11869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2607.214169][T11869] Call Trace: [ 2607.214195][T11869] dump_stack+0x172/0x1f0 [ 2607.214214][T11869] should_fail.cold+0xa/0x15 [ 2607.214235][T11869] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2607.227773][T11869] ? ___might_sleep+0x163/0x280 [ 2607.242545][T11869] __should_failslab+0x121/0x190 [ 2607.242563][T11869] should_failslab+0x9/0x14 [ 2607.242580][T11869] __kmalloc_track_caller+0x2d8/0x740 [ 2607.242598][T11869] ? vfs_parse_fs_string+0xe8/0x170 [ 2607.242615][T11869] kmemdup_nul+0x31/0xa0 [ 2607.242628][T11869] vfs_parse_fs_string+0xe8/0x170 [ 2607.242640][T11869] ? vfs_parse_fs_param+0x510/0x510 [ 2607.242659][T11869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2607.242670][T11869] ? alloc_fs_context+0x3bb/0x640 [ 2607.242687][T11869] do_mount+0x6e9/0x2c40 [ 2607.242716][T11869] ? copy_mount_string+0x40/0x40 [ 2607.252494][T11869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2607.252510][T11869] ? copy_mount_options+0x280/0x3a0 [ 2607.252528][T11869] ksys_mount+0xdb/0x150 [ 2607.252545][T11869] __x64_sys_mount+0xbe/0x150 [ 2607.252562][T11869] do_syscall_64+0x103/0x610 [ 2607.252579][T11869] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2607.252591][T11869] RIP: 0033:0x458c29 [ 2607.252604][T11869] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:15:14 executing program 4 (fault-call:4 fault-nth:9): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2607.252610][T11869] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2607.365482][T11869] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2607.373468][T11869] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2607.381534][T11869] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2607.389506][T11869] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2607.397498][T11869] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noblock_validity='noblock_validity'}]}) [ 2607.499113][T11857] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x3, 0x10001, 0xfffffffffffff000}) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x5c000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:14 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0xffffff7f00000000}], 0x22b, 0x0) [ 2607.579312][T11974] FAULT_INJECTION: forcing a failure. [ 2607.579312][T11974] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2607.592567][T11974] CPU: 0 PID: 11974 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2607.600462][T11974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2607.610526][T11974] Call Trace: [ 2607.613836][T11974] dump_stack+0x172/0x1f0 [ 2607.618174][T11974] should_fail.cold+0xa/0x15 [ 2607.622797][T11974] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2607.628624][T11974] ? __lock_acquire+0x548/0x3fb0 [ 2607.633576][T11974] should_fail_alloc_page+0x50/0x60 [ 2607.638774][T11974] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2607.644160][T11974] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2607.649864][T11974] ? find_held_lock+0x35/0x130 [ 2607.654636][T11974] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2607.660449][T11974] cache_grow_begin+0x9c/0x860 [ 2607.665207][T11974] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2607.671436][T11974] kmem_cache_alloc_trace+0x67f/0x760 [ 2607.676791][T11974] ? kasan_check_write+0x14/0x20 [ 2607.681722][T11974] alloc_super+0x55/0x890 [ 2607.686034][T11974] ? kasan_check_read+0x11/0x20 [ 2607.690866][T11974] sget_userns+0xf1/0x560 [ 2607.695183][T11974] ? get_anon_bdev+0xc0/0xc0 [ 2607.699861][T11974] ? get_anon_bdev+0xc0/0xc0 [ 2607.704536][T11974] sget+0x10c/0x150 [ 2607.708326][T11974] ? ovl_show_options+0x550/0x550 [ 2607.713334][T11974] mount_nodev+0x31/0x110 [ 2607.717904][T11974] ovl_mount+0x2d/0x40 [ 2607.721960][T11974] ? ovl_own_xattr_set+0x10/0x10 [ 2607.726880][T11974] legacy_get_tree+0xf2/0x200 [ 2607.731540][T11974] vfs_get_tree+0x123/0x450 [ 2607.736029][T11974] do_mount+0x1436/0x2c40 [ 2607.740448][T11974] ? copy_mount_string+0x40/0x40 [ 2607.745396][T11974] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2607.751626][T11974] ? copy_mount_options+0x280/0x3a0 [ 2607.756827][T11974] ksys_mount+0xdb/0x150 [ 2607.761053][T11974] __x64_sys_mount+0xbe/0x150 [ 2607.765714][T11974] do_syscall_64+0x103/0x610 [ 2607.770288][T11974] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2607.776162][T11974] RIP: 0033:0x458c29 [ 2607.780237][T11974] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2607.799999][T11974] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2607.808403][T11974] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2607.816367][T11974] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2607.824330][T11974] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2607.832282][T11974] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2607.840233][T11974] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:14 executing program 4 (fault-call:4 fault-nth:10): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d1900030000001f0000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) [ 2607.962746][T12004] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000003, [ 2608.063104][T12109] FAULT_INJECTION: forcing a failure. [ 2608.063104][T12109] name failslab, interval 1, probability 0, space 0, times 0 [ 2608.088032][T12109] CPU: 1 PID: 12109 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2608.095998][T12109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2608.106141][T12109] Call Trace: 15:15:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:15 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2608.106171][T12109] dump_stack+0x172/0x1f0 [ 2608.106193][T12109] should_fail.cold+0xa/0x15 [ 2608.106211][T12109] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2608.106230][T12109] ? ___might_sleep+0x163/0x280 [ 2608.106246][T12109] __should_failslab+0x121/0x190 [ 2608.106259][T12109] should_failslab+0x9/0x14 [ 2608.106272][T12109] __kmalloc+0x2dc/0x740 [ 2608.106290][T12109] ? lockdep_init_map+0x1be/0x6d0 [ 2608.106303][T12109] ? prealloc_shrinker+0xa6/0x350 [ 2608.106319][T12109] prealloc_shrinker+0xa6/0x350 [ 2608.106334][T12109] alloc_super+0x710/0x890 [ 2608.106351][T12109] sget_userns+0xf1/0x560 [ 2608.106369][T12109] ? get_anon_bdev+0xc0/0xc0 [ 2608.129195][T12109] ? get_anon_bdev+0xc0/0xc0 [ 2608.129210][T12109] sget+0x10c/0x150 [ 2608.129228][T12109] ? ovl_show_options+0x550/0x550 [ 2608.129242][T12109] mount_nodev+0x31/0x110 [ 2608.129261][T12109] ovl_mount+0x2d/0x40 [ 2608.193112][T12109] ? ovl_own_xattr_set+0x10/0x10 [ 2608.198073][T12109] legacy_get_tree+0xf2/0x200 [ 2608.202758][T12109] vfs_get_tree+0x123/0x450 [ 2608.207251][T12109] do_mount+0x1436/0x2c40 [ 2608.211560][T12109] ? copy_mount_string+0x40/0x40 [ 2608.216479][T12109] ? _copy_from_user+0xdd/0x150 [ 2608.221311][T12109] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2608.227530][T12109] ? copy_mount_options+0x280/0x3a0 [ 2608.232820][T12109] ksys_mount+0xdb/0x150 [ 2608.237327][T12109] __x64_sys_mount+0xbe/0x150 [ 2608.242004][T12109] do_syscall_64+0x103/0x610 [ 2608.246598][T12109] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2608.252485][T12109] RIP: 0033:0x458c29 [ 2608.256378][T12109] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2608.275988][T12109] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2608.284418][T12109] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2608.292405][T12109] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2608.300408][T12109] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 15:15:15 executing program 4 (fault-call:4 fault-nth:11): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2608.308382][T12109] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2608.316346][T12109] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 [ 2608.365278][T12127] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x3, 0x10001, 0xfffffffffffff000}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noblock_validity='noblock_validity'}]}) [ 2608.472211][T12139] FAULT_INJECTION: forcing a failure. [ 2608.472211][T12139] name failslab, interval 1, probability 0, space 0, times 0 [ 2608.485988][T12139] CPU: 0 PID: 12139 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2608.494569][T12139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2608.504665][T12139] Call Trace: [ 2608.507979][T12139] dump_stack+0x172/0x1f0 [ 2608.512334][T12139] should_fail.cold+0xa/0x15 [ 2608.516943][T12139] ? fault_create_debugfs_attr+0x1e0/0x1e0 15:15:15 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2608.522916][T12139] ? ___might_sleep+0x163/0x280 [ 2608.527772][T12139] __should_failslab+0x121/0x190 [ 2608.532723][T12139] should_failslab+0x9/0x14 [ 2608.532836][T12139] __kmalloc+0x2dc/0x740 [ 2608.532857][T12139] ? __list_lru_init+0xd1/0x6e0 [ 2608.546526][T12139] __list_lru_init+0xd1/0x6e0 [ 2608.551488][T12139] alloc_super+0x762/0x890 [ 2608.555922][T12139] sget_userns+0xf1/0x560 [ 2608.560240][T12139] ? get_anon_bdev+0xc0/0xc0 [ 2608.564827][T12139] ? get_anon_bdev+0xc0/0xc0 [ 2608.569418][T12139] sget+0x10c/0x150 [ 2608.573212][T12139] ? ovl_show_options+0x550/0x550 [ 2608.578227][T12139] mount_nodev+0x31/0x110 [ 2608.582550][T12139] ovl_mount+0x2d/0x40 [ 2608.586598][T12139] ? ovl_own_xattr_set+0x10/0x10 [ 2608.591618][T12139] legacy_get_tree+0xf2/0x200 [ 2608.596286][T12139] vfs_get_tree+0x123/0x450 [ 2608.600791][T12139] do_mount+0x1436/0x2c40 [ 2608.605221][T12139] ? copy_mount_string+0x40/0x40 [ 2608.610508][T12139] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2608.616843][T12139] ? copy_mount_options+0x280/0x3a0 [ 2608.622054][T12139] ksys_mount+0xdb/0x150 [ 2608.626291][T12139] __x64_sys_mount+0xbe/0x150 [ 2608.630982][T12139] do_syscall_64+0x103/0x610 [ 2608.635572][T12139] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2608.641446][T12139] RIP: 0033:0x458c29 [ 2608.645349][T12139] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2608.665251][T12139] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 15:15:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2608.673926][T12139] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2608.681888][T12139] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2608.690047][T12139] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2608.698150][T12139] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2608.706278][T12139] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 [ 2608.786767][T12127] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2608.816433][T12249] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000003, 15:15:15 executing program 4 (fault-call:4 fault-nth:12): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:15 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003000000200000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$bt_rfcomm(0x1f, 0x3, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2608.956064][T12363] FAULT_INJECTION: forcing a failure. [ 2608.956064][T12363] name failslab, interval 1, probability 0, space 0, times 0 [ 2608.980411][T12363] CPU: 0 PID: 12363 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2608.988340][T12363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2608.998405][T12363] Call Trace: [ 2609.001711][T12363] dump_stack+0x172/0x1f0 15:15:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2609.006059][T12363] should_fail.cold+0xa/0x15 [ 2609.010673][T12363] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2609.016495][T12363] ? ___might_sleep+0x163/0x280 [ 2609.021354][T12363] __should_failslab+0x121/0x190 [ 2609.026440][T12363] should_failslab+0x9/0x14 [ 2609.030956][T12363] kmem_cache_alloc_node_trace+0x270/0x720 [ 2609.036788][T12363] __kmalloc_node+0x3d/0x70 [ 2609.041277][T12363] kvmalloc_node+0x68/0x100 [ 2609.045783][T12363] __list_lru_init+0x4a6/0x6e0 [ 2609.050551][T12363] alloc_super+0x762/0x890 [ 2609.054954][T12363] sget_userns+0xf1/0x560 [ 2609.059263][T12363] ? get_anon_bdev+0xc0/0xc0 [ 2609.063832][T12363] ? get_anon_bdev+0xc0/0xc0 [ 2609.068421][T12363] sget+0x10c/0x150 [ 2609.072218][T12363] ? ovl_show_options+0x550/0x550 [ 2609.077220][T12363] mount_nodev+0x31/0x110 [ 2609.081551][T12363] ovl_mount+0x2d/0x40 [ 2609.085687][T12363] ? ovl_own_xattr_set+0x10/0x10 [ 2609.090621][T12363] legacy_get_tree+0xf2/0x200 [ 2609.095284][T12363] vfs_get_tree+0x123/0x450 [ 2609.100495][T12363] do_mount+0x1436/0x2c40 [ 2609.104808][T12363] ? copy_mount_string+0x40/0x40 [ 2609.109747][T12363] ? _copy_from_user+0xdd/0x150 [ 2609.114599][T12363] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2609.120818][T12363] ? copy_mount_options+0x280/0x3a0 [ 2609.126002][T12363] ksys_mount+0xdb/0x150 [ 2609.130248][T12363] __x64_sys_mount+0xbe/0x150 [ 2609.134923][T12363] do_syscall_64+0x103/0x610 [ 2609.139507][T12363] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2609.145377][T12363] RIP: 0033:0x458c29 [ 2609.149273][T12363] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2609.168868][T12363] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2609.177463][T12363] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2609.185445][T12363] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2609.193401][T12363] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 15:15:16 executing program 4 (fault-call:4 fault-nth:13): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2609.201457][T12363] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2609.209424][T12363] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noblock_validity='noblock_validity'}]}) 15:15:16 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2609.343159][T12477] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2609.365428][T12479] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000003, [ 2609.420713][T12503] FAULT_INJECTION: forcing a failure. [ 2609.420713][T12503] name failslab, interval 1, probability 0, space 0, times 0 [ 2609.436263][T12503] CPU: 1 PID: 12503 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2609.444315][T12503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2609.454395][T12503] Call Trace: [ 2609.457700][T12503] dump_stack+0x172/0x1f0 [ 2609.462161][T12503] should_fail.cold+0xa/0x15 [ 2609.466839][T12503] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2609.472642][T12503] ? ___might_sleep+0x163/0x280 [ 2609.477486][T12503] __should_failslab+0x121/0x190 [ 2609.482417][T12503] should_failslab+0x9/0x14 [ 2609.486910][T12503] kmem_cache_alloc_trace+0x2d1/0x760 [ 2609.492275][T12503] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2609.498094][T12503] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2609.503710][T12503] __list_lru_init+0x3cf/0x6e0 [ 2609.508459][T12503] alloc_super+0x762/0x890 [ 2609.512869][T12503] sget_userns+0xf1/0x560 [ 2609.517189][T12503] ? get_anon_bdev+0xc0/0xc0 [ 2609.521756][T12503] ? get_anon_bdev+0xc0/0xc0 [ 2609.526328][T12503] sget+0x10c/0x150 [ 2609.530117][T12503] ? ovl_show_options+0x550/0x550 [ 2609.535133][T12503] mount_nodev+0x31/0x110 [ 2609.539476][T12503] ovl_mount+0x2d/0x40 [ 2609.543533][T12503] ? ovl_own_xattr_set+0x10/0x10 [ 2609.548474][T12503] legacy_get_tree+0xf2/0x200 [ 2609.553149][T12503] vfs_get_tree+0x123/0x450 [ 2609.557647][T12503] do_mount+0x1436/0x2c40 [ 2609.562053][T12503] ? copy_mount_string+0x40/0x40 [ 2609.566981][T12503] ? _copy_from_user+0xdd/0x150 [ 2609.571834][T12503] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2609.578091][T12503] ? copy_mount_options+0x280/0x3a0 [ 2609.583304][T12503] ksys_mount+0xdb/0x150 [ 2609.587542][T12503] __x64_sys_mount+0xbe/0x150 [ 2609.592223][T12503] do_syscall_64+0x103/0x610 [ 2609.596834][T12503] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2609.602720][T12503] RIP: 0033:0x458c29 [ 2609.606605][T12503] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2609.626208][T12503] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2609.634632][T12503] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2609.642606][T12503] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2609.650745][T12503] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2609.658803][T12503] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 15:15:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2609.666874][T12503] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:16 executing program 4 (fault-call:4 fault-nth:14): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2609.764905][T12477] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:16 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003000010200000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) [ 2609.845554][T12602] FAULT_INJECTION: forcing a failure. [ 2609.845554][T12602] name failslab, interval 1, probability 0, space 0, times 0 [ 2609.858454][T12602] CPU: 0 PID: 12602 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2609.866357][T12602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2609.876418][T12602] Call Trace: [ 2609.879727][T12602] dump_stack+0x172/0x1f0 [ 2609.884075][T12602] should_fail.cold+0xa/0x15 [ 2609.888687][T12602] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2609.894715][T12602] ? ___might_sleep+0x163/0x280 [ 2609.899575][T12602] __should_failslab+0x121/0x190 [ 2609.904506][T12602] should_failslab+0x9/0x14 [ 2609.909023][T12602] kmem_cache_alloc_trace+0x2d1/0x760 [ 2609.914383][T12602] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2609.920173][T12602] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2609.925874][T12602] __list_lru_init+0x3cf/0x6e0 [ 2609.930630][T12602] alloc_super+0x762/0x890 [ 2609.935030][T12602] sget_userns+0xf1/0x560 [ 2609.939598][T12602] ? get_anon_bdev+0xc0/0xc0 [ 2609.944256][T12602] ? get_anon_bdev+0xc0/0xc0 [ 2609.948832][T12602] sget+0x10c/0x150 [ 2609.952627][T12602] ? ovl_show_options+0x550/0x550 [ 2609.957647][T12602] mount_nodev+0x31/0x110 [ 2609.961983][T12602] ovl_mount+0x2d/0x40 [ 2609.966040][T12602] ? ovl_own_xattr_set+0x10/0x10 [ 2609.971859][T12602] legacy_get_tree+0xf2/0x200 [ 2609.977038][T12602] vfs_get_tree+0x123/0x450 [ 2609.981534][T12602] do_mount+0x1436/0x2c40 [ 2609.985861][T12602] ? copy_mount_string+0x40/0x40 [ 2609.990804][T12602] ? _copy_from_user+0xdd/0x150 [ 2609.995660][T12602] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2610.001884][T12602] ? copy_mount_options+0x280/0x3a0 [ 2610.007203][T12602] ksys_mount+0xdb/0x150 [ 2610.011441][T12602] __x64_sys_mount+0xbe/0x150 [ 2610.018995][T12602] do_syscall_64+0x103/0x610 [ 2610.023752][T12602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2610.029655][T12602] RIP: 0033:0x458c29 [ 2610.033551][T12602] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2610.053794][T12602] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2610.062573][T12602] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2610.071122][T12602] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2610.080033][T12602] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2610.088124][T12602] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 15:15:17 executing program 4 (fault-call:4 fault-nth:15): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2610.096196][T12602] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2610.215362][T12695] FAULT_INJECTION: forcing a failure. [ 2610.215362][T12695] name failslab, interval 1, probability 0, space 0, times 0 15:15:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2610.255536][T12707] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2610.283520][T12698] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000003, 15:15:17 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2610.307861][T12695] CPU: 0 PID: 12695 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2610.315815][T12695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2610.325884][T12695] Call Trace: [ 2610.329189][T12695] dump_stack+0x172/0x1f0 [ 2610.333527][T12695] should_fail.cold+0xa/0x15 [ 2610.338131][T12695] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2610.343958][T12695] ? ___might_sleep+0x163/0x280 [ 2610.348808][T12695] __should_failslab+0x121/0x190 [ 2610.353752][T12695] should_failslab+0x9/0x14 [ 2610.358277][T12695] kmem_cache_alloc_trace+0x2d1/0x760 [ 2610.363653][T12695] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2610.369540][T12695] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2610.375161][T12695] __list_lru_init+0x3cf/0x6e0 [ 2610.379909][T12695] alloc_super+0x762/0x890 [ 2610.384312][T12695] sget_userns+0xf1/0x560 [ 2610.388630][T12695] ? get_anon_bdev+0xc0/0xc0 [ 2610.393224][T12695] ? get_anon_bdev+0xc0/0xc0 [ 2610.397803][T12695] sget+0x10c/0x150 [ 2610.401593][T12695] ? ovl_show_options+0x550/0x550 [ 2610.406615][T12695] mount_nodev+0x31/0x110 [ 2610.410929][T12695] ovl_mount+0x2d/0x40 [ 2610.414982][T12695] ? ovl_own_xattr_set+0x10/0x10 [ 2610.419928][T12695] legacy_get_tree+0xf2/0x200 [ 2610.424589][T12695] vfs_get_tree+0x123/0x450 [ 2610.429076][T12695] do_mount+0x1436/0x2c40 [ 2610.433412][T12695] ? copy_mount_string+0x40/0x40 [ 2610.438632][T12695] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2610.444874][T12695] ? copy_mount_options+0x280/0x3a0 [ 2610.450073][T12695] ksys_mount+0xdb/0x150 [ 2610.454312][T12695] __x64_sys_mount+0xbe/0x150 [ 2610.458974][T12695] do_syscall_64+0x103/0x610 [ 2610.463554][T12695] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2610.469424][T12695] RIP: 0033:0x458c29 [ 2610.473317][T12695] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2610.493121][T12695] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2610.501530][T12695] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2610.509500][T12695] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2610.517456][T12695] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2610.525424][T12695] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2610.533393][T12695] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:17 executing program 4 (fault-call:4 fault-nth:16): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2610.573190][T12729] EXT4-fs (sda1): re-mounted. Opts: 15:15:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2610.701243][T12707] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:17 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2610.738619][T12854] FAULT_INJECTION: forcing a failure. [ 2610.738619][T12854] name failslab, interval 1, probability 0, space 0, times 0 15:15:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003000000230000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:17 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x3, 0x10001, 0xfffffffffffff000}) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x5c000) setsockopt$inet6_buf(r1, 0x29, 0x2f, &(0x7f00000002c0)="7412cedc9771ee97d439e10be5a992099e109dba5e8502f1d9f4ab9c8ad934564bfc5c31211a0eb0e965b18a3210c2d515d85d89e4b1e25f710c17330cb9e14bc57c7ed18b68184abd623e38642f1d0dec2e645a4d75d855ee0c22eb5d45f946aeb6dd6b21da51a6c5d62c9fecdbe7b6ec2f535509a682ebaf721284efeddc6b48fa579f404db82a9f7659cafff184534434a533282821b92f908a54e0eb37d8ef9b5dc169699315d4073d34c26b184b5a6dbd8dcf051ee6e6dd9bb90000000000", 0xc1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000240)={0x1000, 0x9bd, &(0x7f00000001c0)="44c1d1caa691ed72411ef1ee87dc057ca59ff0f295fe71249ec249df391d121cf5a2be837c728fd1ab65c7eb5eeef9d78f5ca645f7422810e884a98b8a007e3766bdac0a48c88f7b07da5d", &(0x7f00000003c0)="26087dfd72510e0eba4beb52a4c7b151f24f8e5c8510c1d8c6c64544dc9a9f14609a18e7998d511ebc64565cb3be445279dcb520cb3de71a1c399fc89e79e7bcaa3a90ac136559b9a3e16caaca2269b44d7ac3fb213d6eb984bb75a7886956322039d738a10df82fe4ad330e541e5667fd66da18adf56a25148f2b58ae55a9be4f49ea9f4203fa80f5a108db1d79c72743c06a9a7aef44b4b4be63d65efb6f5a290f9ee3c29c46d4a273601ee1689cd8ae027ee52251010b437b321b7fbf253d66129ab40a5bef60a823f23f2a7466eba2bc9743646405414268d076912677aa0baaf02f84c968", 0x4b, 0xe7}) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2610.839977][T12854] CPU: 1 PID: 12854 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2610.847914][T12854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2610.858069][T12854] Call Trace: [ 2610.861381][T12854] dump_stack+0x172/0x1f0 [ 2610.865718][T12854] should_fail.cold+0xa/0x15 [ 2610.870325][T12854] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2610.876586][T12854] ? ___might_sleep+0x163/0x280 [ 2610.881437][T12854] __should_failslab+0x121/0x190 [ 2610.886358][T12854] should_failslab+0x9/0x14 [ 2610.890840][T12854] kmem_cache_alloc_trace+0x2d1/0x760 [ 2610.896203][T12854] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2610.902038][T12854] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2610.907659][T12854] __list_lru_init+0x3cf/0x6e0 [ 2610.912436][T12854] alloc_super+0x762/0x890 [ 2610.916864][T12854] sget_userns+0xf1/0x560 [ 2610.921185][T12854] ? get_anon_bdev+0xc0/0xc0 [ 2610.925757][T12854] ? get_anon_bdev+0xc0/0xc0 [ 2610.930958][T12854] sget+0x10c/0x150 [ 2610.934762][T12854] ? ovl_show_options+0x550/0x550 [ 2610.939977][T12854] mount_nodev+0x31/0x110 [ 2610.947387][T12854] ovl_mount+0x2d/0x40 [ 2610.951469][T12854] ? ovl_own_xattr_set+0x10/0x10 [ 2610.956413][T12854] legacy_get_tree+0xf2/0x200 [ 2610.961092][T12854] vfs_get_tree+0x123/0x450 [ 2610.965606][T12854] do_mount+0x1436/0x2c40 [ 2610.969938][T12854] ? copy_mount_string+0x40/0x40 [ 2610.974968][T12854] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2610.981196][T12854] ? copy_mount_options+0x280/0x3a0 [ 2610.986381][T12854] ksys_mount+0xdb/0x150 [ 2610.990607][T12854] __x64_sys_mount+0xbe/0x150 [ 2610.995290][T12854] do_syscall_64+0x103/0x610 [ 2610.999875][T12854] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2611.005833][T12854] RIP: 0033:0x458c29 [ 2611.009720][T12854] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:15:18 executing program 4 (fault-call:4 fault-nth:17): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2611.037554][T12854] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2611.046224][T12854] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2611.054905][T12854] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2611.062875][T12854] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2611.072186][T12854] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2611.080171][T12854] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 [ 2611.221287][T12906] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:18 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2611.282879][T12944] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000003, [ 2611.313412][T13017] FAULT_INJECTION: forcing a failure. [ 2611.313412][T13017] name failslab, interval 1, probability 0, space 0, times 0 [ 2611.329319][T13017] CPU: 0 PID: 13017 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2611.337354][T13017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2611.337361][T13017] Call Trace: [ 2611.337387][T13017] dump_stack+0x172/0x1f0 [ 2611.337407][T13017] should_fail.cold+0xa/0x15 [ 2611.337425][T13017] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2611.337455][T13017] ? ___might_sleep+0x163/0x280 [ 2611.337474][T13017] __should_failslab+0x121/0x190 [ 2611.337493][T13017] should_failslab+0x9/0x14 [ 2611.350916][T13017] kmem_cache_alloc_trace+0x2d1/0x760 [ 2611.350936][T13017] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2611.350959][T13017] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2611.350976][T13017] __list_lru_init+0x3cf/0x6e0 [ 2611.350994][T13017] alloc_super+0x762/0x890 [ 2611.409161][T13017] sget_userns+0xf1/0x560 [ 2611.413659][T13017] ? get_anon_bdev+0xc0/0xc0 [ 2611.418527][T13017] ? get_anon_bdev+0xc0/0xc0 [ 2611.423101][T13017] sget+0x10c/0x150 [ 2611.427065][T13017] ? ovl_show_options+0x550/0x550 [ 2611.432073][T13017] mount_nodev+0x31/0x110 [ 2611.436718][T13017] ovl_mount+0x2d/0x40 [ 2611.441119][T13017] ? ovl_own_xattr_set+0x10/0x10 [ 2611.446046][T13017] legacy_get_tree+0xf2/0x200 [ 2611.450721][T13017] vfs_get_tree+0x123/0x450 [ 2611.455288][T13017] do_mount+0x1436/0x2c40 [ 2611.459620][T13017] ? copy_mount_string+0x40/0x40 [ 2611.464698][T13017] ? _copy_from_user+0xdd/0x150 [ 2611.469545][T13017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2611.475778][T13017] ? copy_mount_options+0x280/0x3a0 [ 2611.481073][T13017] ksys_mount+0xdb/0x150 [ 2611.485339][T13017] __x64_sys_mount+0xbe/0x150 [ 2611.490091][T13017] do_syscall_64+0x103/0x610 [ 2611.494673][T13017] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2611.500571][T13017] RIP: 0033:0x458c29 [ 2611.504648][T13017] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2611.524277][T13017] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 15:15:18 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:18 executing program 4 (fault-call:4 fault-nth:18): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2611.532700][T13017] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2611.542485][T13017] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2611.550452][T13017] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2611.558445][T13017] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2611.566409][T13017] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 [ 2611.634753][T12906] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x3, 0x10001, 0xfffffffffffff000}) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x5c000) setsockopt$inet6_buf(r1, 0x29, 0x2f, &(0x7f00000002c0)="7412cedc9771ee97d439e10be5a992099e109dba5e8502f1d9f4ab9c8ad934564bfc5c31211a0eb0e965b18a3210c2d515d85d89e4b1e25f710c17330cb9e14bc57c7ed18b68184abd623e38642f1d0dec2e645a4d75d855ee0c22eb5d45f946aeb6dd6b21da51a6c5d62c9fecdbe7b6ec2f535509a682ebaf721284efeddc6b48fa579f404db82a9f7659cafff184534434a533282821b92f908a54e0eb37d8ef9b5dc169699315d4073d34c26b184b5a6dbd8dcf051ee6e6dd9bb90000000000", 0xc1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000240)={0x1000, 0x9bd, &(0x7f00000001c0)="44c1d1caa691ed72411ef1ee87dc057ca59ff0f295fe71249ec249df391d121cf5a2be837c728fd1ab65c7eb5eeef9d78f5ca645f7422810e884a98b8a007e3766bdac0a48c88f7b07da5d", &(0x7f00000003c0)="26087dfd72510e0eba4beb52a4c7b151f24f8e5c8510c1d8c6c64544dc9a9f14609a18e7998d511ebc64565cb3be445279dcb520cb3de71a1c399fc89e79e7bcaa3a90ac136559b9a3e16caaca2269b44d7ac3fb213d6eb984bb75a7886956322039d738a10df82fe4ad330e541e5667fd66da18adf56a25148f2b58ae55a9be4f49ea9f4203fa80f5a108db1d79c72743c06a9a7aef44b4b4be63d65efb6f5a290f9ee3c29c46d4a273601ee1689cd8ae027ee52251010b437b321b7fbf253d66129ab40a5bef60a823f23f2a7466eba2bc9743646405414268d076912677aa0baaf02f84c968", 0x4b, 0xe7}) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2611.680679][T13115] FAULT_INJECTION: forcing a failure. [ 2611.680679][T13115] name failslab, interval 1, probability 0, space 0, times 0 [ 2611.714947][T13115] CPU: 0 PID: 13115 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 15:15:18 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2611.722895][T13115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2611.733244][T13115] Call Trace: [ 2611.733267][T13115] dump_stack+0x172/0x1f0 [ 2611.733288][T13115] should_fail.cold+0xa/0x15 [ 2611.740978][T13115] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2611.741006][T13115] ? ___might_sleep+0x163/0x280 [ 2611.756228][T13115] __should_failslab+0x121/0x190 [ 2611.761179][T13115] should_failslab+0x9/0x14 [ 2611.765700][T13115] kmem_cache_alloc_trace+0x2d1/0x760 [ 2611.771274][T13115] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 15:15:18 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2611.777097][T13115] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2611.782757][T13115] __list_lru_init+0x3cf/0x6e0 [ 2611.787537][T13115] alloc_super+0x762/0x890 [ 2611.791972][T13115] sget_userns+0xf1/0x560 [ 2611.796460][T13115] ? get_anon_bdev+0xc0/0xc0 [ 2611.801150][T13115] ? get_anon_bdev+0xc0/0xc0 [ 2611.805830][T13115] sget+0x10c/0x150 [ 2611.809647][T13115] ? ovl_show_options+0x550/0x550 [ 2611.814692][T13115] mount_nodev+0x31/0x110 [ 2611.819036][T13115] ovl_mount+0x2d/0x40 [ 2611.823117][T13115] ? ovl_own_xattr_set+0x10/0x10 [ 2611.828056][T13115] legacy_get_tree+0xf2/0x200 [ 2611.832726][T13115] vfs_get_tree+0x123/0x450 [ 2611.837258][T13115] do_mount+0x1436/0x2c40 [ 2611.841581][T13115] ? copy_mount_string+0x40/0x40 [ 2611.846499][T13115] ? _copy_from_user+0xdd/0x150 [ 2611.851330][T13115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2611.857548][T13115] ? copy_mount_options+0x280/0x3a0 [ 2611.862750][T13115] ksys_mount+0xdb/0x150 [ 2611.866989][T13115] __x64_sys_mount+0xbe/0x150 [ 2611.871856][T13115] do_syscall_64+0x103/0x610 [ 2611.876433][T13115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2611.882410][T13115] RIP: 0033:0x458c29 [ 2611.886376][T13115] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2611.905978][T13115] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2611.914388][T13115] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2611.922351][T13115] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 15:15:19 executing program 4 (fault-call:4 fault-nth:19): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2611.930422][T13115] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2611.938396][T13115] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2611.946446][T13115] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d19000300000f230000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:19 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:19 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2612.145036][T13241] FAULT_INJECTION: forcing a failure. [ 2612.145036][T13241] name failslab, interval 1, probability 0, space 0, times 0 [ 2612.156100][T13240] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000003, [ 2612.190421][T13241] CPU: 0 PID: 13241 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2612.198445][T13241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2612.208678][T13241] Call Trace: [ 2612.211989][T13241] dump_stack+0x172/0x1f0 [ 2612.216320][T13241] should_fail.cold+0xa/0x15 [ 2612.220907][T13241] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2612.226805][T13241] ? ___might_sleep+0x163/0x280 [ 2612.231674][T13241] __should_failslab+0x121/0x190 [ 2612.236605][T13241] should_failslab+0x9/0x14 [ 2612.241377][T13241] kmem_cache_alloc_trace+0x2d1/0x760 [ 2612.246862][T13241] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2612.252713][T13241] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2612.258968][T13241] __list_lru_init+0x3cf/0x6e0 [ 2612.263733][T13241] alloc_super+0x762/0x890 [ 2612.268408][T13241] sget_userns+0xf1/0x560 [ 2612.272893][T13241] ? get_anon_bdev+0xc0/0xc0 [ 2612.277553][T13241] ? get_anon_bdev+0xc0/0xc0 [ 2612.282226][T13241] sget+0x10c/0x150 [ 2612.286020][T13241] ? ovl_show_options+0x550/0x550 [ 2612.291033][T13241] mount_nodev+0x31/0x110 [ 2612.295355][T13241] ovl_mount+0x2d/0x40 [ 2612.299410][T13241] ? ovl_own_xattr_set+0x10/0x10 [ 2612.304338][T13241] legacy_get_tree+0xf2/0x200 [ 2612.309013][T13241] vfs_get_tree+0x123/0x450 [ 2612.313500][T13241] do_mount+0x1436/0x2c40 [ 2612.317810][T13241] ? copy_mount_string+0x40/0x40 [ 2612.322833][T13241] ? _copy_from_user+0xdd/0x150 [ 2612.327678][T13241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2612.333916][T13241] ? copy_mount_options+0x280/0x3a0 [ 2612.339231][T13241] ksys_mount+0xdb/0x150 [ 2612.343459][T13241] __x64_sys_mount+0xbe/0x150 [ 2612.348500][T13241] do_syscall_64+0x103/0x610 [ 2612.353349][T13241] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2612.359239][T13241] RIP: 0033:0x458c29 [ 2612.359255][T13241] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2612.359263][T13241] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2612.359277][T13241] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 15:15:19 executing program 3: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:19 executing program 4 (fault-call:4 fault-nth:20): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2612.359285][T13241] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2612.359294][T13241] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2612.359302][T13241] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2612.359309][T13241] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 [ 2612.472991][T13247] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:19 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x3, 0x10001, 0xfffffffffffff000}) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x5c000) setsockopt$inet6_buf(r1, 0x29, 0x2f, &(0x7f00000002c0)="7412cedc9771ee97d439e10be5a992099e109dba5e8502f1d9f4ab9c8ad934564bfc5c31211a0eb0e965b18a3210c2d515d85d89e4b1e25f710c17330cb9e14bc57c7ed18b68184abd623e38642f1d0dec2e645a4d75d855ee0c22eb5d45f946aeb6dd6b21da51a6c5d62c9fecdbe7b6ec2f535509a682ebaf721284efeddc6b48fa579f404db82a9f7659cafff184534434a533282821b92f908a54e0eb37d8ef9b5dc169699315d4073d34c26b184b5a6dbd8dcf051ee6e6dd9bb90000000000", 0xc1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000240)={0x1000, 0x9bd, &(0x7f00000001c0)="44c1d1caa691ed72411ef1ee87dc057ca59ff0f295fe71249ec249df391d121cf5a2be837c728fd1ab65c7eb5eeef9d78f5ca645f7422810e884a98b8a007e3766bdac0a48c88f7b07da5d", &(0x7f00000003c0)="26087dfd72510e0eba4beb52a4c7b151f24f8e5c8510c1d8c6c64544dc9a9f14609a18e7998d511ebc64565cb3be445279dcb520cb3de71a1c399fc89e79e7bcaa3a90ac136559b9a3e16caaca2269b44d7ac3fb213d6eb984bb75a7886956322039d738a10df82fe4ad330e541e5667fd66da18adf56a25148f2b58ae55a9be4f49ea9f4203fa80f5a108db1d79c72743c06a9a7aef44b4b4be63d65efb6f5a290f9ee3c29c46d4a273601ee1689cd8ae027ee52251010b437b321b7fbf253d66129ab40a5bef60a823f23f2a7466eba2bc9743646405414268d076912677aa0baaf02f84c968", 0x4b, 0xe7}) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000140)=0x80) [ 2612.605722][T13462] FAULT_INJECTION: forcing a failure. [ 2612.605722][T13462] name failslab, interval 1, probability 0, space 0, times 0 [ 2612.628324][T13462] CPU: 1 PID: 13462 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2612.636367][T13462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2612.646426][T13462] Call Trace: [ 2612.649811][T13462] dump_stack+0x172/0x1f0 [ 2612.654165][T13462] should_fail.cold+0xa/0x15 [ 2612.658775][T13462] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2612.664609][T13462] ? ___might_sleep+0x163/0x280 [ 2612.669578][T13462] __should_failslab+0x121/0x190 [ 2612.674531][T13462] should_failslab+0x9/0x14 [ 2612.679922][T13462] kmem_cache_alloc_trace+0x2d1/0x760 [ 2612.685574][T13462] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2612.691575][T13462] __list_lru_init+0x3cf/0x6e0 [ 2612.697236][T13462] alloc_super+0x762/0x890 [ 2612.701770][T13462] sget_userns+0xf1/0x560 [ 2612.706550][T13462] ? get_anon_bdev+0xc0/0xc0 [ 2612.711155][T13462] ? get_anon_bdev+0xc0/0xc0 [ 2612.716380][T13462] sget+0x10c/0x150 [ 2612.720329][T13462] ? ovl_show_options+0x550/0x550 [ 2612.726420][T13462] mount_nodev+0x31/0x110 [ 2612.732178][T13462] ovl_mount+0x2d/0x40 [ 2612.739136][T13462] ? ovl_own_xattr_set+0x10/0x10 [ 2612.746967][T13462] legacy_get_tree+0xf2/0x200 [ 2612.751839][T13462] vfs_get_tree+0x123/0x450 15:15:19 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2612.756373][T13462] do_mount+0x1436/0x2c40 [ 2612.760714][T13462] ? copy_mount_string+0x40/0x40 [ 2612.765659][T13462] ? _copy_from_user+0xdd/0x150 [ 2612.770875][T13462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2612.777570][T13462] ? copy_mount_options+0x280/0x3a0 [ 2612.782787][T13462] ksys_mount+0xdb/0x150 [ 2612.787042][T13462] __x64_sys_mount+0xbe/0x150 [ 2612.792517][T13462] do_syscall_64+0x103/0x610 [ 2612.797238][T13462] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2612.803137][T13462] RIP: 0033:0x458c29 [ 2612.803152][T13462] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2612.803159][T13462] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2612.803171][T13462] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2612.803179][T13462] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 15:15:19 executing program 4 (fault-call:4 fault-nth:21): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2612.803187][T13462] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2612.803195][T13462] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2612.803202][T13462] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:20 executing program 3: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d1900030000002d0000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) [ 2612.988065][T13555] FAULT_INJECTION: forcing a failure. [ 2612.988065][T13555] name failslab, interval 1, probability 0, space 0, times 0 15:15:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x3, 0x10001, 0xfffffffffffff000}) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x5c000) setsockopt$inet6_buf(r1, 0x29, 0x2f, &(0x7f00000002c0)="7412cedc9771ee97d439e10be5a992099e109dba5e8502f1d9f4ab9c8ad934564bfc5c31211a0eb0e965b18a3210c2d515d85d89e4b1e25f710c17330cb9e14bc57c7ed18b68184abd623e38642f1d0dec2e645a4d75d855ee0c22eb5d45f946aeb6dd6b21da51a6c5d62c9fecdbe7b6ec2f535509a682ebaf721284efeddc6b48fa579f404db82a9f7659cafff184534434a533282821b92f908a54e0eb37d8ef9b5dc169699315d4073d34c26b184b5a6dbd8dcf051ee6e6dd9bb90000000000", 0xc1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:20 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2613.042086][T13700] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2613.114657][T13555] CPU: 0 PID: 13555 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2613.122680][T13555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2613.133819][T13555] Call Trace: [ 2613.137135][T13555] dump_stack+0x172/0x1f0 [ 2613.141494][T13555] should_fail.cold+0xa/0x15 [ 2613.146713][T13555] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2613.152548][T13555] ? ___might_sleep+0x163/0x280 [ 2613.157532][T13555] __should_failslab+0x121/0x190 15:15:20 executing program 3: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:20 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2613.162494][T13555] should_failslab+0x9/0x14 [ 2613.167009][T13555] kmem_cache_alloc_trace+0x2d1/0x760 [ 2613.172488][T13555] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2613.178570][T13555] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2613.184420][T13555] __list_lru_init+0x3cf/0x6e0 [ 2613.189292][T13555] alloc_super+0x762/0x890 [ 2613.193735][T13555] sget_userns+0xf1/0x560 [ 2613.198085][T13555] ? get_anon_bdev+0xc0/0xc0 [ 2613.202778][T13555] ? get_anon_bdev+0xc0/0xc0 [ 2613.207465][T13555] sget+0x10c/0x150 [ 2613.211364][T13555] ? ovl_show_options+0x550/0x550 [ 2613.216374][T13555] mount_nodev+0x31/0x110 [ 2613.220778][T13555] ovl_mount+0x2d/0x40 [ 2613.224829][T13555] ? ovl_own_xattr_set+0x10/0x10 [ 2613.229753][T13555] legacy_get_tree+0xf2/0x200 [ 2613.234603][T13555] vfs_get_tree+0x123/0x450 [ 2613.239362][T13555] do_mount+0x1436/0x2c40 [ 2613.243725][T13555] ? copy_mount_string+0x40/0x40 [ 2613.248935][T13555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2613.255275][T13555] ? copy_mount_options+0x280/0x3a0 [ 2613.260604][T13555] ksys_mount+0xdb/0x150 [ 2613.264854][T13555] __x64_sys_mount+0xbe/0x150 [ 2613.269538][T13555] do_syscall_64+0x103/0x610 [ 2613.275185][T13555] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2613.281163][T13555] RIP: 0033:0x458c29 [ 2613.285046][T13555] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2613.305414][T13555] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 15:15:20 executing program 4 (fault-call:4 fault-nth:22): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2613.313911][T13555] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2613.321884][T13555] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2613.329854][T13555] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2613.337937][T13555] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2613.346076][T13555] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 [ 2613.395956][T13711] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000003, [ 2613.418337][T13700] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x3, 0x10001, 0xfffffffffffff000}) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x5c000) setsockopt$inet6_buf(r1, 0x29, 0x2f, &(0x7f00000002c0)="7412cedc9771ee97d439e10be5a992099e109dba5e8502f1d9f4ab9c8ad934564bfc5c31211a0eb0e965b18a3210c2d515d85d89e4b1e25f710c17330cb9e14bc57c7ed18b68184abd623e38642f1d0dec2e645a4d75d855ee0c22eb5d45f946aeb6dd6b21da51a6c5d62c9fecdbe7b6ec2f535509a682ebaf721284efeddc6b48fa579f404db82a9f7659cafff184534434a533282821b92f908a54e0eb37d8ef9b5dc169699315d4073d34c26b184b5a6dbd8dcf051ee6e6dd9bb90000000000", 0xc1) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2613.507316][T13743] FAULT_INJECTION: forcing a failure. [ 2613.507316][T13743] name failslab, interval 1, probability 0, space 0, times 0 [ 2613.569917][T13743] CPU: 0 PID: 13743 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2613.578810][T13743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2613.578817][T13743] Call Trace: [ 2613.578844][T13743] dump_stack+0x172/0x1f0 [ 2613.578865][T13743] should_fail.cold+0xa/0x15 [ 2613.578886][T13743] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2613.601660][T13743] ? ___might_sleep+0x163/0x280 [ 2613.601681][T13743] __should_failslab+0x121/0x190 15:15:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2613.601696][T13743] should_failslab+0x9/0x14 [ 2613.601710][T13743] kmem_cache_alloc_trace+0x2d1/0x760 [ 2613.601731][T13743] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2613.635226][T13743] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2613.640883][T13743] __list_lru_init+0x3cf/0x6e0 [ 2613.645752][T13743] alloc_super+0x762/0x890 [ 2613.650893][T13743] sget_userns+0xf1/0x560 [ 2613.655231][T13743] ? get_anon_bdev+0xc0/0xc0 [ 2613.659840][T13743] ? get_anon_bdev+0xc0/0xc0 [ 2613.664451][T13743] sget+0x10c/0x150 [ 2613.668531][T13743] ? ovl_show_options+0x550/0x550 [ 2613.668545][T13743] mount_nodev+0x31/0x110 [ 2613.668564][T13743] ovl_mount+0x2d/0x40 [ 2613.677885][T13743] ? ovl_own_xattr_set+0x10/0x10 [ 2613.677902][T13743] legacy_get_tree+0xf2/0x200 [ 2613.677919][T13743] vfs_get_tree+0x123/0x450 [ 2613.696261][T13743] do_mount+0x1436/0x2c40 [ 2613.700703][T13743] ? copy_mount_string+0x40/0x40 [ 2613.705833][T13743] ? copy_mount_options+0x1f8/0x3a0 [ 2613.711156][T13743] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2613.717465][T13743] ? copy_mount_options+0x280/0x3a0 [ 2613.723611][T13743] ksys_mount+0xdb/0x150 [ 2613.727926][T13743] __x64_sys_mount+0xbe/0x150 [ 2613.734942][T13743] do_syscall_64+0x103/0x610 [ 2613.745949][T13743] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2613.751829][T13743] RIP: 0033:0x458c29 [ 2613.756454][T13743] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2613.777617][T13743] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2613.786012][T13743] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2613.794487][T13743] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2613.803416][T13743] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2613.811558][T13743] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 15:15:20 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x800000000000000, 0x420802) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000100)=[r2, r2, r1, r2, r0], 0x5) ioctl$BLKBSZGET(r2, 0x80081270, &(0x7f00000000c0)) 15:15:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d1900030000003f0000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) [ 2613.820141][T13743] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:20 executing program 4 (fault-call:4 fault-nth:23): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:21 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x11, r0, 0x0) getsockname(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0xfd35) r2 = getpid() capget(&(0x7f0000000100)={0x200f1526, r2}, &(0x7f0000000140)={0x4, 0x1, 0x3, 0x5, 0x9, 0x7}) 15:15:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x3, 0x10001, 0xfffffffffffff000}) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x5c000) setsockopt$inet6_buf(r1, 0x29, 0x2f, &(0x7f00000002c0)="7412cedc9771ee97d439e10be5a992099e109dba5e8502f1d9f4ab9c8ad934564bfc5c31211a0eb0e965b18a3210c2d515d85d89e4b1e25f710c17330cb9e14bc57c7ed18b68184abd623e38642f1d0dec2e645a4d75d855ee0c22eb5d45f946aeb6dd6b21da51a6c5d62c9fecdbe7b6ec2f535509a682ebaf721284efeddc6b48fa579f404db82a9f7659cafff184534434a533282821b92f908a54e0eb37d8ef9b5dc169699315d4073d34c26b184b5a6dbd8dcf051ee6e6dd9bb90000000000", 0xc1) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2614.140114][T13953] FAULT_INJECTION: forcing a failure. [ 2614.140114][T13953] name failslab, interval 1, probability 0, space 0, times 0 [ 2614.175465][T13959] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2614.200027][T13953] CPU: 1 PID: 13953 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2614.208222][T13953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2614.218300][T13953] Call Trace: [ 2614.221784][T13953] dump_stack+0x172/0x1f0 [ 2614.226493][T13953] should_fail.cold+0xa/0x15 [ 2614.231203][T13953] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2614.239046][T13953] ? ___might_sleep+0x163/0x280 [ 2614.244355][T13953] __should_failslab+0x121/0x190 15:15:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:21 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x8000, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000140)='security\x00', 0x9, 0x1) r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2614.249650][T13953] should_failslab+0x9/0x14 [ 2614.255046][T13953] kmem_cache_alloc_trace+0x2d1/0x760 [ 2614.260683][T13953] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2614.266437][T13953] __list_lru_init+0x3cf/0x6e0 [ 2614.273992][T13953] alloc_super+0x762/0x890 [ 2614.278429][T13953] sget_userns+0xf1/0x560 [ 2614.282842][T13953] ? get_anon_bdev+0xc0/0xc0 [ 2614.289551][T13953] ? get_anon_bdev+0xc0/0xc0 [ 2614.294235][T13953] sget+0x10c/0x150 [ 2614.298072][T13953] ? ovl_show_options+0x550/0x550 [ 2614.303110][T13953] mount_nodev+0x31/0x110 [ 2614.307616][T13953] ovl_mount+0x2d/0x40 [ 2614.311944][T13953] ? ovl_own_xattr_set+0x10/0x10 [ 2614.317314][T13953] legacy_get_tree+0xf2/0x200 [ 2614.322815][T13953] vfs_get_tree+0x123/0x450 [ 2614.327752][T13953] do_mount+0x1436/0x2c40 [ 2614.332155][T13953] ? copy_mount_string+0x40/0x40 [ 2614.337101][T13953] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2614.343350][T13953] ? copy_mount_options+0x280/0x3a0 [ 2614.348544][T13953] ksys_mount+0xdb/0x150 [ 2614.352965][T13953] __x64_sys_mount+0xbe/0x150 [ 2614.357649][T13953] do_syscall_64+0x103/0x610 [ 2614.362229][T13953] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2614.368120][T13953] RIP: 0033:0x458c29 [ 2614.372366][T13953] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:15:21 executing program 4 (fault-call:4 fault-nth:24): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2614.392531][T13953] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2614.403239][T13953] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2614.411291][T13953] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2614.419450][T13953] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2614.427765][T13953] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2614.437331][T13953] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 [ 2614.501894][T14072] FAULT_INJECTION: forcing a failure. [ 2614.501894][T14072] name failslab, interval 1, probability 0, space 0, times 0 [ 2614.534733][T13959] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2614.546988][T14072] CPU: 1 PID: 14072 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2614.554920][T14072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2614.565259][T14072] Call Trace: [ 2614.568573][T14072] dump_stack+0x172/0x1f0 [ 2614.572920][T14072] should_fail.cold+0xa/0x15 [ 2614.577650][T14072] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2614.583645][T14072] ? ___might_sleep+0x163/0x280 [ 2614.588601][T14072] __should_failslab+0x121/0x190 [ 2614.595902][T14072] should_failslab+0x9/0x14 [ 2614.600490][T14072] kmem_cache_alloc_node_trace+0x270/0x720 [ 2614.606287][T14072] ? kmem_cache_alloc_trace+0x354/0x760 [ 2614.611837][T14072] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2614.617796][T14072] __kmalloc_node+0x3d/0x70 [ 2614.626858][T14072] kvmalloc_node+0x68/0x100 [ 2614.631369][T14072] __list_lru_init+0x4a6/0x6e0 [ 2614.636335][T14072] alloc_super+0x762/0x890 [ 2614.640770][T14072] sget_userns+0xf1/0x560 [ 2614.645111][T14072] ? get_anon_bdev+0xc0/0xc0 [ 2614.649710][T14072] ? get_anon_bdev+0xc0/0xc0 [ 2614.654305][T14072] sget+0x10c/0x150 [ 2614.658821][T14072] ? ovl_show_options+0x550/0x550 [ 2614.664020][T14072] mount_nodev+0x31/0x110 [ 2614.669552][T14072] ovl_mount+0x2d/0x40 [ 2614.673606][T14072] ? ovl_own_xattr_set+0x10/0x10 [ 2614.678547][T14072] legacy_get_tree+0xf2/0x200 [ 2614.683211][T14072] vfs_get_tree+0x123/0x450 [ 2614.688260][T14072] do_mount+0x1436/0x2c40 [ 2614.694136][T14072] ? copy_mount_string+0x40/0x40 15:15:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f00000001c0)={r2, &(0x7f0000000100)=""/146}) r3 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r3, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2614.701257][T14072] ? _copy_from_user+0xdd/0x150 [ 2614.706140][T14072] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2614.712565][T14072] ? copy_mount_options+0x280/0x3a0 [ 2614.718133][T14072] ksys_mount+0xdb/0x150 [ 2614.725483][T14072] __x64_sys_mount+0xbe/0x150 [ 2614.731823][T14072] do_syscall_64+0x103/0x610 [ 2614.737862][T14072] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2614.750238][T14072] RIP: 0033:0x458c29 [ 2614.754746][T14072] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2614.780827][T14072] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2614.789401][T14072] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 15:15:21 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:21 executing program 4 (fault-call:4 fault-nth:25): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2614.798322][T14072] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2614.806277][T14072] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2614.814250][T14072] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2614.822212][T14072] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003000000400000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x3, 0x10001, 0xfffffffffffff000}) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x5c000) setsockopt$inet6_buf(r1, 0x29, 0x2f, &(0x7f00000002c0)="7412cedc9771ee97d439e10be5a992099e109dba5e8502f1d9f4ab9c8ad934564bfc5c31211a0eb0e965b18a3210c2d515d85d89e4b1e25f710c17330cb9e14bc57c7ed18b68184abd623e38642f1d0dec2e645a4d75d855ee0c22eb5d45f946aeb6dd6b21da51a6c5d62c9fecdbe7b6ec2f535509a682ebaf721284efeddc6b48fa579f404db82a9f7659cafff184534434a533282821b92f908a54e0eb37d8ef9b5dc169699315d4073d34c26b184b5a6dbd8dcf051ee6e6dd9bb90000000000", 0xc1) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2614.955885][T14194] FAULT_INJECTION: forcing a failure. [ 2614.955885][T14194] name failslab, interval 1, probability 0, space 0, times 0 [ 2614.989059][T14194] CPU: 0 PID: 14194 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 15:15:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) chroot(&(0x7f0000000080)='./file0\x00') ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x800400000008, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2614.997011][T14194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2615.007853][T14194] Call Trace: [ 2615.011159][T14194] dump_stack+0x172/0x1f0 [ 2615.015590][T14194] should_fail.cold+0xa/0x15 [ 2615.020680][T14194] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2615.026484][T14194] ? ___might_sleep+0x163/0x280 [ 2615.031569][T14194] __should_failslab+0x121/0x190 [ 2615.037263][T14194] should_failslab+0x9/0x14 [ 2615.041751][T14194] kmem_cache_alloc_node_trace+0x270/0x720 [ 2615.047546][T14194] ? kmem_cache_alloc_trace+0x354/0x760 [ 2615.053232][T14194] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2615.059089][T14194] __kmalloc_node+0x3d/0x70 [ 2615.063585][T14194] kvmalloc_node+0x68/0x100 [ 2615.068079][T14194] __list_lru_init+0x4a6/0x6e0 [ 2615.073532][T14194] alloc_super+0x762/0x890 [ 2615.077960][T14194] sget_userns+0xf1/0x560 [ 2615.082290][T14194] ? get_anon_bdev+0xc0/0xc0 [ 2615.086968][T14194] ? get_anon_bdev+0xc0/0xc0 [ 2615.094091][T14194] sget+0x10c/0x150 [ 2615.099823][T14194] ? ovl_show_options+0x550/0x550 [ 2615.104927][T14194] mount_nodev+0x31/0x110 [ 2615.109246][T14194] ovl_mount+0x2d/0x40 [ 2615.113480][T14194] ? ovl_own_xattr_set+0x10/0x10 [ 2615.118405][T14194] legacy_get_tree+0xf2/0x200 [ 2615.123538][T14194] vfs_get_tree+0x123/0x450 [ 2615.128408][T14194] do_mount+0x1436/0x2c40 [ 2615.132792][T14194] ? copy_mount_string+0x40/0x40 [ 2615.137718][T14194] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2615.143949][T14194] ? copy_mount_options+0x280/0x3a0 [ 2615.149138][T14194] ksys_mount+0xdb/0x150 [ 2615.153372][T14194] __x64_sys_mount+0xbe/0x150 [ 2615.158037][T14194] do_syscall_64+0x103/0x610 [ 2615.163334][T14194] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2615.169224][T14194] RIP: 0033:0x458c29 [ 2615.173368][T14194] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2615.193924][T14194] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 15:15:22 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2615.202333][T14194] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2615.210399][T14194] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2615.218625][T14194] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2615.226783][T14194] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2615.234741][T14194] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:22 executing program 4 (fault-call:4 fault-nth:26): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2615.359601][T14202] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x20000, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) getpeername$llc(r1, &(0x7f00000000c0), &(0x7f0000000100)=0x10) r2 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000ca0000/0x3000)=nil, 0x3000, 0x1000008, 0x1000008010, 0xffffffffffffffff, 0x0) getsockname(r2, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:22 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2615.445387][T14298] FAULT_INJECTION: forcing a failure. [ 2615.445387][T14298] name failslab, interval 1, probability 0, space 0, times 0 [ 2615.473597][T14298] CPU: 0 PID: 14298 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2615.481618][T14298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2615.492364][T14298] Call Trace: [ 2615.495674][T14298] dump_stack+0x172/0x1f0 [ 2615.501306][T14298] should_fail.cold+0xa/0x15 [ 2615.505917][T14298] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2615.511735][T14298] ? ___might_sleep+0x163/0x280 [ 2615.516580][T14298] __should_failslab+0x121/0x190 [ 2615.521501][T14298] should_failslab+0x9/0x14 [ 2615.525991][T14298] kmem_cache_alloc_trace+0x2d1/0x760 [ 2615.531351][T14298] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2615.537145][T14298] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2615.542864][T14298] __list_lru_init+0x3cf/0x6e0 [ 2615.547718][T14298] alloc_super+0x762/0x890 [ 2615.552143][T14298] sget_userns+0xf1/0x560 [ 2615.556475][T14298] ? get_anon_bdev+0xc0/0xc0 [ 2615.561063][T14298] ? get_anon_bdev+0xc0/0xc0 [ 2615.565663][T14298] sget+0x10c/0x150 [ 2615.569606][T14298] ? ovl_show_options+0x550/0x550 [ 2615.574624][T14298] mount_nodev+0x31/0x110 [ 2615.578954][T14298] ovl_mount+0x2d/0x40 [ 2615.583019][T14298] ? ovl_own_xattr_set+0x10/0x10 [ 2615.587948][T14298] legacy_get_tree+0xf2/0x200 [ 2615.592621][T14298] vfs_get_tree+0x123/0x450 [ 2615.597106][T14298] do_mount+0x1436/0x2c40 [ 2615.601450][T14298] ? copy_mount_string+0x40/0x40 [ 2615.606391][T14298] ? _copy_from_user+0xdd/0x150 [ 2615.611240][T14298] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2615.617476][T14298] ? copy_mount_options+0x280/0x3a0 [ 2615.623729][T14298] ksys_mount+0xdb/0x150 [ 2615.627963][T14298] __x64_sys_mount+0xbe/0x150 [ 2615.632627][T14298] do_syscall_64+0x103/0x610 [ 2615.637343][T14298] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2615.643217][T14298] RIP: 0033:0x458c29 [ 2615.647102][T14298] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2615.667668][T14298] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2615.676068][T14298] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2615.684031][T14298] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 15:15:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003000000480000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) [ 2615.692003][T14298] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2615.699995][T14298] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2615.708011][T14298] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x3, 0x10001, 0xfffffffffffff000}) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x5c000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:22 executing program 4 (fault-call:4 fault-nth:27): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:23 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2615.901902][T14345] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2615.948675][T14375] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000003, [ 2615.963609][T14395] FAULT_INJECTION: forcing a failure. [ 2615.963609][T14395] name failslab, interval 1, probability 0, space 0, times 0 [ 2615.987926][T14395] CPU: 1 PID: 14395 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 15:15:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) ioctl$TIOCGPTPEER(r2, 0x5441, 0x4ccc) [ 2615.997518][T14395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2616.012905][T14395] Call Trace: [ 2616.017724][T14395] dump_stack+0x172/0x1f0 [ 2616.023796][T14395] should_fail.cold+0xa/0x15 [ 2616.029709][T14395] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2616.038058][T14395] ? ___might_sleep+0x163/0x280 [ 2616.044346][T14395] __should_failslab+0x121/0x190 [ 2616.049447][T14395] should_failslab+0x9/0x14 [ 2616.054700][T14395] kmem_cache_alloc_trace+0x2d1/0x760 [ 2616.060682][T14395] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2616.069784][T14395] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2616.077777][T14395] __list_lru_init+0x3cf/0x6e0 [ 2616.084287][T14395] alloc_super+0x762/0x890 [ 2616.088703][T14395] sget_userns+0xf1/0x560 [ 2616.095170][T14395] ? get_anon_bdev+0xc0/0xc0 [ 2616.099749][T14395] ? get_anon_bdev+0xc0/0xc0 [ 2616.104321][T14395] sget+0x10c/0x150 [ 2616.108118][T14395] ? ovl_show_options+0x550/0x550 [ 2616.115949][T14395] mount_nodev+0x31/0x110 [ 2616.122267][T14395] ovl_mount+0x2d/0x40 [ 2616.126841][T14395] ? ovl_own_xattr_set+0x10/0x10 [ 2616.135089][T14395] legacy_get_tree+0xf2/0x200 [ 2616.142409][T14395] vfs_get_tree+0x123/0x450 [ 2616.147084][T14395] do_mount+0x1436/0x2c40 [ 2616.151838][T14395] ? copy_mount_string+0x40/0x40 [ 2616.156864][T14395] ? _copy_from_user+0xdd/0x150 [ 2616.162351][T14395] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2616.168588][T14395] ? copy_mount_options+0x280/0x3a0 [ 2616.173780][T14395] ksys_mount+0xdb/0x150 [ 2616.178182][T14395] __x64_sys_mount+0xbe/0x150 [ 2616.183028][T14395] do_syscall_64+0x103/0x610 [ 2616.189151][T14395] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2616.196093][T14395] RIP: 0033:0x458c29 [ 2616.199984][T14395] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2616.222353][T14395] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2616.231632][T14395] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2616.239587][T14395] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 15:15:23 executing program 4 (fault-call:4 fault-nth:28): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2616.247557][T14395] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2616.255512][T14395] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2616.263900][T14395] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d1900030000004c0000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x3, 0x10001, 0xfffffffffffff000}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2616.471175][T14460] FAULT_INJECTION: forcing a failure. [ 2616.471175][T14460] name failslab, interval 1, probability 0, space 0, times 0 [ 2616.522839][T14460] CPU: 0 PID: 14460 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2616.530868][T14460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2616.541402][T14460] Call Trace: [ 2616.544811][T14460] dump_stack+0x172/0x1f0 [ 2616.549196][T14460] should_fail.cold+0xa/0x15 [ 2616.553804][T14460] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2616.559717][T14460] ? ___might_sleep+0x163/0x280 [ 2616.564583][T14460] __should_failslab+0x121/0x190 15:15:23 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2616.569529][T14460] should_failslab+0x9/0x14 [ 2616.574043][T14460] kmem_cache_alloc_trace+0x2d1/0x760 [ 2616.579451][T14460] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2616.585455][T14460] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2616.591123][T14460] __list_lru_init+0x3cf/0x6e0 [ 2616.596090][T14460] alloc_super+0x762/0x890 [ 2616.596120][T14460] sget_userns+0xf1/0x560 [ 2616.605431][T14460] ? get_anon_bdev+0xc0/0xc0 [ 2616.605444][T14460] ? get_anon_bdev+0xc0/0xc0 [ 2616.605454][T14460] sget+0x10c/0x150 [ 2616.605470][T14460] ? ovl_show_options+0x550/0x550 [ 2616.605481][T14460] mount_nodev+0x31/0x110 [ 2616.605494][T14460] ovl_mount+0x2d/0x40 [ 2616.605508][T14460] ? ovl_own_xattr_set+0x10/0x10 [ 2616.605525][T14460] legacy_get_tree+0xf2/0x200 [ 2616.605547][T14460] vfs_get_tree+0x123/0x450 [ 2616.627352][T14487] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000003, [ 2616.629511][T14460] do_mount+0x1436/0x2c40 [ 2616.629533][T14460] ? copy_mount_string+0x40/0x40 [ 2616.629552][T14460] ? _copy_from_user+0xdd/0x150 [ 2616.629573][T14460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2616.661388][T14460] ? copy_mount_options+0x280/0x3a0 [ 2616.661407][T14460] ksys_mount+0xdb/0x150 [ 2616.661425][T14460] __x64_sys_mount+0xbe/0x150 [ 2616.661442][T14460] do_syscall_64+0x103/0x610 [ 2616.661464][T14460] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2616.671387][T14460] RIP: 0033:0x458c29 [ 2616.671402][T14460] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2616.671410][T14460] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2616.671425][T14460] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2616.671434][T14460] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2616.671443][T14460] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2616.671451][T14460] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 15:15:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = dup3(r0, r0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000540)={{&(0x7f0000147000/0x3000)=nil, 0x3000}, 0x2}) r2 = socket$packet(0x11, 0x80000000000a, 0x300) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000280)={'teql0\x00', {0x2, 0x4e23, @broadcast}}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000340)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f00000003c0)={0x1, &(0x7f0000000380)=[{0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000500)={r4, &(0x7f0000000400)=""/222}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r5 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x10001, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000300)={0x4000001, 0x9, 0x3c}) r6 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x80000001, 0x200) socket$netlink(0x10, 0x3, 0x1f) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000000c0)) getsockname(r2, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) ioctl$RTC_UIE_OFF(r6, 0x7004) ioctl$sock_ax25_SIOCADDRT(r7, 0x890b, &(0x7f0000000200)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, 0x8, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null]}) 15:15:23 executing program 4 (fault-call:4 fault-nth:29): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:23 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2616.671459][T14460] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 [ 2616.866418][T14571] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2616.900096][T14585] FAULT_INJECTION: forcing a failure. [ 2616.900096][T14585] name failslab, interval 1, probability 0, space 0, times 0 15:15:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2616.974946][T14585] CPU: 0 PID: 14585 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2616.983358][T14585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2616.993502][T14585] Call Trace: [ 2616.996810][T14585] dump_stack+0x172/0x1f0 [ 2617.001140][T14585] should_fail.cold+0xa/0x15 [ 2617.005735][T14585] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2617.011562][T14585] ? ___might_sleep+0x163/0x280 [ 2617.016516][T14585] __should_failslab+0x121/0x190 [ 2617.021465][T14585] should_failslab+0x9/0x14 [ 2617.025968][T14585] kmem_cache_alloc_trace+0x2d1/0x760 [ 2617.031322][T14585] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2617.037243][T14585] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2617.044238][T14585] __list_lru_init+0x3cf/0x6e0 [ 2617.049113][T14585] alloc_super+0x762/0x890 [ 2617.053626][T14585] sget_userns+0xf1/0x560 [ 2617.057954][T14585] ? get_anon_bdev+0xc0/0xc0 [ 2617.064472][T14585] ? get_anon_bdev+0xc0/0xc0 [ 2617.069043][T14585] sget+0x10c/0x150 [ 2617.072846][T14585] ? ovl_show_options+0x550/0x550 [ 2617.077873][T14585] mount_nodev+0x31/0x110 [ 2617.082433][T14585] ovl_mount+0x2d/0x40 [ 2617.086484][T14585] ? ovl_own_xattr_set+0x10/0x10 [ 2617.091406][T14585] legacy_get_tree+0xf2/0x200 [ 2617.096782][T14585] vfs_get_tree+0x123/0x450 [ 2617.101279][T14585] do_mount+0x1436/0x2c40 [ 2617.105612][T14585] ? copy_mount_string+0x40/0x40 [ 2617.110623][T14585] ? _copy_from_user+0xdd/0x150 [ 2617.115468][T14585] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2617.121704][T14585] ? copy_mount_options+0x280/0x3a0 [ 2617.126887][T14585] ksys_mount+0xdb/0x150 [ 2617.131120][T14585] __x64_sys_mount+0xbe/0x150 [ 2617.135791][T14585] do_syscall_64+0x103/0x610 [ 2617.140400][T14585] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2617.146303][T14585] RIP: 0033:0x458c29 [ 2617.150294][T14585] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:15:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$bt_rfcomm(0x1f, 0x3, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:24 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:24 executing program 4 (fault-call:4 fault-nth:30): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2617.173976][T14585] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2617.182599][T14585] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2617.190869][T14585] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2617.198831][T14585] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2617.206788][T14585] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2617.214751][T14585] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-control\x00', 0x1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000440)=0xcf59, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") io_setup(0xfff, &(0x7f0000000080)=0x0) io_pgetevents(r2, 0x0, 0x6, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={0x5f0}, 0x8}) r3 = socket$packet(0x11, 0x80000000000a, 0x300) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, r4, 0x30a, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000080}, 0x40) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r3, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r5 = syz_open_dev$dspn(&(0x7f0000000380)='/dev/dsp#\x00', 0x100, 0x48000) write$P9_RSETATTR(r5, &(0x7f00000003c0)={0x7, 0x1b, 0x2}, 0x7) 15:15:24 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d1900030000f3540000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) [ 2617.371764][T14612] FAULT_INJECTION: forcing a failure. [ 2617.371764][T14612] name failslab, interval 1, probability 0, space 0, times 0 [ 2617.386818][T14612] CPU: 1 PID: 14612 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2617.394732][T14612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2617.404863][T14612] Call Trace: [ 2617.408143][T14612] dump_stack+0x172/0x1f0 [ 2617.412467][T14612] should_fail.cold+0xa/0x15 [ 2617.417932][T14612] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2617.423821][T14612] ? ___might_sleep+0x163/0x280 [ 2617.428661][T14612] __should_failslab+0x121/0x190 [ 2617.434803][T14612] should_failslab+0x9/0x14 [ 2617.439323][T14612] kmem_cache_alloc_trace+0x2d1/0x760 [ 2617.444685][T14612] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2617.450478][T14612] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2617.456127][T14612] __list_lru_init+0x3cf/0x6e0 [ 2617.460887][T14612] alloc_super+0x762/0x890 [ 2617.465287][T14612] sget_userns+0xf1/0x560 [ 2617.469600][T14612] ? get_anon_bdev+0xc0/0xc0 [ 2617.474171][T14612] ? get_anon_bdev+0xc0/0xc0 [ 2617.478757][T14612] sget+0x10c/0x150 [ 2617.482550][T14612] ? ovl_show_options+0x550/0x550 [ 2617.487555][T14612] mount_nodev+0x31/0x110 [ 2617.491895][T14612] ovl_mount+0x2d/0x40 [ 2617.495946][T14612] ? ovl_own_xattr_set+0x10/0x10 [ 2617.501824][T14612] legacy_get_tree+0xf2/0x200 [ 2617.506486][T14612] vfs_get_tree+0x123/0x450 [ 2617.510968][T14612] do_mount+0x1436/0x2c40 [ 2617.515281][T14612] ? copy_mount_string+0x40/0x40 [ 2617.520206][T14612] ? _copy_from_user+0xdd/0x150 [ 2617.525051][T14612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2617.531282][T14612] ? copy_mount_options+0x280/0x3a0 [ 2617.536465][T14612] ksys_mount+0xdb/0x150 [ 2617.540971][T14612] __x64_sys_mount+0xbe/0x150 [ 2617.545633][T14612] do_syscall_64+0x103/0x610 [ 2617.550207][T14612] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2617.556079][T14612] RIP: 0033:0x458c29 [ 2617.559953][T14612] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2617.579549][T14612] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2617.587979][T14612] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2617.595937][T14612] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2617.603906][T14612] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2617.611875][T14612] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2617.619850][T14612] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:24 executing program 4 (fault-call:4 fault-nth:31): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = eventfd(0x2631) write$eventfd(r1, &(0x7f0000000140)=0x80000001, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000080), &(0x7f0000000100)=0x80) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r2, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2617.652563][T14605] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000003, 15:15:24 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2617.743469][T14620] FAULT_INJECTION: forcing a failure. [ 2617.743469][T14620] name failslab, interval 1, probability 0, space 0, times 0 [ 2617.759809][T14620] CPU: 1 PID: 14620 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2617.767906][T14620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2617.767913][T14620] Call Trace: [ 2617.767936][T14620] dump_stack+0x172/0x1f0 [ 2617.767958][T14620] should_fail.cold+0xa/0x15 [ 2617.785021][T14620] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2617.801136][T14620] ? ___might_sleep+0x163/0x280 [ 2617.808599][T14620] __should_failslab+0x121/0x190 [ 2617.813558][T14620] should_failslab+0x9/0x14 [ 2617.818072][T14620] kmem_cache_alloc_trace+0x2d1/0x760 [ 2617.823794][T14620] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2617.829767][T14620] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2617.835401][T14620] __list_lru_init+0x3cf/0x6e0 [ 2617.840174][T14620] alloc_super+0x762/0x890 [ 2617.844799][T14620] sget_userns+0xf1/0x560 [ 2617.849201][T14620] ? get_anon_bdev+0xc0/0xc0 [ 2617.853907][T14620] ? get_anon_bdev+0xc0/0xc0 [ 2617.858490][T14620] sget+0x10c/0x150 [ 2617.862889][T14620] ? ovl_show_options+0x550/0x550 [ 2617.867921][T14620] mount_nodev+0x31/0x110 [ 2617.872236][T14620] ovl_mount+0x2d/0x40 [ 2617.877680][T14620] ? ovl_own_xattr_set+0x10/0x10 [ 2617.882620][T14620] legacy_get_tree+0xf2/0x200 [ 2617.887300][T14620] vfs_get_tree+0x123/0x450 [ 2617.891803][T14620] do_mount+0x1436/0x2c40 [ 2617.896133][T14620] ? copy_mount_string+0x40/0x40 [ 2617.901078][T14620] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2617.908219][T14620] ? copy_mount_options+0x280/0x3a0 [ 2617.913404][T14620] ksys_mount+0xdb/0x150 [ 2617.918331][T14620] __x64_sys_mount+0xbe/0x150 [ 2617.923289][T14620] do_syscall_64+0x103/0x610 [ 2617.928241][T14620] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2617.934303][T14620] RIP: 0033:0x458c29 [ 2617.938500][T14620] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2617.958974][T14620] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2617.967548][T14620] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2617.975722][T14620] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2617.983853][T14620] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 15:15:25 executing program 4 (fault-call:4 fault-nth:32): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2617.991986][T14620] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2618.000425][T14620] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 [ 2618.099057][T14619] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:25 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2618.207771][T14635] FAULT_INJECTION: forcing a failure. [ 2618.207771][T14635] name failslab, interval 1, probability 0, space 0, times 0 [ 2618.237988][T14635] CPU: 0 PID: 14635 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2618.245945][T14635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2618.245952][T14635] Call Trace: [ 2618.245979][T14635] dump_stack+0x172/0x1f0 [ 2618.246007][T14635] should_fail.cold+0xa/0x15 [ 2618.246027][T14635] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2618.270808][T14635] ? ___might_sleep+0x163/0x280 [ 2618.270829][T14635] __should_failslab+0x121/0x190 [ 2618.270844][T14635] should_failslab+0x9/0x14 [ 2618.270861][T14635] kmem_cache_alloc_trace+0x2d1/0x760 [ 2618.270881][T14635] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2618.302408][T14635] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2618.308049][T14635] __list_lru_init+0x3cf/0x6e0 [ 2618.308070][T14635] alloc_super+0x762/0x890 [ 2618.308090][T14635] sget_userns+0xf1/0x560 [ 2618.308101][T14635] ? get_anon_bdev+0xc0/0xc0 [ 2618.308118][T14635] ? get_anon_bdev+0xc0/0xc0 [ 2618.317289][T14635] sget+0x10c/0x150 [ 2618.317308][T14635] ? ovl_show_options+0x550/0x550 [ 2618.317323][T14635] mount_nodev+0x31/0x110 [ 2618.317345][T14635] ovl_mount+0x2d/0x40 [ 2618.334620][T14635] ? ovl_own_xattr_set+0x10/0x10 [ 2618.334636][T14635] legacy_get_tree+0xf2/0x200 [ 2618.334653][T14635] vfs_get_tree+0x123/0x450 [ 2618.344082][T14635] do_mount+0x1436/0x2c40 [ 2618.344101][T14635] ? copy_mount_string+0x40/0x40 [ 2618.344117][T14635] ? _copy_from_user+0xdd/0x150 [ 2618.344135][T14635] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2618.344146][T14635] ? copy_mount_options+0x280/0x3a0 [ 2618.344162][T14635] ksys_mount+0xdb/0x150 [ 2618.344178][T14635] __x64_sys_mount+0xbe/0x150 [ 2618.344198][T14635] do_syscall_64+0x103/0x610 [ 2618.344219][T14635] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2618.364625][T14619] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2618.366839][T14635] RIP: 0033:0x458c29 [ 2618.366854][T14635] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2618.366861][T14635] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2618.366876][T14635] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 15:15:25 executing program 4 (fault-call:4 fault-nth:33): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:25 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2618.366883][T14635] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2618.366896][T14635] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2618.385486][T14671] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000003, [ 2618.388238][T14635] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2618.388253][T14635] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003000000600000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) [ 2618.603037][T14759] FAULT_INJECTION: forcing a failure. [ 2618.603037][T14759] name failslab, interval 1, probability 0, space 0, times 0 [ 2618.619168][T14759] CPU: 0 PID: 14759 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2618.627076][T14759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2618.637142][T14759] Call Trace: [ 2618.640543][T14759] dump_stack+0x172/0x1f0 [ 2618.644864][T14759] should_fail.cold+0xa/0x15 [ 2618.649733][T14759] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2618.655643][T14759] ? ___might_sleep+0x163/0x280 [ 2618.662664][T14759] __should_failslab+0x121/0x190 [ 2618.667591][T14759] should_failslab+0x9/0x14 [ 2618.672095][T14759] kmem_cache_alloc_trace+0x2d1/0x760 [ 2618.677463][T14759] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2618.683259][T14759] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2618.688881][T14759] __list_lru_init+0x3cf/0x6e0 [ 2618.694279][T14759] alloc_super+0x762/0x890 [ 2618.699064][T14759] sget_userns+0xf1/0x560 [ 2618.704086][T14759] ? get_anon_bdev+0xc0/0xc0 [ 2618.710757][T14759] ? get_anon_bdev+0xc0/0xc0 [ 2618.715433][T14759] sget+0x10c/0x150 [ 2618.719318][T14759] ? ovl_show_options+0x550/0x550 [ 2618.724600][T14759] mount_nodev+0x31/0x110 [ 2618.728941][T14759] ovl_mount+0x2d/0x40 [ 2618.733104][T14759] ? ovl_own_xattr_set+0x10/0x10 [ 2618.738642][T14759] legacy_get_tree+0xf2/0x200 [ 2618.745671][T14759] vfs_get_tree+0x123/0x450 [ 2618.750304][T14759] do_mount+0x1436/0x2c40 [ 2618.755150][T14759] ? copy_mount_string+0x40/0x40 [ 2618.760515][T14759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2618.766856][T14759] ? copy_mount_options+0x280/0x3a0 [ 2618.772039][T14759] ksys_mount+0xdb/0x150 [ 2618.776270][T14759] __x64_sys_mount+0xbe/0x150 [ 2618.780936][T14759] do_syscall_64+0x103/0x610 [ 2618.785523][T14759] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2618.791660][T14759] RIP: 0033:0x458c29 [ 2618.795643][T14759] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2618.815240][T14759] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2618.823640][T14759] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2618.831686][T14759] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2618.839645][T14759] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 15:15:25 executing program 4 (fault-call:4 fault-nth:34): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2618.847628][T14759] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2618.855885][T14759] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x55) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:26 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:26 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2619.020489][T14870] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2619.079036][T14876] FAULT_INJECTION: forcing a failure. [ 2619.079036][T14876] name failslab, interval 1, probability 0, space 0, times 0 [ 2619.139103][T14876] CPU: 0 PID: 14876 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2619.147047][T14876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2619.157864][T14876] Call Trace: [ 2619.161554][T14876] dump_stack+0x172/0x1f0 [ 2619.166089][T14876] should_fail.cold+0xa/0x15 [ 2619.170696][T14876] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2619.176513][T14876] ? ___might_sleep+0x163/0x280 [ 2619.181946][T14876] __should_failslab+0x121/0x190 [ 2619.186964][T14876] should_failslab+0x9/0x14 [ 2619.191457][T14876] kmem_cache_alloc_node_trace+0x270/0x720 [ 2619.198502][T14876] __kmalloc_node+0x3d/0x70 [ 2619.203007][T14876] kvmalloc_node+0x68/0x100 [ 2619.207511][T14876] __list_lru_init+0x4a6/0x6e0 [ 2619.212566][T14876] alloc_super+0x78d/0x890 [ 2619.217163][T14876] sget_userns+0xf1/0x560 [ 2619.221482][T14876] ? get_anon_bdev+0xc0/0xc0 [ 2619.226177][T14876] ? get_anon_bdev+0xc0/0xc0 [ 2619.230759][T14876] sget+0x10c/0x150 [ 2619.235022][T14876] ? ovl_show_options+0x550/0x550 [ 2619.241362][T14876] mount_nodev+0x31/0x110 [ 2619.246911][T14876] ovl_mount+0x2d/0x40 [ 2619.253068][T14876] ? ovl_own_xattr_set+0x10/0x10 [ 2619.258199][T14876] legacy_get_tree+0xf2/0x200 [ 2619.263292][T14876] vfs_get_tree+0x123/0x450 [ 2619.268661][T14876] do_mount+0x1436/0x2c40 [ 2619.273109][T14876] ? copy_mount_string+0x40/0x40 [ 2619.278043][T14876] ? _copy_from_user+0xdd/0x150 [ 2619.282893][T14876] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2619.289646][T14876] ? copy_mount_options+0x280/0x3a0 [ 2619.294862][T14876] ksys_mount+0xdb/0x150 [ 2619.299096][T14876] __x64_sys_mount+0xbe/0x150 [ 2619.303793][T14876] do_syscall_64+0x103/0x610 [ 2619.308401][T14876] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2619.314290][T14876] RIP: 0033:0x458c29 [ 2619.318180][T14876] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:15:26 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2619.337968][T14876] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2619.346375][T14876] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2619.354333][T14876] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2619.362303][T14876] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2619.370270][T14876] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2619.378227][T14876] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:26 executing program 4 (fault-call:4 fault-nth:35): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:26 executing program 2: r0 = inotify_init1(0x80000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreq(r1, 0x0, 0x27, &(0x7f0000000040)={@empty, @dev={0xac, 0x14, 0x14, 0x23}}, 0x8) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$packet(0x11, 0xfffffffffffffbff, 0x300) r3 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x0, 0x301002) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r0, &(0x7f0000000140)={0x10000000}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r2, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000080)=0xffffffffffffff60) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f00000000c0)) 15:15:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003000000680000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:26 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:26 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2619.593992][T14998] FAULT_INJECTION: forcing a failure. [ 2619.593992][T14998] name failslab, interval 1, probability 0, space 0, times 0 [ 2619.648736][T14998] CPU: 0 PID: 14998 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2619.656770][T14998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2619.666838][T14998] Call Trace: [ 2619.670150][T14998] dump_stack+0x172/0x1f0 [ 2619.674505][T14998] should_fail.cold+0xa/0x15 [ 2619.679114][T14998] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2619.685030][T14998] ? ___might_sleep+0x163/0x280 [ 2619.689899][T14998] __should_failslab+0x121/0x190 [ 2619.694855][T14998] should_failslab+0x9/0x14 [ 2619.699370][T14998] kmem_cache_alloc_node_trace+0x270/0x720 [ 2619.705206][T14998] __kmalloc_node+0x3d/0x70 [ 2619.709729][T14998] kvmalloc_node+0x68/0x100 [ 2619.714249][T14998] __list_lru_init+0x4a6/0x6e0 [ 2619.719024][T14998] alloc_super+0x78d/0x890 [ 2619.719045][T14998] sget_userns+0xf1/0x560 [ 2619.719062][T14998] ? get_anon_bdev+0xc0/0xc0 [ 2619.732765][T14998] ? get_anon_bdev+0xc0/0xc0 [ 2619.737365][T14998] sget+0x10c/0x150 [ 2619.741193][T14998] ? ovl_show_options+0x550/0x550 [ 2619.746230][T14998] mount_nodev+0x31/0x110 [ 2619.750572][T14998] ovl_mount+0x2d/0x40 [ 2619.754651][T14998] ? ovl_own_xattr_set+0x10/0x10 [ 2619.759601][T14998] legacy_get_tree+0xf2/0x200 [ 2619.764282][T14998] vfs_get_tree+0x123/0x450 [ 2619.768795][T14998] do_mount+0x1436/0x2c40 [ 2619.773141][T14998] ? copy_mount_string+0x40/0x40 [ 2619.778100][T14998] ? _copy_from_user+0xdd/0x150 [ 2619.782967][T14998] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2619.782984][T14998] ? copy_mount_options+0x280/0x3a0 [ 2619.783001][T14998] ksys_mount+0xdb/0x150 [ 2619.783014][T14998] __x64_sys_mount+0xbe/0x150 [ 2619.783032][T14998] do_syscall_64+0x103/0x610 [ 2619.783050][T14998] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2619.783061][T14998] RIP: 0033:0x458c29 [ 2619.783072][T14998] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2619.783079][T14998] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 15:15:26 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rt6_stats\x00') getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={0x0, 0x81, 0x7}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000340)={r1, 0x6}, &(0x7f0000000380)=0x8) recvfrom$unix(r0, &(0x7f0000000240)=""/65, 0x41, 0x60, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000080)={0x1f, 0x80000000, 0x101, @random="a26d006cc542", 'bridge_slave_1\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r3 = socket$packet(0x11, 0xf9e860b19b770768, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r3, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) sendto$x25(r0, &(0x7f00000003c0)="11fe45ea03558d28eafd046d6c28106427a2323f28e869d38d4f7ebd007c9e1cc6c359ce0fa4d86b2120ab7c31ed1bad10945740f78a6fb4324e6aa70a644f6d68dbc8f081d23923a115cf96e875980c660149db9fd3097703cdcd899e805677d7203e61", 0x64, 0x20000010, &(0x7f0000000440)={0x9, @remote={[], 0x2}}, 0x12) readv(r4, &(0x7f0000000200)=[{&(0x7f0000000100)=""/240, 0xf0}], 0x1) 15:15:26 executing program 4 (fault-call:4 fault-nth:36): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:26 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:26 executing program 2: r0 = msgget$private(0x0, 0x80) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) getresuid(&(0x7f0000000480), &(0x7f0000000200)=0x0, &(0x7f0000000440)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)=0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000380)={{0x5, r1, r2, r3, r4, 0x2, 0x4}, 0x800000000003, 0x5, 0x69ae, 0x2, 0x4e93, 0x0, r5, r6}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r8 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r8, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2619.783092][T14998] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2619.783101][T14998] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2619.783109][T14998] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2619.783123][T14998] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2619.794530][T14998] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 [ 2619.856714][T15055] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:27 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2620.016771][T15128] FAULT_INJECTION: forcing a failure. [ 2620.016771][T15128] name failslab, interval 1, probability 0, space 0, times 0 [ 2620.080337][T15055] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2620.080413][T15128] CPU: 0 PID: 15128 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2620.096868][T15128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2620.106942][T15128] Call Trace: [ 2620.110252][T15128] dump_stack+0x172/0x1f0 [ 2620.114731][T15128] should_fail.cold+0xa/0x15 [ 2620.119338][T15128] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2620.125176][T15128] ? ___might_sleep+0x163/0x280 15:15:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)='\n\t\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:27 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2620.130078][T15128] __should_failslab+0x121/0x190 [ 2620.135032][T15128] should_failslab+0x9/0x14 [ 2620.139541][T15128] kmem_cache_alloc_trace+0x2d1/0x760 [ 2620.145098][T15128] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2620.150934][T15128] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2620.156584][T15128] __list_lru_init+0x3cf/0x6e0 [ 2620.161338][T15128] alloc_super+0x78d/0x890 [ 2620.165747][T15128] sget_userns+0xf1/0x560 [ 2620.170063][T15128] ? get_anon_bdev+0xc0/0xc0 [ 2620.174642][T15128] ? get_anon_bdev+0xc0/0xc0 [ 2620.179217][T15128] sget+0x10c/0x150 [ 2620.183014][T15128] ? ovl_show_options+0x550/0x550 [ 2620.188040][T15128] mount_nodev+0x31/0x110 [ 2620.192353][T15128] ovl_mount+0x2d/0x40 [ 2620.196406][T15128] ? ovl_own_xattr_set+0x10/0x10 [ 2620.201331][T15128] legacy_get_tree+0xf2/0x200 [ 2620.206005][T15128] vfs_get_tree+0x123/0x450 [ 2620.210497][T15128] do_mount+0x1436/0x2c40 [ 2620.214825][T15128] ? copy_mount_string+0x40/0x40 [ 2620.219750][T15128] ? _copy_from_user+0xdd/0x150 [ 2620.224589][T15128] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2620.230813][T15128] ? copy_mount_options+0x280/0x3a0 [ 2620.235996][T15128] ksys_mount+0xdb/0x150 [ 2620.240225][T15128] __x64_sys_mount+0xbe/0x150 [ 2620.244896][T15128] do_syscall_64+0x103/0x610 [ 2620.249475][T15128] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2620.255479][T15128] RIP: 0033:0x458c29 [ 2620.259359][T15128] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:15:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d1900030000006c0000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2620.278947][T15128] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2620.287355][T15128] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2620.295397][T15128] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2620.303354][T15128] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2620.311318][T15128] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2620.319285][T15128] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:27 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:27 executing program 4 (fault-call:4 fault-nth:37): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000408911, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:27 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2620.554374][T15260] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2620.584848][T15257] FAULT_INJECTION: forcing a failure. [ 2620.584848][T15257] name failslab, interval 1, probability 0, space 0, times 0 [ 2620.623655][T15257] CPU: 0 PID: 15257 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2620.631699][T15257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2620.631712][T15257] Call Trace: [ 2620.645086][T15257] dump_stack+0x172/0x1f0 [ 2620.649437][T15257] should_fail.cold+0xa/0x15 [ 2620.654041][T15257] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2620.659865][T15257] ? ___might_sleep+0x163/0x280 [ 2620.659886][T15257] __should_failslab+0x121/0x190 [ 2620.659902][T15257] should_failslab+0x9/0x14 15:15:27 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2620.659919][T15257] kmem_cache_alloc_trace+0x2d1/0x760 [ 2620.659937][T15257] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2620.659965][T15257] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2620.691009][T15257] __list_lru_init+0x3cf/0x6e0 [ 2620.695805][T15257] alloc_super+0x78d/0x890 [ 2620.700239][T15257] sget_userns+0xf1/0x560 [ 2620.704577][T15257] ? get_anon_bdev+0xc0/0xc0 [ 2620.709179][T15257] ? get_anon_bdev+0xc0/0xc0 [ 2620.713773][T15257] sget+0x10c/0x150 [ 2620.713791][T15257] ? ovl_show_options+0x550/0x550 [ 2620.713804][T15257] mount_nodev+0x31/0x110 [ 2620.713818][T15257] ovl_mount+0x2d/0x40 [ 2620.713830][T15257] ? ovl_own_xattr_set+0x10/0x10 [ 2620.713853][T15257] legacy_get_tree+0xf2/0x200 [ 2620.713870][T15257] vfs_get_tree+0x123/0x450 [ 2620.713886][T15257] do_mount+0x1436/0x2c40 [ 2620.713904][T15257] ? copy_mount_string+0x40/0x40 [ 2620.722726][T15257] ? copy_mount_options+0x1ea/0x3a0 [ 2620.722739][T15257] ? copy_mount_options+0x1f0/0x3a0 [ 2620.722754][T15257] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 15:15:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000340)={0x4, 0xfffffffffffffffb, 0x6, 0x8, 0x8000, 0x3}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, r1, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x20000, 0x0) ioctl$UI_GET_SYSNAME(r3, 0x8040552c, &(0x7f00000000c0)) ioctl$SIOCNRDECOBS(r2, 0x89e2) preadv(r3, &(0x7f0000000300)=[{&(0x7f0000000100)=""/206, 0xce}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f00000002c0)=""/52, 0x34}], 0x3, 0x0) ioctl$UI_GET_SYSNAME(r3, 0x8040552c, &(0x7f0000000380)) [ 2620.722766][T15257] ? copy_mount_options+0x280/0x3a0 [ 2620.722783][T15257] ksys_mount+0xdb/0x150 [ 2620.722798][T15257] __x64_sys_mount+0xbe/0x150 [ 2620.722817][T15257] do_syscall_64+0x103/0x610 [ 2620.789981][T15257] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2620.795899][T15257] RIP: 0033:0x458c29 [ 2620.799978][T15257] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:15:27 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:27 executing program 4 (fault-call:4 fault-nth:38): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2620.819682][T15257] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2620.828294][T15257] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2620.836861][T15257] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2620.844860][T15257] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2620.853542][T15257] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2620.861560][T15257] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:28 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2621.029110][T15260] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003000000740000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) [ 2621.116496][T15383] FAULT_INJECTION: forcing a failure. [ 2621.116496][T15383] name failslab, interval 1, probability 0, space 0, times 0 15:15:28 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2621.168013][T15383] CPU: 1 PID: 15383 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2621.175948][T15383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2621.186008][T15383] Call Trace: [ 2621.189308][T15383] dump_stack+0x172/0x1f0 [ 2621.193626][T15383] should_fail.cold+0xa/0x15 [ 2621.198201][T15383] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2621.204013][T15383] ? ___might_sleep+0x163/0x280 [ 2621.208854][T15383] __should_failslab+0x121/0x190 [ 2621.213774][T15383] should_failslab+0x9/0x14 [ 2621.218264][T15383] kmem_cache_alloc_trace+0x2d1/0x760 [ 2621.223647][T15383] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2621.229476][T15383] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2621.235098][T15383] __list_lru_init+0x3cf/0x6e0 [ 2621.239847][T15383] alloc_super+0x78d/0x890 [ 2621.244268][T15383] sget_userns+0xf1/0x560 [ 2621.248583][T15383] ? get_anon_bdev+0xc0/0xc0 [ 2621.253242][T15383] ? get_anon_bdev+0xc0/0xc0 [ 2621.257826][T15383] sget+0x10c/0x150 [ 2621.261622][T15383] ? ovl_show_options+0x550/0x550 [ 2621.266697][T15383] mount_nodev+0x31/0x110 [ 2621.271041][T15383] ovl_mount+0x2d/0x40 [ 2621.275104][T15383] ? ovl_own_xattr_set+0x10/0x10 [ 2621.280027][T15383] legacy_get_tree+0xf2/0x200 [ 2621.284687][T15383] vfs_get_tree+0x123/0x450 [ 2621.289174][T15383] do_mount+0x1436/0x2c40 [ 2621.293489][T15383] ? copy_mount_string+0x40/0x40 [ 2621.298495][T15383] ? copy_mount_options+0x198/0x3a0 [ 2621.303676][T15383] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 2621.309205][T15383] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2621.315525][T15383] ? copy_mount_options+0x280/0x3a0 [ 2621.320730][T15383] ksys_mount+0xdb/0x150 [ 2621.324955][T15383] __x64_sys_mount+0xbe/0x150 [ 2621.329624][T15383] do_syscall_64+0x103/0x610 [ 2621.334199][T15383] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2621.340074][T15383] RIP: 0033:0x458c29 [ 2621.343948][T15383] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:15:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONE(r0, 0x40049409, r0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x2) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f0000000180)={&(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r2, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) syz_open_procfs(r3, &(0x7f0000000100)='net/ip6_tables_names\x00') [ 2621.366517][T15383] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2621.374918][T15383] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2621.382877][T15383] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2621.390976][T15383] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2621.399025][T15383] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2621.407182][T15383] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:28 executing program 4 (fault-call:4 fault-nth:39): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:28 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:28 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2621.565931][T15403] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2621.618965][T15409] FAULT_INJECTION: forcing a failure. [ 2621.618965][T15409] name failslab, interval 1, probability 0, space 0, times 0 [ 2621.638717][T15409] CPU: 1 PID: 15409 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2621.646667][T15409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2621.656734][T15409] Call Trace: [ 2621.660138][T15409] dump_stack+0x172/0x1f0 [ 2621.664494][T15409] should_fail.cold+0xa/0x15 15:15:28 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2621.669223][T15409] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2621.675053][T15409] ? ___might_sleep+0x163/0x280 [ 2621.679928][T15409] __should_failslab+0x121/0x190 [ 2621.684879][T15409] should_failslab+0x9/0x14 [ 2621.689399][T15409] kmem_cache_alloc_trace+0x2d1/0x760 [ 2621.694804][T15409] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2621.700634][T15409] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2621.706286][T15409] __list_lru_init+0x3cf/0x6e0 [ 2621.711139][T15409] alloc_super+0x78d/0x890 [ 2621.715687][T15409] sget_userns+0xf1/0x560 [ 2621.720005][T15409] ? get_anon_bdev+0xc0/0xc0 [ 2621.724612][T15409] ? get_anon_bdev+0xc0/0xc0 [ 2621.729207][T15409] sget+0x10c/0x150 [ 2621.733033][T15409] ? ovl_show_options+0x550/0x550 [ 2621.738243][T15409] mount_nodev+0x31/0x110 [ 2621.742576][T15409] ovl_mount+0x2d/0x40 [ 2621.746649][T15409] ? ovl_own_xattr_set+0x10/0x10 [ 2621.751596][T15409] legacy_get_tree+0xf2/0x200 [ 2621.756264][T15409] vfs_get_tree+0x123/0x450 [ 2621.760769][T15409] do_mount+0x1436/0x2c40 [ 2621.765093][T15409] ? copy_mount_string+0x40/0x40 [ 2621.770201][T15409] ? copy_mount_options+0x198/0x3a0 [ 2621.775400][T15409] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 2621.780949][T15409] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2621.787182][T15409] ? copy_mount_options+0x280/0x3a0 [ 2621.792834][T15409] ksys_mount+0xdb/0x150 [ 2621.797174][T15409] __x64_sys_mount+0xbe/0x150 [ 2621.801864][T15409] do_syscall_64+0x103/0x610 [ 2621.806459][T15409] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2621.812426][T15409] RIP: 0033:0x458c29 [ 2621.816301][T15409] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2621.836680][T15409] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2621.845090][T15409] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2621.853223][T15409] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2621.861192][T15409] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 15:15:28 executing program 4 (fault-call:4 fault-nth:40): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2621.869167][T15409] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2621.877209][T15409] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000c80)={0x0}, &(0x7f0000000200)=0xc) process_vm_writev(r1, &(0x7f0000000300)=[{&(0x7f0000000240)=""/147, 0x93}], 0x1, &(0x7f0000000900)=[{&(0x7f0000000340)=""/212, 0xd4}, {&(0x7f0000000440)=""/154, 0x9a}, {&(0x7f0000000500)=""/243, 0xf3}, {&(0x7f0000000600)=""/192, 0xc0}, {&(0x7f00000006c0)=""/47, 0x2f}, {&(0x7f0000000700)=""/94, 0x5e}, {&(0x7f0000000780)=""/3, 0x3}, {&(0x7f0000001680)=""/4096, 0x1000}, {&(0x7f00000007c0)=""/187, 0xbb}, {&(0x7f0000000880)=""/98, 0x62}], 0xa, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000bc0)="0adc1f123c123f319bd070") r2 = syz_open_dev$mice(&(0x7f0000000a00)='/dev/input/mice\x00', 0x0, 0x200) socket$bt_cmtp(0x1f, 0x3, 0x5) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000a40)={@in6={{0xa, 0x4e21, 0x80000000, @dev={0xfe, 0x80, [], 0x14}, 0x7}}, 0x0, 0xa681, 0x0, "bce838fac13addb387e60db74798891fd50fd84800093112d6836fad4e5e1bf62f7abc4afb02db4fb946731a32eaac97ee4ef0333be9141eb120306167acb7815e5c96b6a15037f426fd272f12e32508"}, 0xd8) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000009c0)) r3 = socket$packet(0x11, 0x80000000000a, 0x300) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000000)={@remote, @loopback}, &(0x7f0000000b40)=0xc) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r3, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0xa2) ioctl$TIOCSSERIAL(r2, 0x541f, &(0x7f0000000cc0)={0x6, 0x7fffffff, 0xfff, 0x3d6, 0x3, 0x3, 0xc8, 0xff92, 0x20, 0xfffffffffffffffe, 0x1c0000000000, 0xffffffffffffff7f, 0x8, 0x8, &(0x7f00000001c0), 0x10001, 0x3f, 0x8}) ioctl$UDMABUF_CREATE_LIST(r3, 0x40087543, &(0x7f0000000b80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32=r2, @ANYBLOB="001d0d3800f0ffffefb1c2"]) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000180)={0x3, 0xe3, &(0x7f0000000080)="f3316c1129ba4c88dc965d9b87862b3a9b698019f91c1a5c10115299d1bd00e0de15bc0214b65e676a8a27cc9c3662d8940e0d4fabdc3fb8dd6b9773bd57e6024d3bdc268d5662c2adf456a9c8d3180ff7fad2fbad75c5a2d1910db350a5de3c61b85ed31d5b36b05ec0c0626393cb122ae18c975bfa24267c6cf1460a24ed0022d82e503f848c7d6fab6c300a67714729fbf9fb1b874182ab8deaf1781ed842526767ed5e40e524b91a4706379351097e9c3e751e4a56fde9106817a84489313e111205932702d56c66f90a8e4173474a2c239dd9cd54b63d03609bc42b95294f202a"}) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f0000000c40)={0x0, 0x4, 0x1, &(0x7f0000000c00)=0x3}) 15:15:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x10000, 0x100) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000080)={0x4, 0x2000}) ioctl(r0, 0x1000008911, &(0x7f00000000c0)="0adc1f123c123f319bd070") r2 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r2, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) [ 2622.034120][T15403] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:29 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2622.074655][T15432] FAULT_INJECTION: forcing a failure. [ 2622.074655][T15432] name failslab, interval 1, probability 0, space 0, times 0 [ 2622.168986][T15432] CPU: 0 PID: 15432 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2622.177054][T15432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2622.187918][T15432] Call Trace: [ 2622.191329][T15432] dump_stack+0x172/0x1f0 [ 2622.196406][T15432] should_fail.cold+0xa/0x15 [ 2622.201080][T15432] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2622.206881][T15432] ? ___might_sleep+0x163/0x280 [ 2622.212262][T15432] __should_failslab+0x121/0x190 [ 2622.217362][T15432] should_failslab+0x9/0x14 [ 2622.221871][T15432] kmem_cache_alloc_trace+0x2d1/0x760 [ 2622.227408][T15432] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2622.233326][T15432] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2622.238973][T15432] __list_lru_init+0x3cf/0x6e0 [ 2622.243754][T15432] alloc_super+0x78d/0x890 [ 2622.248163][T15432] sget_userns+0xf1/0x560 [ 2622.252477][T15432] ? get_anon_bdev+0xc0/0xc0 [ 2622.257067][T15432] ? get_anon_bdev+0xc0/0xc0 [ 2622.261642][T15432] sget+0x10c/0x150 [ 2622.265445][T15432] ? ovl_show_options+0x550/0x550 [ 2622.270452][T15432] mount_nodev+0x31/0x110 [ 2622.274777][T15432] ovl_mount+0x2d/0x40 [ 2622.279347][T15432] ? ovl_own_xattr_set+0x10/0x10 [ 2622.284282][T15432] legacy_get_tree+0xf2/0x200 [ 2622.288957][T15432] vfs_get_tree+0x123/0x450 [ 2622.294058][T15432] do_mount+0x1436/0x2c40 [ 2622.298379][T15432] ? copy_mount_string+0x40/0x40 [ 2622.303397][T15432] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2622.309622][T15432] ? copy_mount_options+0x280/0x3a0 [ 2622.314841][T15432] ksys_mount+0xdb/0x150 [ 2622.319245][T15432] __x64_sys_mount+0xbe/0x150 [ 2622.323927][T15432] do_syscall_64+0x103/0x610 [ 2622.328526][T15432] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2622.334420][T15432] RIP: 0033:0x458c29 [ 2622.338305][T15432] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2622.357892][T15432] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 15:15:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d1900030000007a0000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:29 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2622.366372][T15432] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2622.374347][T15432] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2622.382306][T15432] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2622.390434][T15432] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2622.398395][T15432] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:15:29 executing program 4 (fault-call:4 fault-nth:41): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:29 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2622.588845][T15558] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2622.601266][T15556] EXT4-fs (sda1): re-mounted. Opts: [ 2622.658962][T15569] FAULT_INJECTION: forcing a failure. [ 2622.658962][T15569] name failslab, interval 1, probability 0, space 0, times 0 [ 2622.672598][T15569] CPU: 1 PID: 15569 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2622.680948][T15569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2622.691028][T15569] Call Trace: [ 2622.694319][T15569] dump_stack+0x172/0x1f0 [ 2622.698647][T15569] should_fail.cold+0xa/0x15 [ 2622.703233][T15569] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2622.709643][T15569] ? ___might_sleep+0x163/0x280 [ 2622.714509][T15569] __should_failslab+0x121/0x190 [ 2622.721366][T15569] should_failslab+0x9/0x14 [ 2622.737187][T15569] kmem_cache_alloc_trace+0x2d1/0x760 [ 2622.744833][T15569] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2622.757677][T15569] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2622.765869][T15569] __list_lru_init+0x3cf/0x6e0 [ 2622.770641][T15569] alloc_super+0x78d/0x890 [ 2622.776371][T15569] sget_userns+0xf1/0x560 [ 2622.781676][T15569] ? get_anon_bdev+0xc0/0xc0 [ 2622.787264][T15569] ? get_anon_bdev+0xc0/0xc0 [ 2622.792296][T15569] sget+0x10c/0x150 [ 2622.796334][T15569] ? ovl_show_options+0x550/0x550 [ 2622.801479][T15569] mount_nodev+0x31/0x110 [ 2622.805803][T15569] ovl_mount+0x2d/0x40 [ 2622.809859][T15569] ? ovl_own_xattr_set+0x10/0x10 [ 2622.814815][T15569] legacy_get_tree+0xf2/0x200 [ 2622.819511][T15569] vfs_get_tree+0x123/0x450 [ 2622.824008][T15569] do_mount+0x1436/0x2c40 [ 2622.828359][T15569] ? copy_mount_string+0x40/0x40 [ 2622.833295][T15569] ? _copy_from_user+0xdd/0x150 [ 2622.838315][T15569] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2622.844555][T15569] ? copy_mount_options+0x280/0x3a0 [ 2622.849842][T15569] ksys_mount+0xdb/0x150 [ 2622.855288][T15569] __x64_sys_mount+0xbe/0x150 [ 2622.859958][T15569] do_syscall_64+0x103/0x610 [ 2622.864554][T15569] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2622.870435][T15569] RIP: 0033:0x458c29 [ 2622.874352][T15569] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2622.896038][T15569] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2622.904717][T15569] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2622.912893][T15569] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2622.921656][T15569] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2622.931022][T15569] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2622.944584][T15569] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:30 executing program 4 (fault-call:4 fault-nth:42): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:15:30 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2623.081672][T15558] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2623.146764][T15680] FAULT_INJECTION: forcing a failure. [ 2623.146764][T15680] name failslab, interval 1, probability 0, space 0, times 0 [ 2623.187178][T15685] EXT4-fs (sda1): re-mounted. Opts: 15:15:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003ffffff8c0000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r0, 0x1, 0x1f, &(0x7f00000000c0)=""/209, &(0x7f0000000000)=0xd1) ioctl(r0, 0x100000890e, &(0x7f00000002c0)="319bd070e269caa20cabc73db7a9723a33fb483c3aa927a528fb40af30f8e5d152822477649ac770e911f679b6b2c0d70e918cf988f054a38ecaa17112984b04828731e10016cdf66b88348d62a779449e3a9a67cec73f066a20adf1ac447f98e45e6b5c280d49f7a59e3eae6f6dd8f12ff1661c01b4844fb4c95919d57e47c3e729279f9392a52f7210d4577a6a293ed838cef05bfb875bfff0db8a453c8c781c3f07676860e9f759e12401c53db79842cd4e5c8cdb696ff49a99547a0efc92f22500f98d161e693d0b8051979fb0db47fe8ae331f6b002cb4155a99c78b7a8c167c59cd2586eebd0ad54db0075170d19eae745654e427784ebacc0acfcbd6d5677352eb1ac85695783f749a19bf25fef26fa59c95e5cafdb68d1252ce7ba00000000000000000000000000000000000000000000000000000000000000968a73f6da3368f185c3df29ba8c19d4cede1c4ffc95f4a718") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000440)=""/217) [ 2623.216101][T15680] CPU: 1 PID: 15680 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2623.226043][T15680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2623.236726][T15680] Call Trace: [ 2623.240037][T15680] dump_stack+0x172/0x1f0 [ 2623.244398][T15680] should_fail.cold+0xa/0x15 [ 2623.249013][T15680] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2623.254845][T15680] ? ___might_sleep+0x163/0x280 [ 2623.259729][T15680] __should_failslab+0x121/0x190 [ 2623.264694][T15680] should_failslab+0x9/0x14 [ 2623.269303][T15680] kmem_cache_alloc_trace+0x2d1/0x760 [ 2623.274712][T15680] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2623.280532][T15680] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2623.286163][T15680] __list_lru_init+0x3cf/0x6e0 [ 2623.291020][T15680] alloc_super+0x78d/0x890 [ 2623.296932][T15680] sget_userns+0xf1/0x560 [ 2623.301277][T15680] ? get_anon_bdev+0xc0/0xc0 [ 2623.305965][T15680] ? get_anon_bdev+0xc0/0xc0 [ 2623.310559][T15680] sget+0x10c/0x150 [ 2623.314365][T15680] ? ovl_show_options+0x550/0x550 [ 2623.320090][T15680] mount_nodev+0x31/0x110 [ 2623.324413][T15680] ovl_mount+0x2d/0x40 [ 2623.328492][T15680] ? ovl_own_xattr_set+0x10/0x10 [ 2623.333430][T15680] legacy_get_tree+0xf2/0x200 [ 2623.338100][T15680] vfs_get_tree+0x123/0x450 [ 2623.342771][T15680] do_mount+0x1436/0x2c40 [ 2623.347091][T15680] ? copy_mount_string+0x40/0x40 [ 2623.352033][T15680] ? _copy_from_user+0xdd/0x150 [ 2623.357449][T15680] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2623.363716][T15680] ? copy_mount_options+0x280/0x3a0 [ 2623.368925][T15680] ksys_mount+0xdb/0x150 [ 2623.373173][T15680] __x64_sys_mount+0xbe/0x150 [ 2623.377856][T15680] do_syscall_64+0x103/0x610 [ 2623.382467][T15680] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2623.389065][T15680] RIP: 0033:0x458c29 [ 2623.392976][T15680] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:15:30 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:30 executing program 4 (fault-call:4 fault-nth:43): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2623.413532][T15680] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2623.422522][T15680] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2623.430555][T15680] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2623.439824][T15680] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2623.448317][T15680] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2623.456367][T15680] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x80000000, 0x400040) openat$cgroup(r1, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) r2 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r2, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:30 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2623.649300][T15808] FAULT_INJECTION: forcing a failure. [ 2623.649300][T15808] name failslab, interval 1, probability 0, space 0, times 0 [ 2623.662720][T15808] CPU: 0 PID: 15808 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2623.671295][T15808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2623.682644][T15808] Call Trace: [ 2623.682680][T15808] dump_stack+0x172/0x1f0 [ 2623.682699][T15808] should_fail.cold+0xa/0x15 [ 2623.682719][T15808] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2623.682740][T15808] ? ___might_sleep+0x163/0x280 [ 2623.682757][T15808] __should_failslab+0x121/0x190 [ 2623.682772][T15808] should_failslab+0x9/0x14 [ 2623.682788][T15808] kmem_cache_alloc_trace+0x2d1/0x760 [ 2623.682808][T15808] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2623.682827][T15808] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2623.682846][T15808] __list_lru_init+0x3cf/0x6e0 [ 2623.682863][T15808] alloc_super+0x78d/0x890 [ 2623.682882][T15808] sget_userns+0xf1/0x560 [ 2623.691028][T15808] ? get_anon_bdev+0xc0/0xc0 [ 2623.691045][T15808] ? get_anon_bdev+0xc0/0xc0 [ 2623.691062][T15808] sget+0x10c/0x150 [ 2623.759134][T15808] ? ovl_show_options+0x550/0x550 [ 2623.764174][T15808] mount_nodev+0x31/0x110 [ 2623.768713][T15808] ovl_mount+0x2d/0x40 [ 2623.772964][T15808] ? ovl_own_xattr_set+0x10/0x10 [ 2623.772984][T15808] legacy_get_tree+0xf2/0x200 [ 2623.773002][T15808] vfs_get_tree+0x123/0x450 [ 2623.773018][T15808] do_mount+0x1436/0x2c40 [ 2623.773034][T15808] ? copy_mount_string+0x40/0x40 [ 2623.773051][T15808] ? _copy_from_user+0xdd/0x150 [ 2623.773069][T15808] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2623.773080][T15808] ? copy_mount_options+0x280/0x3a0 [ 2623.773097][T15808] ksys_mount+0xdb/0x150 [ 2623.773112][T15808] __x64_sys_mount+0xbe/0x150 [ 2623.773129][T15808] do_syscall_64+0x103/0x610 [ 2623.773147][T15808] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2623.773164][T15808] RIP: 0033:0x458c29 15:15:30 executing program 4 (fault-call:4 fault-nth:44): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:30 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2623.782856][T15808] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2623.782864][T15808] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2623.782880][T15808] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2623.782889][T15808] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2623.782898][T15808] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2623.782912][T15808] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2623.782919][T15808] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 [ 2623.920281][T15809] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:31 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2624.013862][T15827] EXT4-fs (sda1): re-mounted. Opts: [ 2624.030542][T15835] FAULT_INJECTION: forcing a failure. [ 2624.030542][T15835] name failslab, interval 1, probability 0, space 0, times 0 [ 2624.109697][T15835] CPU: 0 PID: 15835 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2624.118251][T15835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2624.128604][T15835] Call Trace: [ 2624.131938][T15835] dump_stack+0x172/0x1f0 [ 2624.136287][T15835] should_fail.cold+0xa/0x15 [ 2624.140907][T15835] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2624.147494][T15835] ? ___might_sleep+0x163/0x280 [ 2624.152361][T15835] __should_failslab+0x121/0x190 15:15:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)) [ 2624.157395][T15835] should_failslab+0x9/0x14 [ 2624.162178][T15835] kmem_cache_alloc_trace+0x2d1/0x760 [ 2624.167573][T15835] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2624.173399][T15835] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2624.179048][T15835] __list_lru_init+0x3cf/0x6e0 [ 2624.183943][T15835] alloc_super+0x78d/0x890 [ 2624.188439][T15835] sget_userns+0xf1/0x560 [ 2624.192982][T15835] ? get_anon_bdev+0xc0/0xc0 [ 2624.197564][T15835] ? get_anon_bdev+0xc0/0xc0 [ 2624.202142][T15835] sget+0x10c/0x150 [ 2624.205950][T15835] ? ovl_show_options+0x550/0x550 [ 2624.211605][T15835] mount_nodev+0x31/0x110 [ 2624.216031][T15835] ovl_mount+0x2d/0x40 [ 2624.220290][T15835] ? ovl_own_xattr_set+0x10/0x10 [ 2624.225356][T15835] legacy_get_tree+0xf2/0x200 [ 2624.230019][T15835] vfs_get_tree+0x123/0x450 [ 2624.234517][T15835] do_mount+0x1436/0x2c40 [ 2624.238932][T15835] ? copy_mount_string+0x40/0x40 [ 2624.243867][T15835] ? _copy_from_user+0xdd/0x150 [ 2624.248766][T15835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2624.254999][T15835] ? copy_mount_options+0x280/0x3a0 [ 2624.260182][T15835] ksys_mount+0xdb/0x150 [ 2624.265462][T15835] __x64_sys_mount+0xbe/0x150 [ 2624.270121][T15835] do_syscall_64+0x103/0x610 [ 2624.274718][T15835] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2624.280636][T15835] RIP: 0033:0x458c29 [ 2624.284512][T15835] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2624.305243][T15835] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2624.313669][T15835] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2624.321647][T15835] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2624.329620][T15835] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2624.337594][T15835] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2624.345968][T15835] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003ffffff970000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:31 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:31 executing program 4 (fault-call:4 fault-nth:45): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x80, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f00000001c0)=0x5) r2 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000994000/0x1000)=nil, 0x1000, 0x300000d, 0x3dba900b4ff5dd9f, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'user.', 'self\\system}nodev\x00'}, &(0x7f0000000100)=""/101, 0x65) getsockname(r2, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:31 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2624.519642][T15955] FAULT_INJECTION: forcing a failure. [ 2624.519642][T15955] name failslab, interval 1, probability 0, space 0, times 0 [ 2624.532840][T15950] EXT4-fs (sda1): re-mounted. Opts: [ 2624.546527][T15955] CPU: 0 PID: 15955 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2624.554563][T15955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2624.564722][T15955] Call Trace: [ 2624.568033][T15955] dump_stack+0x172/0x1f0 [ 2624.572381][T15955] should_fail.cold+0xa/0x15 [ 2624.576989][T15955] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2624.582812][T15955] ? ___might_sleep+0x163/0x280 [ 2624.587682][T15955] __should_failslab+0x121/0x190 [ 2624.592645][T15955] should_failslab+0x9/0x14 [ 2624.597163][T15955] kmem_cache_alloc_trace+0x2d1/0x760 [ 2624.602550][T15955] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2624.608375][T15955] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2624.614023][T15955] __list_lru_init+0x3cf/0x6e0 15:15:31 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2624.618810][T15955] alloc_super+0x78d/0x890 [ 2624.623242][T15955] sget_userns+0xf1/0x560 [ 2624.627580][T15955] ? get_anon_bdev+0xc0/0xc0 [ 2624.632186][T15955] ? get_anon_bdev+0xc0/0xc0 [ 2624.636777][T15955] sget+0x10c/0x150 [ 2624.640602][T15955] ? ovl_show_options+0x550/0x550 [ 2624.645643][T15955] mount_nodev+0x31/0x110 [ 2624.649979][T15955] ovl_mount+0x2d/0x40 [ 2624.654060][T15955] ? ovl_own_xattr_set+0x10/0x10 [ 2624.659112][T15955] legacy_get_tree+0xf2/0x200 [ 2624.663802][T15955] vfs_get_tree+0x123/0x450 [ 2624.668319][T15955] do_mount+0x1436/0x2c40 [ 2624.672758][T15955] ? copy_mount_string+0x40/0x40 [ 2624.677711][T15955] ? _copy_from_user+0xdd/0x150 [ 2624.682579][T15955] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2624.689041][T15955] ? copy_mount_options+0x280/0x3a0 [ 2624.694257][T15955] ksys_mount+0xdb/0x150 [ 2624.698517][T15955] __x64_sys_mount+0xbe/0x150 [ 2624.703212][T15955] do_syscall_64+0x103/0x610 [ 2624.707819][T15955] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2624.713728][T15955] RIP: 0033:0x458c29 [ 2624.717710][T15955] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2624.740211][T15955] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2624.749480][T15955] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2624.757544][T15955] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 15:15:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) bind$inet(r2, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000001240)={0x18, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x4}]}, 0x18}}, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:31 executing program 4 (fault-call:4 fault-nth:46): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2624.765503][T15955] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2624.773470][T15955] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2624.781526][T15955] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)) [ 2624.862328][T16029] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:32 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2624.954049][T16081] FAULT_INJECTION: forcing a failure. [ 2624.954049][T16081] name failslab, interval 1, probability 0, space 0, times 0 [ 2624.979219][T16081] CPU: 0 PID: 16081 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2624.987162][T16081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2624.997364][T16081] Call Trace: [ 2625.000741][T16081] dump_stack+0x172/0x1f0 [ 2625.005064][T16081] should_fail.cold+0xa/0x15 [ 2625.009641][T16081] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2625.015434][T16081] ? ___might_sleep+0x163/0x280 [ 2625.020273][T16081] __should_failslab+0x121/0x190 [ 2625.025196][T16081] should_failslab+0x9/0x14 [ 2625.029684][T16081] kmem_cache_alloc_trace+0x2d1/0x760 [ 2625.035044][T16081] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2625.040843][T16081] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2625.046460][T16081] __list_lru_init+0x3cf/0x6e0 [ 2625.051213][T16081] alloc_super+0x78d/0x890 [ 2625.055616][T16081] sget_userns+0xf1/0x560 [ 2625.059928][T16081] ? get_anon_bdev+0xc0/0xc0 [ 2625.064501][T16081] ? get_anon_bdev+0xc0/0xc0 [ 2625.069071][T16081] sget+0x10c/0x150 [ 2625.072860][T16081] ? ovl_show_options+0x550/0x550 [ 2625.077868][T16081] mount_nodev+0x31/0x110 [ 2625.082184][T16081] ovl_mount+0x2d/0x40 [ 2625.086254][T16081] ? ovl_own_xattr_set+0x10/0x10 [ 2625.091176][T16081] legacy_get_tree+0xf2/0x200 [ 2625.096884][T16081] vfs_get_tree+0x123/0x450 [ 2625.101610][T16081] do_mount+0x1436/0x2c40 [ 2625.105928][T16081] ? copy_mount_string+0x40/0x40 [ 2625.110852][T16081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2625.117074][T16081] ? copy_mount_options+0x280/0x3a0 [ 2625.122260][T16081] ksys_mount+0xdb/0x150 [ 2625.126500][T16081] __x64_sys_mount+0xbe/0x150 [ 2625.131186][T16081] do_syscall_64+0x103/0x610 [ 2625.135766][T16081] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2625.141642][T16081] RIP: 0033:0x458c29 [ 2625.145523][T16081] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2625.165125][T16081] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2625.173517][T16081] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2625.181584][T16081] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2625.189538][T16081] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2625.197847][T16081] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2625.205972][T16081] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2625.280853][T16029] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2625.298461][T16139] EXT4-fs (sda1): re-mounted. Opts: 15:15:32 executing program 4 (fault-call:4 fault-nth:47): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:32 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0xfffffffffffffffc) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d1900030000edc00000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)) [ 2625.509770][T16208] FAULT_INJECTION: forcing a failure. [ 2625.509770][T16208] name failslab, interval 1, probability 0, space 0, times 0 [ 2625.531222][T16208] CPU: 0 PID: 16208 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2625.539148][T16208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2625.549195][T16208] Call Trace: [ 2625.552503][T16208] dump_stack+0x172/0x1f0 15:15:32 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2625.556865][T16208] should_fail.cold+0xa/0x15 [ 2625.561476][T16208] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2625.567302][T16208] ? ___might_sleep+0x163/0x280 [ 2625.572162][T16208] __should_failslab+0x121/0x190 [ 2625.577102][T16208] should_failslab+0x9/0x14 [ 2625.581614][T16208] kmem_cache_alloc_trace+0x2d1/0x760 [ 2625.587008][T16208] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2625.592826][T16208] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2625.598563][T16208] __list_lru_init+0x3cf/0x6e0 [ 2625.603328][T16208] alloc_super+0x78d/0x890 [ 2625.607761][T16208] sget_userns+0xf1/0x560 [ 2625.612085][T16208] ? get_anon_bdev+0xc0/0xc0 [ 2625.616661][T16208] ? get_anon_bdev+0xc0/0xc0 [ 2625.621232][T16208] sget+0x10c/0x150 [ 2625.625021][T16208] ? ovl_show_options+0x550/0x550 [ 2625.630131][T16208] mount_nodev+0x31/0x110 [ 2625.634459][T16208] ovl_mount+0x2d/0x40 [ 2625.638608][T16208] ? ovl_own_xattr_set+0x10/0x10 [ 2625.643547][T16208] legacy_get_tree+0xf2/0x200 [ 2625.648215][T16208] vfs_get_tree+0x123/0x450 [ 2625.652712][T16208] do_mount+0x1436/0x2c40 [ 2625.657036][T16208] ? copy_mount_string+0x40/0x40 [ 2625.661958][T16208] ? _copy_from_user+0xdd/0x150 [ 2625.666809][T16208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2625.673051][T16208] ? copy_mount_options+0x280/0x3a0 [ 2625.678258][T16208] ksys_mount+0xdb/0x150 [ 2625.682495][T16208] __x64_sys_mount+0xbe/0x150 [ 2625.687174][T16208] do_syscall_64+0x103/0x610 [ 2625.691775][T16208] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2625.697671][T16208] RIP: 0033:0x458c29 [ 2625.701565][T16208] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2625.722321][T16208] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2625.730734][T16208] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2625.738704][T16208] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2625.746752][T16208] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 15:15:32 executing program 4 (fault-call:4 fault-nth:48): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f000008f000/0x3000)=nil, 0x3000, 0x8, 0x31, r0, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, r3, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x60d}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e23, @remote}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x715b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}]}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x4801}, 0x800) [ 2625.754715][T16208] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2625.762687][T16208] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2625.882255][T16212] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2625.909282][T16318] EXT4-fs (sda1): re-mounted. Opts: [ 2625.956211][T16323] FAULT_INJECTION: forcing a failure. [ 2625.956211][T16323] name failslab, interval 1, probability 0, space 0, times 0 [ 2625.977894][T16323] CPU: 1 PID: 16323 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2625.985906][T16323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2625.985911][T16323] Call Trace: [ 2625.985936][T16323] dump_stack+0x172/0x1f0 [ 2625.985958][T16323] should_fail.cold+0xa/0x15 [ 2626.003826][T16323] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2626.003847][T16323] ? ___might_sleep+0x163/0x280 [ 2626.003864][T16323] __should_failslab+0x121/0x190 [ 2626.003878][T16323] should_failslab+0x9/0x14 [ 2626.003893][T16323] kmem_cache_alloc_node_trace+0x270/0x720 [ 2626.003911][T16323] ? kmem_cache_alloc_trace+0x354/0x760 [ 2626.039949][T16323] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2626.045750][T16323] __kmalloc_node+0x3d/0x70 [ 2626.050284][T16323] kvmalloc_node+0x68/0x100 [ 2626.054806][T16323] __list_lru_init+0x4a6/0x6e0 [ 2626.059566][T16323] alloc_super+0x78d/0x890 [ 2626.063966][T16323] sget_userns+0xf1/0x560 [ 2626.068285][T16323] ? get_anon_bdev+0xc0/0xc0 [ 2626.072876][T16323] ? get_anon_bdev+0xc0/0xc0 [ 2626.078855][T16323] sget+0x10c/0x150 [ 2626.083004][T16323] ? ovl_show_options+0x550/0x550 [ 2626.088033][T16323] mount_nodev+0x31/0x110 [ 2626.092361][T16323] ovl_mount+0x2d/0x40 [ 2626.096509][T16323] ? ovl_own_xattr_set+0x10/0x10 [ 2626.101452][T16323] legacy_get_tree+0xf2/0x200 [ 2626.106134][T16323] vfs_get_tree+0x123/0x450 [ 2626.110621][T16323] do_mount+0x1436/0x2c40 [ 2626.114954][T16323] ? copy_mount_string+0x40/0x40 [ 2626.119876][T16323] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2626.126097][T16323] ? copy_mount_options+0x280/0x3a0 [ 2626.131291][T16323] ksys_mount+0xdb/0x150 [ 2626.135530][T16323] __x64_sys_mount+0xbe/0x150 [ 2626.140200][T16323] do_syscall_64+0x103/0x610 [ 2626.144792][T16323] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2626.150664][T16323] RIP: 0033:0x458c29 [ 2626.154563][T16323] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2626.174951][T16323] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2626.183720][T16323] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2626.191692][T16323] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2626.199665][T16323] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 15:15:33 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:33 executing program 4 (fault-call:4 fault-nth:49): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2626.207643][T16323] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2626.215631][T16323] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003fffffff00000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 2626.382793][T16345] FAULT_INJECTION: forcing a failure. [ 2626.382793][T16345] name failslab, interval 1, probability 0, space 0, times 0 15:15:33 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2626.480869][T16393] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 2626.494271][T16345] CPU: 0 PID: 16345 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2626.502209][T16345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2626.512278][T16345] Call Trace: [ 2626.515583][T16345] dump_stack+0x172/0x1f0 [ 2626.519933][T16345] should_fail.cold+0xa/0x15 [ 2626.524549][T16345] ? fault_create_debugfs_attr+0x1e0/0x1e0 15:15:33 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2626.530556][T16345] ? ___might_sleep+0x163/0x280 [ 2626.535539][T16345] __should_failslab+0x121/0x190 [ 2626.540575][T16345] should_failslab+0x9/0x14 [ 2626.545092][T16345] kmem_cache_alloc_trace+0x2d1/0x760 [ 2626.545112][T16345] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2626.545136][T16345] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2626.545156][T16345] __list_lru_init+0x3cf/0x6e0 [ 2626.567285][T16345] alloc_super+0x78d/0x890 [ 2626.571691][T16345] sget_userns+0xf1/0x560 [ 2626.576016][T16345] ? get_anon_bdev+0xc0/0xc0 [ 2626.580706][T16345] ? get_anon_bdev+0xc0/0xc0 [ 2626.585307][T16345] sget+0x10c/0x150 [ 2626.589132][T16345] ? ovl_show_options+0x550/0x550 [ 2626.594164][T16345] mount_nodev+0x31/0x110 [ 2626.598512][T16345] ovl_mount+0x2d/0x40 [ 2626.602588][T16345] ? ovl_own_xattr_set+0x10/0x10 [ 2626.607522][T16345] legacy_get_tree+0xf2/0x200 [ 2626.612198][T16345] vfs_get_tree+0x123/0x450 [ 2626.616700][T16345] do_mount+0x1436/0x2c40 [ 2626.621045][T16345] ? copy_mount_string+0x40/0x40 [ 2626.625998][T16345] ? copy_mount_options+0x1ea/0x3a0 [ 2626.631203][T16345] ? copy_mount_options+0x1f3/0x3a0 [ 2626.636415][T16345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2626.642513][T16412] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2626.642662][T16345] ? copy_mount_options+0x280/0x3a0 [ 2626.656427][T16345] ksys_mount+0xdb/0x150 [ 2626.660692][T16345] __x64_sys_mount+0xbe/0x150 [ 2626.665366][T16345] do_syscall_64+0x103/0x610 [ 2626.669942][T16345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2626.675827][T16345] RIP: 0033:0x458c29 [ 2626.679717][T16345] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2626.699317][T16345] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2626.707944][T16345] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2626.715902][T16345] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2626.723866][T16345] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 15:15:33 executing program 4 (fault-call:4 fault-nth:50): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2626.731868][T16345] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2626.739843][T16345] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 [ 2626.805060][T16465] FAULT_INJECTION: forcing a failure. [ 2626.805060][T16465] name failslab, interval 1, probability 0, space 0, times 0 [ 2626.833478][T16465] CPU: 0 PID: 16465 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2626.841413][T16465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2626.851490][T16465] Call Trace: [ 2626.854828][T16465] dump_stack+0x172/0x1f0 [ 2626.859443][T16465] should_fail.cold+0xa/0x15 [ 2626.864242][T16465] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2626.870154][T16465] ? ___might_sleep+0x163/0x280 [ 2626.875020][T16465] __should_failslab+0x121/0x190 [ 2626.879968][T16465] should_failslab+0x9/0x14 [ 2626.884489][T16465] kmem_cache_alloc_trace+0x2d1/0x760 [ 2626.889870][T16465] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2626.895693][T16465] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2626.901517][T16465] __list_lru_init+0x3cf/0x6e0 [ 2626.906294][T16465] alloc_super+0x78d/0x890 [ 2626.910727][T16465] sget_userns+0xf1/0x560 [ 2626.915062][T16465] ? get_anon_bdev+0xc0/0xc0 [ 2626.919651][T16465] ? get_anon_bdev+0xc0/0xc0 [ 2626.924234][T16465] sget+0x10c/0x150 [ 2626.929324][T16465] ? ovl_show_options+0x550/0x550 [ 2626.934353][T16465] mount_nodev+0x31/0x110 [ 2626.943042][T16465] ovl_mount+0x2d/0x40 [ 2626.947478][T16465] ? ovl_own_xattr_set+0x10/0x10 [ 2626.952424][T16465] legacy_get_tree+0xf2/0x200 [ 2626.952441][T16465] vfs_get_tree+0x123/0x450 [ 2626.952465][T16465] do_mount+0x1436/0x2c40 [ 2626.952483][T16465] ? copy_mount_string+0x40/0x40 [ 2626.952507][T16465] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2626.952519][T16465] ? copy_mount_options+0x280/0x3a0 [ 2626.952534][T16465] ksys_mount+0xdb/0x150 [ 2626.952549][T16465] __x64_sys_mount+0xbe/0x150 [ 2626.952567][T16465] do_syscall_64+0x103/0x610 [ 2626.952588][T16465] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2626.961741][T16465] RIP: 0033:0x458c29 15:15:34 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") accept4$inet(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10, 0x800) r1 = socket$packet(0x11, 0xfffffffffffffffc, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2626.961755][T16465] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2626.961767][T16465] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2627.034219][T16465] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2627.042201][T16465] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2627.050180][T16465] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2627.058162][T16465] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2627.066158][T16465] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:34 executing program 4 (fault-call:4 fault-nth:51): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:34 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003fffffff40000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0xc1, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x2, 0x80000001, 0x63, 0x3ff, 0x51d2}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000140)={r3, @in={{0x2, 0x4e20, @rand_addr=0x5}}}, 0x84) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2627.247132][T16588] FAULT_INJECTION: forcing a failure. [ 2627.247132][T16588] name failslab, interval 1, probability 0, space 0, times 0 [ 2627.314158][T16588] CPU: 0 PID: 16588 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2627.322186][T16588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2627.332766][T16588] Call Trace: [ 2627.336077][T16588] dump_stack+0x172/0x1f0 [ 2627.340433][T16588] should_fail.cold+0xa/0x15 [ 2627.345141][T16588] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2627.350949][T16588] ? ___might_sleep+0x163/0x280 [ 2627.355896][T16588] __should_failslab+0x121/0x190 15:15:34 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2627.360840][T16588] should_failslab+0x9/0x14 [ 2627.365354][T16588] kmem_cache_alloc_trace+0x2d1/0x760 [ 2627.370739][T16588] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2627.376644][T16588] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2627.382288][T16588] __list_lru_init+0x3cf/0x6e0 [ 2627.387052][T16588] alloc_super+0x78d/0x890 [ 2627.391466][T16588] sget_userns+0xf1/0x560 [ 2627.395776][T16588] ? get_anon_bdev+0xc0/0xc0 [ 2627.400350][T16588] ? get_anon_bdev+0xc0/0xc0 [ 2627.404920][T16588] sget+0x10c/0x150 [ 2627.408800][T16588] ? ovl_show_options+0x550/0x550 [ 2627.413809][T16588] mount_nodev+0x31/0x110 [ 2627.418140][T16588] ovl_mount+0x2d/0x40 [ 2627.422228][T16588] ? ovl_own_xattr_set+0x10/0x10 [ 2627.427159][T16588] legacy_get_tree+0xf2/0x200 [ 2627.431822][T16588] vfs_get_tree+0x123/0x450 [ 2627.436308][T16588] do_mount+0x1436/0x2c40 [ 2627.440623][T16588] ? copy_mount_string+0x40/0x40 [ 2627.445544][T16588] ? _copy_from_user+0xdd/0x150 [ 2627.450386][T16588] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2627.456607][T16588] ? copy_mount_options+0x280/0x3a0 [ 2627.461790][T16588] ksys_mount+0xdb/0x150 [ 2627.466028][T16588] __x64_sys_mount+0xbe/0x150 [ 2627.470802][T16588] do_syscall_64+0x103/0x610 [ 2627.475378][T16588] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2627.481269][T16588] RIP: 0033:0x458c29 [ 2627.485163][T16588] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2627.504859][T16588] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 15:15:34 executing program 4 (fault-call:4 fault-nth:52): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2627.513285][T16588] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2627.521344][T16588] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2627.529305][T16588] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2627.537260][T16588] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2627.545220][T16588] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000080)={0x84, @broadcast, 0x4e22, 0x3, 'lc\x00', 0x1, 0x96de, 0x7a}, 0x2c) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000580), &(0x7f00000005c0)=0x4) r2 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) getsockname(r2, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2627.649157][T16603] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2627.705290][T16613] FAULT_INJECTION: forcing a failure. [ 2627.705290][T16613] name failslab, interval 1, probability 0, space 0, times 0 [ 2627.745761][T16613] CPU: 1 PID: 16613 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2627.753869][T16613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2627.764030][T16613] Call Trace: [ 2627.767341][T16613] dump_stack+0x172/0x1f0 [ 2627.771693][T16613] should_fail.cold+0xa/0x15 [ 2627.776390][T16613] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2627.782236][T16613] ? ___might_sleep+0x163/0x280 [ 2627.787115][T16613] __should_failslab+0x121/0x190 15:15:34 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x2, 0x101040) write$FUSE_IOCTL(r2, &(0x7f00000000c0)={0x20, 0x0, 0x8, {0x0, 0x4, 0x80, 0x101}}, 0x20) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2627.792063][T16613] should_failslab+0x9/0x14 [ 2627.796579][T16613] kmem_cache_alloc_trace+0x2d1/0x760 [ 2627.802140][T16613] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2627.808078][T16613] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2627.813704][T16613] __list_lru_init+0x3cf/0x6e0 [ 2627.818460][T16613] alloc_super+0x78d/0x890 [ 2627.822866][T16613] sget_userns+0xf1/0x560 [ 2627.827267][T16613] ? get_anon_bdev+0xc0/0xc0 [ 2627.831843][T16613] ? get_anon_bdev+0xc0/0xc0 [ 2627.836451][T16613] sget+0x10c/0x150 [ 2627.840246][T16613] ? ovl_show_options+0x550/0x550 [ 2627.845254][T16613] mount_nodev+0x31/0x110 [ 2627.849568][T16613] ovl_mount+0x2d/0x40 [ 2627.853618][T16613] ? ovl_own_xattr_set+0x10/0x10 [ 2627.858543][T16613] legacy_get_tree+0xf2/0x200 [ 2627.863205][T16613] vfs_get_tree+0x123/0x450 [ 2627.867781][T16613] do_mount+0x1436/0x2c40 [ 2627.872098][T16613] ? copy_mount_string+0x40/0x40 [ 2627.877031][T16613] ? _copy_from_user+0xdd/0x150 [ 2627.881867][T16613] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2627.888091][T16613] ? copy_mount_options+0x280/0x3a0 [ 2627.893359][T16613] ksys_mount+0xdb/0x150 [ 2627.897684][T16613] __x64_sys_mount+0xbe/0x150 [ 2627.902695][T16613] do_syscall_64+0x103/0x610 [ 2627.907271][T16613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2627.913149][T16613] RIP: 0033:0x458c29 [ 2627.917114][T16613] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:15:35 executing program 4 (fault-call:4 fault-nth:53): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2627.936702][T16613] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2627.950045][T16613] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2627.958000][T16613] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2627.965955][T16613] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2627.973913][T16613] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2627.981868][T16613] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 [ 2628.083112][T16603] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2628.127324][T16732] FAULT_INJECTION: forcing a failure. [ 2628.127324][T16732] name failslab, interval 1, probability 0, space 0, times 0 [ 2628.147605][T16732] CPU: 1 PID: 16732 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2628.155535][T16732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2628.165594][T16732] Call Trace: [ 2628.168901][T16732] dump_stack+0x172/0x1f0 [ 2628.173252][T16732] should_fail.cold+0xa/0x15 15:15:35 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2628.177950][T16732] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2628.183772][T16732] ? ___might_sleep+0x163/0x280 [ 2628.188719][T16732] __should_failslab+0x121/0x190 [ 2628.193680][T16732] should_failslab+0x9/0x14 [ 2628.198184][T16732] kmem_cache_alloc_trace+0x2d1/0x760 [ 2628.203558][T16732] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2628.209394][T16732] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2628.215044][T16732] __list_lru_init+0x3cf/0x6e0 [ 2628.219801][T16732] alloc_super+0x78d/0x890 [ 2628.224290][T16732] sget_userns+0xf1/0x560 [ 2628.228610][T16732] ? get_anon_bdev+0xc0/0xc0 [ 2628.233197][T16732] ? get_anon_bdev+0xc0/0xc0 [ 2628.237764][T16732] sget+0x10c/0x150 [ 2628.241582][T16732] ? ovl_show_options+0x550/0x550 [ 2628.246594][T16732] mount_nodev+0x31/0x110 [ 2628.250990][T16732] ovl_mount+0x2d/0x40 [ 2628.255042][T16732] ? ovl_own_xattr_set+0x10/0x10 [ 2628.259963][T16732] legacy_get_tree+0xf2/0x200 [ 2628.264640][T16732] vfs_get_tree+0x123/0x450 [ 2628.269134][T16732] do_mount+0x1436/0x2c40 [ 2628.273445][T16732] ? copy_mount_string+0x40/0x40 [ 2628.278523][T16732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2628.284776][T16732] ? copy_mount_options+0x280/0x3a0 [ 2628.289979][T16732] ksys_mount+0xdb/0x150 [ 2628.294230][T16732] __x64_sys_mount+0xbe/0x150 [ 2628.298892][T16732] do_syscall_64+0x103/0x610 [ 2628.303467][T16732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2628.309339][T16732] RIP: 0033:0x458c29 [ 2628.313249][T16732] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2628.332841][T16732] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2628.341247][T16732] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2628.349216][T16732] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2628.357186][T16732] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2628.365143][T16732] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 15:15:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003fffffff50000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) [ 2628.373120][T16732] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:35 executing program 4 (fault-call:4 fault-nth:54): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:35 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xe7c2, &(0x7f0000000080)="0adc1f123c123f319bd0705acfdd30c2a14ffed8c5ec7dec1ab2e9fac8b94703dfae7bca847e3e313c1612359634d3869c98cb5ca93f5945e1d32e82147f75a3c549cf98ad58ad67124adfce55c212fbb78a32ca00adcd41e2865c10c392b12d93317eb452") r1 = socket$packet(0x11, 0x80000000000a, 0x300) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000100)='reno\x00', 0x5) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 2628.615208][T16954] FAULT_INJECTION: forcing a failure. [ 2628.615208][T16954] name failslab, interval 1, probability 0, space 0, times 0 [ 2628.646556][T16960] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2628.674615][T16954] CPU: 1 PID: 16954 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2628.682910][T16954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2628.692963][T16954] Call Trace: [ 2628.696265][T16954] dump_stack+0x172/0x1f0 [ 2628.700753][T16954] should_fail.cold+0xa/0x15 [ 2628.705380][T16954] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2628.711220][T16954] ? ___might_sleep+0x163/0x280 [ 2628.716250][T16954] __should_failslab+0x121/0x190 [ 2628.721195][T16954] should_failslab+0x9/0x14 [ 2628.725718][T16954] kmem_cache_alloc_trace+0x2d1/0x760 [ 2628.731191][T16954] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2628.737002][T16954] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2628.742624][T16954] __list_lru_init+0x3cf/0x6e0 [ 2628.747374][T16954] alloc_super+0x78d/0x890 [ 2628.751774][T16954] sget_userns+0xf1/0x560 [ 2628.756082][T16954] ? get_anon_bdev+0xc0/0xc0 [ 2628.760656][T16954] ? get_anon_bdev+0xc0/0xc0 [ 2628.765311][T16954] sget+0x10c/0x150 [ 2628.769116][T16954] ? ovl_show_options+0x550/0x550 [ 2628.774130][T16954] mount_nodev+0x31/0x110 [ 2628.778459][T16954] ovl_mount+0x2d/0x40 [ 2628.783377][T16954] ? ovl_own_xattr_set+0x10/0x10 [ 2628.788314][T16954] legacy_get_tree+0xf2/0x200 [ 2628.792982][T16954] vfs_get_tree+0x123/0x450 [ 2628.797497][T16954] do_mount+0x1436/0x2c40 [ 2628.801813][T16954] ? copy_mount_string+0x40/0x40 [ 2628.806812][T16954] ? __sanitizer_cov_trace_const_cmp4+0x11/0x20 [ 2628.813038][T16954] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2628.819270][T16954] ? copy_mount_options+0x280/0x3a0 [ 2628.824568][T16954] ksys_mount+0xdb/0x150 [ 2628.828812][T16954] __x64_sys_mount+0xbe/0x150 [ 2628.833741][T16954] do_syscall_64+0x103/0x610 [ 2628.838348][T16954] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2628.844228][T16954] RIP: 0033:0x458c29 [ 2628.848121][T16954] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:15:35 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2628.867718][T16954] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2628.876292][T16954] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2628.884283][T16954] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2628.892239][T16954] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2628.900195][T16954] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2628.908158][T16954] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:36 executing program 4 (fault-call:4 fault-nth:55): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:36 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2628.994472][T16960] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) 15:15:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x100, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000100)=0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f00001cb000/0x1000)=nil, 0x1000, 0xfffffffffffffffb, 0x31, r1, 0x0) getsockname(r2, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, 0xffffffffffffffff, 0x0) 15:15:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 15:15:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003fffffff60000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:36 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2629.173636][T17085] FAULT_INJECTION: forcing a failure. [ 2629.173636][T17085] name failslab, interval 1, probability 0, space 0, times 0 [ 2629.248081][T17085] CPU: 0 PID: 17085 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2629.256031][T17085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2629.256038][T17085] Call Trace: [ 2629.256064][T17085] dump_stack+0x172/0x1f0 [ 2629.256085][T17085] should_fail.cold+0xa/0x15 [ 2629.256103][T17085] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2629.256122][T17085] ? ___might_sleep+0x163/0x280 [ 2629.256139][T17085] __should_failslab+0x121/0x190 [ 2629.256152][T17085] should_failslab+0x9/0x14 [ 2629.256168][T17085] kmem_cache_alloc_trace+0x2d1/0x760 [ 2629.256192][T17085] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2629.256210][T17085] __list_lru_init+0x3cf/0x6e0 [ 2629.256226][T17085] alloc_super+0x78d/0x890 [ 2629.256251][T17085] sget_userns+0xf1/0x560 [ 2629.274950][T17085] ? get_anon_bdev+0xc0/0xc0 [ 2629.274968][T17085] ? get_anon_bdev+0xc0/0xc0 [ 2629.274981][T17085] sget+0x10c/0x150 [ 2629.274998][T17085] ? ovl_show_options+0x550/0x550 15:15:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) [ 2629.275013][T17085] mount_nodev+0x31/0x110 [ 2629.275031][T17085] ovl_mount+0x2d/0x40 [ 2629.315713][T17085] ? ovl_own_xattr_set+0x10/0x10 [ 2629.315731][T17085] legacy_get_tree+0xf2/0x200 [ 2629.315747][T17085] vfs_get_tree+0x123/0x450 [ 2629.315762][T17085] do_mount+0x1436/0x2c40 [ 2629.315781][T17085] ? copy_mount_string+0x40/0x40 [ 2629.315798][T17085] ? copy_mount_options+0x198/0x3a0 [ 2629.315817][T17085] ? copy_mount_options+0x1b1/0x3a0 [ 2629.340890][T17085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2629.396736][T17085] ? copy_mount_options+0x280/0x3a0 [ 2629.401980][T17085] ksys_mount+0xdb/0x150 [ 2629.406241][T17085] __x64_sys_mount+0xbe/0x150 [ 2629.412064][T17085] do_syscall_64+0x103/0x610 [ 2629.416674][T17085] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2629.423180][T17085] RIP: 0033:0x458c29 15:15:36 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2629.427533][T17085] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2629.450014][T17085] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2629.461732][T17085] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2629.472906][T17085] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2629.481940][T17085] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2629.490340][T17085] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 15:15:36 executing program 4 (fault-call:4 fault-nth:56): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10800, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f00000000c0)={0x8001, 0x811, 0x5, 0xffffffffffff906d, 0xe, 0x100, 0x4, 0xeb, 0x9, 0x5, 0x3, 0x7}) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2629.498493][T17085] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2629.586693][T17104] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2629.676436][T17115] FAULT_INJECTION: forcing a failure. [ 2629.676436][T17115] name failslab, interval 1, probability 0, space 0, times 0 15:15:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003fffffdf90000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:36 executing program 3: mkdir(0x0, 0x0) 15:15:36 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2629.724200][T17115] CPU: 1 PID: 17115 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2629.732347][T17115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2629.742785][T17115] Call Trace: [ 2629.746110][T17115] dump_stack+0x172/0x1f0 [ 2629.750469][T17115] should_fail.cold+0xa/0x15 [ 2629.755131][T17115] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2629.760962][T17115] ? ___might_sleep+0x163/0x280 [ 2629.766442][T17115] __should_failslab+0x121/0x190 [ 2629.771498][T17115] should_failslab+0x9/0x14 [ 2629.776011][T17115] kmem_cache_alloc_trace+0x2d1/0x760 [ 2629.781400][T17115] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2629.787047][T17115] __list_lru_init+0x3cf/0x6e0 [ 2629.791914][T17115] alloc_super+0x78d/0x890 [ 2629.796320][T17115] sget_userns+0xf1/0x560 [ 2629.800649][T17115] ? get_anon_bdev+0xc0/0xc0 [ 2629.805317][T17115] ? get_anon_bdev+0xc0/0xc0 [ 2629.809904][T17115] sget+0x10c/0x150 [ 2629.813704][T17115] ? ovl_show_options+0x550/0x550 [ 2629.827781][T17115] mount_nodev+0x31/0x110 [ 2629.832109][T17115] ovl_mount+0x2d/0x40 [ 2629.836298][T17115] ? ovl_own_xattr_set+0x10/0x10 [ 2629.841224][T17115] legacy_get_tree+0xf2/0x200 [ 2629.845889][T17115] vfs_get_tree+0x123/0x450 [ 2629.850400][T17115] do_mount+0x1436/0x2c40 [ 2629.854715][T17115] ? copy_mount_string+0x40/0x40 [ 2629.859641][T17115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2629.865882][T17115] ? copy_mount_options+0x280/0x3a0 [ 2629.871086][T17115] ksys_mount+0xdb/0x150 [ 2629.876464][T17115] __x64_sys_mount+0xbe/0x150 [ 2629.881167][T17115] do_syscall_64+0x103/0x610 [ 2629.885752][T17115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2629.891627][T17115] RIP: 0033:0x458c29 [ 2629.895597][T17115] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2629.915299][T17115] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 15:15:37 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x3, 0x101000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x3, 0x800, 0x7, 0x0, 0x7}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000140)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000001180)=0x1008) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000001240)=@sco, &(0x7f00000012c0)=0x80) getsockname(r0, &(0x7f00000011c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:37 executing program 4 (fault-call:4 fault-nth:57): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2629.923792][T17115] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2629.931764][T17115] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2629.939733][T17115] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2629.947774][T17115] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2629.955844][T17115] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 [ 2630.031393][T17123] EXT4-fs (sda1): re-mounted. Opts: [ 2630.073049][T17227] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:15:37 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:37 executing program 3: mkdir(0x0, 0x0) 15:15:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x4) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000140), 0x2) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$EVIOCGKEY(r3, 0x80404518, &(0x7f00000001c0)=""/29) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000080)='mime_type+*}#\x00'}, 0x30) ptrace$peek(0x2, r4, &(0x7f0000000100)) [ 2630.139989][T17240] FAULT_INJECTION: forcing a failure. [ 2630.139989][T17240] name failslab, interval 1, probability 0, space 0, times 0 [ 2630.218649][T17227] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2630.222492][T17240] CPU: 0 PID: 17240 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2630.235349][T17240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2630.245428][T17240] Call Trace: [ 2630.248753][T17240] dump_stack+0x172/0x1f0 [ 2630.248774][T17240] should_fail.cold+0xa/0x15 [ 2630.248795][T17240] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2630.263506][T17240] ? ___might_sleep+0x163/0x280 [ 2630.268370][T17240] __should_failslab+0x121/0x190 [ 2630.273312][T17240] should_failslab+0x9/0x14 [ 2630.273328][T17240] kmem_cache_alloc_trace+0x2d1/0x760 [ 2630.273344][T17240] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2630.273363][T17240] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2630.273379][T17240] __list_lru_init+0x3cf/0x6e0 [ 2630.273397][T17240] alloc_super+0x78d/0x890 [ 2630.273416][T17240] sget_userns+0xf1/0x560 [ 2630.273428][T17240] ? get_anon_bdev+0xc0/0xc0 [ 2630.273442][T17240] ? get_anon_bdev+0xc0/0xc0 [ 2630.273453][T17240] sget+0x10c/0x150 [ 2630.273474][T17240] ? ovl_show_options+0x550/0x550 [ 2630.326486][T17240] mount_nodev+0x31/0x110 [ 2630.331168][T17240] ovl_mount+0x2d/0x40 [ 2630.335222][T17240] ? ovl_own_xattr_set+0x10/0x10 [ 2630.340151][T17240] legacy_get_tree+0xf2/0x200 [ 2630.344817][T17240] vfs_get_tree+0x123/0x450 [ 2630.349306][T17240] do_mount+0x1436/0x2c40 [ 2630.353625][T17240] ? copy_mount_string+0x40/0x40 [ 2630.358552][T17240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2630.364789][T17240] ? copy_mount_options+0x280/0x3a0 [ 2630.369971][T17240] ksys_mount+0xdb/0x150 [ 2630.374200][T17240] __x64_sys_mount+0xbe/0x150 [ 2630.378873][T17240] do_syscall_64+0x103/0x610 [ 2630.383540][T17240] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2630.389429][T17240] RIP: 0033:0x458c29 [ 2630.393396][T17240] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2630.413074][T17240] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2630.421574][T17240] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2630.429529][T17240] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2630.437486][T17240] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2630.442249][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2630.445444][T17240] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2630.445459][T17240] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 [ 2630.451213][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2630.473189][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2630.479000][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2630.485067][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2630.491203][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:15:37 executing program 3: mkdir(0x0, 0x0) 15:15:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) accept$netrom(r0, &(0x7f0000000080)={{0x3, @rose}, [@null, @bcast, @bcast, @default, @default, @remote, @default]}, &(0x7f0000000100)=0x48) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) pwrite64(r1, &(0x7f0000000240)="1085b56f6bfc90ec3368806ceb298081f181e0c7e92c0f79ab8b9f8d352e3ce09859a5cdb3297bc0d85cbe35db16d23765659c4f8aaf988d3e180fbc96eef5a011e0609c5de1490db210dfdc36f0", 0x4e, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000140)="2b74d275b06b09693e15a323474e32650f7b7ec75cb360ce7d0e614130ae0b993e622d62e7ff02d7c0ef2c6cd02b9dce8b0cae2f478bbc42b459b904466bc86085492ca53346e9e87ac1297adfdd0e7fa7826baaa7082d1738aa65c7c855f26877f32fd871da78da93bafd5f2e951137401c986286f37348972fee034b029c0aa6f92433abfa51d70f540126a3f69a31ef51bd3f17f551052ba1c18261fa395c007211d9dcb3387496868c6abdf781f002d972bff29abbe7e6d13d841cd81d358b657ac0845cf601921af793cf313bee20585595eeb0a9c588b95ecbb5d54331fa61ba91aed36689d4838a02dfb1740b495601b011e264afc68904bad6eecd5f") 15:15:37 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2630.520197][T17251] EXT4-fs (sda1): re-mounted. Opts: 15:15:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003fffffffb0000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:15:37 executing program 4 (fault-call:4 fault-nth:58): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:37 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:37 executing program 3 (fault-call:0 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) [ 2630.768460][T17294] FAULT_INJECTION: forcing a failure. [ 2630.768460][T17294] name failslab, interval 1, probability 0, space 0, times 0 [ 2630.789513][T17312] EXT4-fs (sda1): re-mounted. Opts: [ 2630.818314][T17333] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2630.857358][T17388] FAULT_INJECTION: forcing a failure. 15:15:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$KDADDIO(r1, 0x4b34, 0x1d) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f00000000c0), 0x2) getsockname(r2, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) ioctl$PIO_SCRNMAP(r3, 0x4b41, &(0x7f0000000100)="bec5fa33ceb46ba5edd110611fbde1139fc7dec2a7fc7324498eeb75885224063c4aad12825c7d8a90f8d23e93e81981e6183253285ceee13e201d6cdf003b13148e55fceef2b43ca5f1144e7904e6ff3d783f31149f068e81cde0b941686e28edbe41b5545adaaef303e476e07f4635087d941b1e1968f75da95f898668757d1e12c201c7a43f3ed235c30e47f172a961d70061bb8f94") [ 2630.857358][T17388] name failslab, interval 1, probability 0, space 0, times 0 [ 2630.860019][T17294] CPU: 0 PID: 17294 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2630.877925][T17294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2630.887989][T17294] Call Trace: [ 2630.891308][T17294] dump_stack+0x172/0x1f0 [ 2630.895664][T17294] should_fail.cold+0xa/0x15 [ 2630.900261][T17294] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2630.906160][T17294] ? ___might_sleep+0x163/0x280 [ 2630.911022][T17294] __should_failslab+0x121/0x190 [ 2630.915957][T17294] should_failslab+0x9/0x14 [ 2630.920465][T17294] kmem_cache_alloc_trace+0x2d1/0x760 [ 2630.925849][T17294] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2630.932163][T17294] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2630.944355][T17294] __list_lru_init+0x3cf/0x6e0 [ 2630.949129][T17294] alloc_super+0x78d/0x890 [ 2630.953545][T17294] sget_userns+0xf1/0x560 [ 2630.957901][T17294] ? get_anon_bdev+0xc0/0xc0 [ 2630.962494][T17294] ? get_anon_bdev+0xc0/0xc0 [ 2630.967179][T17294] sget+0x10c/0x150 [ 2630.970994][T17294] ? ovl_show_options+0x550/0x550 [ 2630.976015][T17294] mount_nodev+0x31/0x110 [ 2630.980340][T17294] ovl_mount+0x2d/0x40 [ 2630.984417][T17294] ? ovl_own_xattr_set+0x10/0x10 [ 2630.989353][T17294] legacy_get_tree+0xf2/0x200 [ 2630.994026][T17294] vfs_get_tree+0x123/0x450 [ 2630.998524][T17294] do_mount+0x1436/0x2c40 [ 2631.003377][T17294] ? copy_mount_string+0x40/0x40 [ 2631.008318][T17294] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2631.014551][T17294] ? copy_mount_options+0x280/0x3a0 15:15:38 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) [ 2631.019754][T17294] ksys_mount+0xdb/0x150 [ 2631.023995][T17294] __x64_sys_mount+0xbe/0x150 [ 2631.028671][T17294] do_syscall_64+0x103/0x610 [ 2631.033354][T17294] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2631.039262][T17294] RIP: 0033:0x458c29 [ 2631.043155][T17294] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2631.062771][T17294] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2631.072228][T17294] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2631.080281][T17294] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2631.088247][T17294] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2631.096812][T17294] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2631.104777][T17294] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 [ 2631.112765][T17388] CPU: 1 PID: 17388 Comm: syz-executor.3 Not tainted 5.1.0-rc5 #68 [ 2631.120669][T17388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2631.130714][T17388] Call Trace: [ 2631.130739][T17388] dump_stack+0x172/0x1f0 [ 2631.130758][T17388] should_fail.cold+0xa/0x15 [ 2631.130774][T17388] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2631.130799][T17388] ? ___might_sleep+0x163/0x280 [ 2631.138411][T17388] __should_failslab+0x121/0x190 [ 2631.138427][T17388] should_failslab+0x9/0x14 [ 2631.138442][T17388] kmem_cache_alloc+0x2b2/0x6f0 [ 2631.138457][T17388] ? wait_for_completion+0x440/0x440 [ 2631.138476][T17388] getname_flags+0xd6/0x5b0 [ 2631.178897][T17388] do_mkdirat+0xa0/0x2a0 [ 2631.183204][T17388] ? __ia32_sys_mknod+0xb0/0xb0 [ 2631.188054][T17388] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2631.193497][T17388] ? do_syscall_64+0x26/0x610 [ 2631.198157][T17388] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2631.204219][T17388] ? do_syscall_64+0x26/0x610 [ 2631.209055][T17388] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2631.214326][T17388] __x64_sys_mkdir+0x5c/0x80 [ 2631.218903][T17388] do_syscall_64+0x103/0x610 [ 2631.223479][T17388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2631.229352][T17388] RIP: 0033:0x458c29 [ 2631.233507][T17388] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2631.253096][T17388] RSP: 002b:00007f6b3e028c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2631.261667][T17388] RAX: ffffffffffffffda RBX: 00007f6b3e028c90 RCX: 0000000000458c29 [ 2631.269711][T17388] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 2631.277791][T17388] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2631.285772][T17388] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6b3e0296d4 [ 2631.293730][T17388] R13: 00000000004be3c9 R14: 00000000004d8690 R15: 0000000000000003 15:15:38 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}, 0x0}], 0x22b, 0x0) 15:15:38 executing program 3 (fault-call:0 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 15:15:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)) 15:15:38 executing program 4 (fault-call:4 fault-nth:59): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2631.497665][T17488] FAULT_INJECTION: forcing a failure. [ 2631.497665][T17488] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2631.511115][T17488] CPU: 1 PID: 17488 Comm: syz-executor.3 Not tainted 5.1.0-rc5 #68 [ 2631.519204][T17488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2631.529293][T17488] Call Trace: [ 2631.532596][T17488] dump_stack+0x172/0x1f0 [ 2631.532620][T17488] should_fail.cold+0xa/0x15 [ 2631.532637][T17488] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2631.532656][T17488] ? __lock_acquire+0x548/0x3fb0 [ 2631.541582][T17488] should_fail_alloc_page+0x50/0x60 [ 2631.541601][T17488] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2631.541624][T17488] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2631.568822][T17488] ? find_held_lock+0x35/0x130 [ 2631.573597][T17488] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2631.579802][T17488] cache_grow_begin+0x9c/0x860 [ 2631.584585][T17488] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2631.590742][T17492] FAULT_INJECTION: forcing a failure. [ 2631.590742][T17492] name failslab, interval 1, probability 0, space 0, times 0 [ 2631.590839][T17488] kmem_cache_alloc+0x62d/0x6f0 [ 2631.609846][T17488] ? wait_for_completion+0x440/0x440 [ 2631.615148][T17488] getname_flags+0xd6/0x5b0 [ 2631.619664][T17488] do_mkdirat+0xa0/0x2a0 [ 2631.623933][T17488] ? __ia32_sys_mknod+0xb0/0xb0 [ 2631.628798][T17488] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2631.634514][T17488] ? do_syscall_64+0x26/0x610 [ 2631.639281][T17488] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2631.645345][T17488] ? do_syscall_64+0x26/0x610 [ 2631.650043][T17488] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2631.655333][T17488] __x64_sys_mkdir+0x5c/0x80 [ 2631.659931][T17488] do_syscall_64+0x103/0x610 [ 2631.664524][T17488] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2631.670415][T17488] RIP: 0033:0x458c29 [ 2631.674327][T17488] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2631.694894][T17488] RSP: 002b:00007f6b3e028c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2631.703588][T17488] RAX: ffffffffffffffda RBX: 00007f6b3e028c90 RCX: 0000000000458c29 [ 2631.711559][T17488] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 2631.719533][T17488] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2631.727502][T17488] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6b3e0296d4 [ 2631.735475][T17488] R13: 00000000004be3c9 R14: 00000000004d8690 R15: 0000000000000003 15:15:38 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x2) [ 2631.743467][T17492] CPU: 0 PID: 17492 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2631.751579][T17492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2631.761642][T17492] Call Trace: [ 2631.764967][T17492] dump_stack+0x172/0x1f0 [ 2631.769354][T17492] should_fail.cold+0xa/0x15 [ 2631.773995][T17492] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2631.780862][T17492] ? ___might_sleep+0x163/0x280 [ 2631.785737][T17492] __should_failslab+0x121/0x190 [ 2631.790681][T17492] should_failslab+0x9/0x14 [ 2631.792309][T17489] EXT4-fs (sda1): re-mounted. Opts: [ 2631.795189][T17492] __kmalloc+0x2dc/0x740 [ 2631.795208][T17492] ? refcount_inc_not_zero_checked+0x144/0x200 [ 2631.795228][T17492] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 2631.816659][T17492] ? security_prepare_creds+0x123/0x190 [ 2631.822238][T17492] security_prepare_creds+0x123/0x190 [ 2631.828061][T17492] prepare_creds+0x2f5/0x3f0 [ 2631.832927][T17492] ovl_fill_super+0xfc/0x3c56 [ 2631.837635][T17492] ? ovl_show_options+0x550/0x550 [ 2631.842664][T17492] ? up_write+0x1c/0x150 [ 2631.846944][T17492] ? sget_userns+0x105/0x560 [ 2631.851543][T17492] ? get_anon_bdev+0xc0/0xc0 [ 2631.856151][T17492] ? get_anon_bdev+0xc0/0xc0 [ 2631.860740][T17492] ? sget+0x114/0x150 [ 2631.864705][T17492] ? ovl_show_options+0x550/0x550 [ 2631.869710][T17492] mount_nodev+0x68/0x110 [ 2631.874023][T17492] ovl_mount+0x2d/0x40 [ 2631.878070][T17492] ? ovl_own_xattr_set+0x10/0x10 [ 2631.882989][T17492] legacy_get_tree+0xf2/0x200 [ 2631.887645][T17492] vfs_get_tree+0x123/0x450 [ 2631.892144][T17492] do_mount+0x1436/0x2c40 [ 2631.896466][T17492] ? copy_mount_string+0x40/0x40 [ 2631.901383][T17492] ? copy_mount_options+0x1ea/0x3a0 [ 2631.906669][T17492] ? copy_mount_options+0x1f0/0x3a0 [ 2631.912085][T17492] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2631.918311][T17492] ? copy_mount_options+0x280/0x3a0 [ 2631.923493][T17492] ksys_mount+0xdb/0x150 [ 2631.927718][T17492] __x64_sys_mount+0xbe/0x150 [ 2631.932376][T17492] do_syscall_64+0x103/0x610 [ 2631.936954][T17492] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2631.942823][T17492] RIP: 0033:0x458c29 [ 2631.946706][T17492] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2631.966395][T17492] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2631.975068][T17492] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2631.984645][T17492] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 15:15:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003fffffdfc0000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x10, r1, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:39 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x3) 15:15:39 executing program 4 (fault-call:4 fault-nth:60): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:39 executing program 3 (fault-call:0 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) [ 2631.992597][T17492] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2632.000548][T17492] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2632.008512][T17492] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)) [ 2632.060917][ T25] audit: type=1400 audit(1555341339.119:164): avc: denied { map } for pid=17519 comm="syz-executor.2" path="socket:[609322]" dev="sockfs" ino=609322 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=packet_socket permissive=1 [ 2632.170971][T17561] EXT4-fs (sda1): re-mounted. Opts: [ 2632.191900][T17560] FAULT_INJECTION: forcing a failure. [ 2632.191900][T17560] name failslab, interval 1, probability 0, space 0, times 0 [ 2632.239677][T17560] CPU: 0 PID: 17560 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2632.240907][T17572] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2632.247788][T17560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2632.247795][T17560] Call Trace: [ 2632.247821][T17560] dump_stack+0x172/0x1f0 [ 2632.247842][T17560] should_fail.cold+0xa/0x15 15:15:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4000, 0x0) bind$unix(r1, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) r2 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r2, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:39 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x4) [ 2632.247859][T17560] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2632.247876][T17560] ? ___might_sleep+0x163/0x280 [ 2632.247892][T17560] __should_failslab+0x121/0x190 [ 2632.247906][T17560] should_failslab+0x9/0x14 [ 2632.247918][T17560] kmem_cache_alloc+0x2b2/0x6f0 [ 2632.247934][T17560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2632.247948][T17560] ? __validate_process_creds+0x22d/0x380 [ 2632.247965][T17560] prepare_creds+0x3e/0x3f0 [ 2632.247982][T17560] ovl_fill_super+0xfc/0x3c56 [ 2632.248007][T17560] ? ovl_show_options+0x550/0x550 [ 2632.248018][T17560] ? up_write+0x1c/0x150 [ 2632.248035][T17560] ? sget_userns+0x105/0x560 [ 2632.248047][T17560] ? get_anon_bdev+0xc0/0xc0 [ 2632.248062][T17560] ? get_anon_bdev+0xc0/0xc0 [ 2632.248074][T17560] ? sget+0x114/0x150 [ 2632.248087][T17560] ? ovl_show_options+0x550/0x550 [ 2632.248100][T17560] mount_nodev+0x68/0x110 [ 2632.248127][T17560] ovl_mount+0x2d/0x40 [ 2632.248142][T17560] ? ovl_own_xattr_set+0x10/0x10 [ 2632.248158][T17560] legacy_get_tree+0xf2/0x200 [ 2632.248175][T17560] vfs_get_tree+0x123/0x450 [ 2632.264488][T17639] FAULT_INJECTION: forcing a failure. [ 2632.264488][T17639] name failslab, interval 1, probability 0, space 0, times 0 [ 2632.268141][T17560] do_mount+0x1436/0x2c40 [ 2632.268162][T17560] ? copy_mount_string+0x40/0x40 [ 2632.268184][T17560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2632.268195][T17560] ? copy_mount_options+0x280/0x3a0 [ 2632.268212][T17560] ksys_mount+0xdb/0x150 [ 2632.268231][T17560] __x64_sys_mount+0xbe/0x150 [ 2632.436381][T17560] do_syscall_64+0x103/0x610 [ 2632.441854][T17560] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2632.447744][T17560] RIP: 0033:0x458c29 [ 2632.451647][T17560] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2632.471511][T17560] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2632.479943][T17560] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2632.487951][T17560] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2632.496035][T17560] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2632.504114][T17560] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2632.512084][T17560] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 [ 2632.520259][T17639] CPU: 1 PID: 17639 Comm: syz-executor.3 Not tainted 5.1.0-rc5 #68 [ 2632.528178][T17639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 15:15:39 executing program 4 (fault-call:4 fault-nth:61): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2632.538435][T17639] Call Trace: [ 2632.541730][T17639] dump_stack+0x172/0x1f0 [ 2632.546066][T17639] should_fail.cold+0xa/0x15 [ 2632.550918][T17639] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2632.556728][T17639] ? ___might_sleep+0x163/0x280 [ 2632.561570][T17639] __should_failslab+0x121/0x190 [ 2632.566604][T17639] should_failslab+0x9/0x14 [ 2632.571122][T17639] kmem_cache_alloc+0x2b2/0x6f0 [ 2632.575969][T17639] ? __d_lookup+0x433/0x760 [ 2632.580552][T17639] ? lookup_dcache+0x23/0x140 [ 2632.585227][T17639] ? d_lookup+0xf9/0x260 [ 2632.589454][T17639] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2632.594722][T17639] __d_alloc+0x2e/0x8c0 [ 2632.599074][T17639] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2632.604816][T17639] d_alloc+0x4d/0x2b0 [ 2632.608782][T17639] __lookup_hash+0xcd/0x190 [ 2632.613267][T17639] filename_create+0x1a7/0x4f0 [ 2632.618037][T17639] ? kern_path_mountpoint+0x40/0x40 [ 2632.623223][T17639] ? strncpy_from_user+0x2a8/0x380 [ 2632.628409][T17639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2632.634648][T17639] ? getname_flags+0x277/0x5b0 [ 2632.639408][T17639] do_mkdirat+0xb5/0x2a0 [ 2632.643664][T17639] ? __ia32_sys_mknod+0xb0/0xb0 [ 2632.648940][T17639] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2632.654393][T17639] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2632.660457][T17639] ? do_syscall_64+0x26/0x610 [ 2632.665137][T17639] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2632.670498][T17639] __x64_sys_mkdir+0x5c/0x80 [ 2632.675762][T17639] do_syscall_64+0x103/0x610 [ 2632.680394][T17639] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2632.686378][T17639] RIP: 0033:0x458c29 [ 2632.690375][T17639] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2632.709992][T17639] RSP: 002b:00007f6b3e028c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2632.718480][T17639] RAX: ffffffffffffffda RBX: 00007f6b3e028c90 RCX: 0000000000458c29 [ 2632.726531][T17639] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 15:15:39 executing program 3 (fault-call:0 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) [ 2632.734624][T17639] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2632.743026][T17639] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6b3e0296d4 [ 2632.750985][T17639] R13: 00000000004be3c9 R14: 00000000004d8690 R15: 0000000000000003 15:15:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)) [ 2632.867726][T17653] FAULT_INJECTION: forcing a failure. [ 2632.867726][T17653] name failslab, interval 1, probability 0, space 0, times 0 [ 2632.894836][T17572] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:40 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x5) [ 2632.928251][T17652] FAULT_INJECTION: forcing a failure. [ 2632.928251][T17652] name failslab, interval 1, probability 0, space 0, times 0 [ 2632.971741][T17653] CPU: 1 PID: 17653 Comm: syz-executor.3 Not tainted 5.1.0-rc5 #68 [ 2632.981173][T17653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2632.991248][T17653] Call Trace: [ 2632.994556][T17653] dump_stack+0x172/0x1f0 [ 2632.999512][T17653] should_fail.cold+0xa/0x15 [ 2633.004199][T17653] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2633.010884][T17653] ? ___might_sleep+0x163/0x280 [ 2633.015744][T17653] __should_failslab+0x121/0x190 [ 2633.020765][T17653] ? ratelimit_state_init+0xb0/0xb0 [ 2633.026048][T17653] should_failslab+0x9/0x14 [ 2633.030561][T17653] kmem_cache_alloc+0x2b2/0x6f0 [ 2633.036629][T17653] ? ratelimit_state_init+0xb0/0xb0 [ 2633.043034][T17653] ext4_alloc_inode+0x1f/0x640 [ 2633.049406][T17653] ? ratelimit_state_init+0xb0/0xb0 [ 2633.054908][T17653] alloc_inode+0x66/0x190 [ 2633.059324][T17653] new_inode_pseudo+0x19/0xf0 [ 2633.065043][T17653] new_inode+0x1f/0x40 [ 2633.069129][T17653] __ext4_new_inode+0x37e/0x5450 [ 2633.074085][T17653] ? avc_has_perm+0x404/0x610 [ 2633.078843][T17653] ? ext4_free_inode+0x1450/0x1450 [ 2633.083956][T17653] ? dqget+0x10d0/0x10d0 [ 2633.088218][T17653] ? selinux_determine_inode_label+0x1b1/0x390 [ 2633.095906][T17653] ext4_mkdir+0x3d5/0xdf0 [ 2633.100421][T17653] ? ext4_init_dot_dotdot+0x520/0x520 [ 2633.105810][T17653] ? selinux_inode_mkdir+0x23/0x30 [ 2633.110970][T17653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2633.117243][T17653] ? security_inode_mkdir+0xee/0x120 [ 2633.122537][T17653] vfs_mkdir+0x433/0x690 [ 2633.126794][T17653] do_mkdirat+0x234/0x2a0 [ 2633.131297][T17653] ? __ia32_sys_mknod+0xb0/0xb0 [ 2633.136149][T17653] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2633.141604][T17653] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2633.147756][T17653] ? do_syscall_64+0x26/0x610 [ 2633.152647][T17653] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2633.157930][T17653] __x64_sys_mkdir+0x5c/0x80 [ 2633.162514][T17653] do_syscall_64+0x103/0x610 [ 2633.167147][T17653] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2633.173038][T17653] RIP: 0033:0x458c29 [ 2633.176935][T17653] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2633.197314][T17653] RSP: 002b:00007f6b3e028c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2633.205984][T17653] RAX: ffffffffffffffda RBX: 00007f6b3e028c90 RCX: 0000000000458c29 [ 2633.214034][T17653] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 2633.222012][T17653] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2633.229977][T17653] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6b3e0296d4 [ 2633.238001][T17653] R13: 00000000004be3c9 R14: 00000000004d8690 R15: 0000000000000003 [ 2633.280278][T17665] EXT4-fs (sda1): re-mounted. Opts: [ 2633.299078][T17652] CPU: 1 PID: 17652 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2633.307285][T17652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2633.317393][T17652] Call Trace: [ 2633.320871][T17652] dump_stack+0x172/0x1f0 [ 2633.325211][T17652] should_fail.cold+0xa/0x15 [ 2633.330320][T17652] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2633.336164][T17652] ? ___might_sleep+0x163/0x280 [ 2633.341016][T17652] __should_failslab+0x121/0x190 [ 2633.346098][T17652] should_failslab+0x9/0x14 [ 2633.350646][T17652] __kmalloc_track_caller+0x2d8/0x740 [ 2633.356249][T17652] ? match_strdup+0x57/0x80 [ 2633.360908][T17652] kmemdup_nul+0x31/0xa0 [ 2633.365359][T17652] match_strdup+0x57/0x80 [ 2633.369773][T17652] ovl_fill_super+0xb9c/0x3c56 [ 2633.374541][T17652] ? ovl_show_options+0x550/0x550 [ 2633.379695][T17652] ? up_write+0x1c/0x150 [ 2633.383937][T17652] ? sget_userns+0x105/0x560 [ 2633.388569][T17652] ? get_anon_bdev+0xc0/0xc0 [ 2633.393186][T17652] ? sget+0x114/0x150 [ 2633.397196][T17652] ? ovl_show_options+0x550/0x550 [ 2633.402215][T17652] mount_nodev+0x68/0x110 [ 2633.406640][T17652] ovl_mount+0x2d/0x40 [ 2633.413649][T17652] ? ovl_own_xattr_set+0x10/0x10 [ 2633.418817][T17652] legacy_get_tree+0xf2/0x200 [ 2633.423530][T17652] vfs_get_tree+0x123/0x450 [ 2633.428026][T17652] do_mount+0x1436/0x2c40 [ 2633.432522][T17652] ? copy_mount_string+0x40/0x40 [ 2633.437541][T17652] ? _copy_from_user+0xdd/0x150 [ 2633.442383][T17652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2633.448611][T17652] ? copy_mount_options+0x280/0x3a0 [ 2633.453818][T17652] ksys_mount+0xdb/0x150 [ 2633.458087][T17652] __x64_sys_mount+0xbe/0x150 [ 2633.462755][T17652] do_syscall_64+0x103/0x610 [ 2633.467672][T17652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2633.474004][T17652] RIP: 0033:0x458c29 [ 2633.478019][T17652] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2633.497662][T17652] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2633.506150][T17652] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2633.514554][T17652] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2633.522643][T17652] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2633.530873][T17652] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2633.540005][T17652] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003fffffdfd0000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x31, 0xffffffffffffffff, 0x1000000000000000) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:40 executing program 3 (fault-call:0 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 15:15:40 executing program 4 (fault-call:4 fault-nth:62): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:40 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x7) 15:15:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 2633.718894][T17774] FAULT_INJECTION: forcing a failure. [ 2633.718894][T17774] name failslab, interval 1, probability 0, space 0, times 0 [ 2633.734049][T17774] CPU: 0 PID: 17774 Comm: syz-executor.3 Not tainted 5.1.0-rc5 #68 [ 2633.743691][T17774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2633.754455][T17774] Call Trace: [ 2633.754483][T17774] dump_stack+0x172/0x1f0 [ 2633.754502][T17774] should_fail.cold+0xa/0x15 [ 2633.754520][T17774] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2633.754542][T17774] ? ___might_sleep+0x163/0x280 [ 2633.754561][T17774] __should_failslab+0x121/0x190 [ 2633.762804][T17774] should_failslab+0x9/0x14 [ 2633.762822][T17774] kmem_cache_alloc+0x2b2/0x6f0 [ 2633.762837][T17774] ? __put_user_ns+0x70/0x70 [ 2633.762852][T17774] ? rcu_read_lock_sched_held+0x110/0x130 [ 2633.762873][T17774] security_inode_alloc+0x39/0x160 [ 2633.762888][T17774] inode_init_always+0x56e/0xb50 [ 2633.762902][T17774] alloc_inode+0x83/0x190 [ 2633.762916][T17774] new_inode_pseudo+0x19/0xf0 [ 2633.762931][T17774] new_inode+0x1f/0x40 [ 2633.762950][T17774] __ext4_new_inode+0x37e/0x5450 [ 2633.780459][T17776] FAULT_INJECTION: forcing a failure. [ 2633.780459][T17776] name failslab, interval 1, probability 0, space 0, times 0 [ 2633.783665][T17774] ? avc_has_perm+0x404/0x610 [ 2633.783686][T17774] ? ext4_free_inode+0x1450/0x1450 [ 2633.783706][T17774] ? dqget+0x10d0/0x10d0 [ 2633.783725][T17774] ? selinux_determine_inode_label+0x1b1/0x390 [ 2633.783745][T17774] ext4_mkdir+0x3d5/0xdf0 15:15:40 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0xa) [ 2633.783769][T17774] ? ext4_init_dot_dotdot+0x520/0x520 [ 2633.783793][T17774] ? selinux_inode_mkdir+0x23/0x30 [ 2633.880305][T17774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2633.886570][T17774] ? security_inode_mkdir+0xee/0x120 [ 2633.891877][T17774] vfs_mkdir+0x433/0x690 [ 2633.896150][T17774] do_mkdirat+0x234/0x2a0 [ 2633.900801][T17774] ? __ia32_sys_mknod+0xb0/0xb0 [ 2633.905749][T17774] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2633.905767][T17774] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2633.905779][T17774] ? do_syscall_64+0x26/0x610 [ 2633.905798][T17774] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2633.917741][T17774] __x64_sys_mkdir+0x5c/0x80 [ 2633.917755][T17774] do_syscall_64+0x103/0x610 [ 2633.917771][T17774] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2633.917780][T17774] RIP: 0033:0x458c29 [ 2633.917795][T17774] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:15:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x40, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r3, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x4e22, 0xfffffffffffffffe, @empty, 0x7}, @in6={0xa, 0x4e22, 0x6, @ipv4={[], [], @multicast1}, 0x46ae}], 0x38) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback={0xff00000000000000}}], 0x1c) write$P9_RSYMLINK(r1, &(0x7f0000000140)={0x14, 0x11, 0x2, {0x1, 0x0, 0x2}}, 0x14) getsockname(r2, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2633.917802][T17774] RSP: 002b:00007f6b3e028c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2633.917815][T17774] RAX: ffffffffffffffda RBX: 00007f6b3e028c90 RCX: 0000000000458c29 [ 2633.917822][T17774] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 2633.917830][T17774] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2633.917839][T17774] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6b3e0296d4 [ 2633.917847][T17774] R13: 00000000004be3c9 R14: 00000000004d8690 R15: 0000000000000003 [ 2634.006661][T17776] CPU: 0 PID: 17776 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2634.027774][T17776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2634.038801][T17776] Call Trace: [ 2634.042378][T17776] dump_stack+0x172/0x1f0 [ 2634.042398][T17776] should_fail.cold+0xa/0x15 [ 2634.042414][T17776] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2634.042433][T17776] ? ___might_sleep+0x163/0x280 [ 2634.042451][T17776] __should_failslab+0x121/0x190 [ 2634.042465][T17776] should_failslab+0x9/0x14 [ 2634.042478][T17776] __kmalloc_track_caller+0x2d8/0x740 [ 2634.042493][T17776] ? match_strdup+0x57/0x80 [ 2634.042511][T17776] kmemdup_nul+0x31/0xa0 [ 2634.042522][T17776] match_strdup+0x57/0x80 [ 2634.042537][T17776] ovl_fill_super+0xa74/0x3c56 [ 2634.042565][T17776] ? ovl_show_options+0x550/0x550 [ 2634.042576][T17776] ? up_write+0x1c/0x150 [ 2634.042594][T17776] ? sget_userns+0x105/0x560 [ 2634.042610][T17776] ? get_anon_bdev+0xc0/0xc0 [ 2634.042620][T17776] ? sget+0x114/0x150 [ 2634.042638][T17776] ? ovl_show_options+0x550/0x550 [ 2634.053649][T17776] mount_nodev+0x68/0x110 [ 2634.053666][T17776] ovl_mount+0x2d/0x40 [ 2634.053679][T17776] ? ovl_own_xattr_set+0x10/0x10 [ 2634.053694][T17776] legacy_get_tree+0xf2/0x200 [ 2634.053710][T17776] vfs_get_tree+0x123/0x450 [ 2634.053726][T17776] do_mount+0x1436/0x2c40 [ 2634.053745][T17776] ? copy_mount_string+0x40/0x40 [ 2634.082361][T17776] ? _copy_from_user+0xdd/0x150 15:15:41 executing program 3 (fault-call:0 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 15:15:41 executing program 4 (fault-call:4 fault-nth:63): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:41 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0xe) [ 2634.082382][T17776] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2634.082395][T17776] ? copy_mount_options+0x280/0x3a0 [ 2634.082411][T17776] ksys_mount+0xdb/0x150 [ 2634.082425][T17776] __x64_sys_mount+0xbe/0x150 [ 2634.082442][T17776] do_syscall_64+0x103/0x610 [ 2634.082460][T17776] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2634.082472][T17776] RIP: 0033:0x458c29 [ 2634.082487][T17776] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2634.082494][T17776] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2634.082509][T17776] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 [ 2634.082516][T17776] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2634.082530][T17776] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2634.088395][T17888] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 2634.091313][T17776] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2634.091322][T17776] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:41 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x800, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000140)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0xfffffffffffffe69) write$eventfd(r0, &(0x7f0000000180), 0x8) dup(r2) close(r2) [ 2634.387647][T17889] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2634.430455][T18011] FAULT_INJECTION: forcing a failure. [ 2634.430455][T18011] name failslab, interval 1, probability 0, space 0, times 0 [ 2634.473870][T18001] FAULT_INJECTION: forcing a failure. [ 2634.473870][T18001] name failslab, interval 1, probability 0, space 0, times 0 [ 2634.493398][T18011] CPU: 1 PID: 18011 Comm: syz-executor.3 Not tainted 5.1.0-rc5 #68 [ 2634.502939][T18011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2634.513092][T18011] Call Trace: [ 2634.516409][T18011] dump_stack+0x172/0x1f0 [ 2634.520761][T18011] should_fail.cold+0xa/0x15 [ 2634.526231][T18011] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2634.532139][T18011] ? ___might_sleep+0x163/0x280 [ 2634.537109][T18011] __should_failslab+0x121/0x190 [ 2634.542241][T18011] should_failslab+0x9/0x14 [ 2634.547150][T18011] __kmalloc+0x2dc/0x740 [ 2634.552114][T18011] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2634.558690][T18011] ? ext4_xattr_block_set+0x712/0x2fb0 [ 2634.558710][T18011] ext4_xattr_block_set+0x712/0x2fb0 [ 2634.558732][T18011] ? __might_sleep+0x95/0x190 [ 2634.558756][T18011] ? ext4_xattr_ibody_set+0x2b0/0x2b0 [ 2634.558771][T18011] ? ___might_sleep+0x163/0x280 [ 2634.558786][T18011] ? __might_sleep+0x95/0x190 [ 2634.558806][T18011] ? __ext4_journal_get_write_access+0x70/0xa0 [ 2634.558819][T18011] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2634.558831][T18011] ? ext4_xattr_block_find.isra.0+0x65/0x6c0 [ 2634.558845][T18011] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2634.558858][T18011] ? ext4_xattr_ibody_set+0x1d9/0x2b0 [ 2634.558875][T18011] ext4_xattr_set_handle+0xa35/0x1010 [ 2634.558896][T18011] ? ext4_xattr_ibody_inline_set+0x2b0/0x2b0 [ 2634.558909][T18011] ? kasan_check_write+0x14/0x20 [ 2634.558924][T18011] ? do_raw_read_unlock+0x3f/0x70 [ 2634.558943][T18011] ? security_sid_to_context_core.isra.0+0x176/0x390 [ 2634.558982][T18011] ? security_sid_to_context_force+0x3a/0x50 [ 2634.559006][T18011] ? selinux_inode_create+0x30/0x30 [ 2634.559018][T18011] ? lock_downgrade+0x880/0x880 [ 2634.559036][T18011] ext4_initxattrs+0xc0/0x130 [ 2634.559059][T18011] security_inode_init_security+0x2d1/0x3c0 [ 2634.559073][T18011] ? ext4_init_acl+0x290/0x290 [ 2634.559092][T18011] ? security_skb_classify_flow+0xc0/0xc0 [ 2634.559105][T18011] ? posix_acl_create+0x11a/0x430 [ 2634.559117][T18011] ? lock_downgrade+0x880/0x880 [ 2634.559139][T18011] ? ext4_set_acl+0x4f0/0x4f0 [ 2634.559155][T18011] ? _raw_spin_unlock+0x2d/0x50 [ 2634.559175][T18011] ext4_init_security+0x34/0x40 [ 2634.559191][T18011] __ext4_new_inode+0x44b7/0x5450 [ 2634.559218][T18011] ? ext4_free_inode+0x1450/0x1450 [ 2634.559237][T18011] ? dqget+0x10d0/0x10d0 [ 2634.559258][T18011] ? selinux_determine_inode_label+0x1b1/0x390 [ 2634.748240][T18011] ext4_mkdir+0x3d5/0xdf0 [ 2634.752907][T18011] ? ext4_init_dot_dotdot+0x520/0x520 [ 2634.758678][T18011] ? selinux_inode_mkdir+0x23/0x30 [ 2634.764176][T18011] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2634.770421][T18011] ? security_inode_mkdir+0xee/0x120 [ 2634.775723][T18011] vfs_mkdir+0x433/0x690 [ 2634.779991][T18011] do_mkdirat+0x234/0x2a0 [ 2634.784338][T18011] ? __ia32_sys_mknod+0xb0/0xb0 [ 2634.789205][T18011] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2634.795375][T18011] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2634.801532][T18011] ? do_syscall_64+0x26/0x610 [ 2634.806216][T18011] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2634.811523][T18011] __x64_sys_mkdir+0x5c/0x80 [ 2634.816124][T18011] do_syscall_64+0x103/0x610 [ 2634.821047][T18011] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2634.827032][T18011] RIP: 0033:0x458c29 [ 2634.830991][T18011] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2634.851853][T18011] RSP: 002b:00007f6b3e028c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2634.860550][T18011] RAX: ffffffffffffffda RBX: 00007f6b3e028c90 RCX: 0000000000458c29 [ 2634.868712][T18011] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 2634.876861][T18011] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2634.884992][T18011] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6b3e0296d4 [ 2634.893151][T18011] R13: 00000000004be3c9 R14: 00000000004d8690 R15: 0000000000000003 [ 2634.901148][T18001] CPU: 0 PID: 18001 Comm: syz-executor.4 Not tainted 5.1.0-rc5 #68 [ 2634.909164][T18001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2634.919409][T18001] Call Trace: [ 2634.922722][T18001] dump_stack+0x172/0x1f0 15:15:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003fffffffd0000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:42 executing program 1 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 15:15:42 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0xf) [ 2634.928357][T18001] should_fail.cold+0xa/0x15 [ 2634.933059][T18001] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2634.941866][T18001] ? ___might_sleep+0x163/0x280 [ 2634.947166][T18001] __should_failslab+0x121/0x190 [ 2634.952127][T18001] should_failslab+0x9/0x14 [ 2634.956670][T18001] __kmalloc_track_caller+0x2d8/0x740 [ 2634.962409][T18001] ? match_strdup+0x57/0x80 [ 2634.966929][T18001] kmemdup_nul+0x31/0xa0 [ 2634.966961][T18001] match_strdup+0x57/0x80 [ 2634.966979][T18001] ovl_fill_super+0xa74/0x3c56 [ 2634.967008][T18001] ? ovl_show_options+0x550/0x550 [ 2634.976177][T18001] ? up_write+0x1c/0x150 [ 2634.976202][T18001] ? sget_userns+0x105/0x560 [ 2634.976217][T18001] ? get_anon_bdev+0xc0/0xc0 [ 2634.976229][T18001] ? sget+0x114/0x150 [ 2634.976245][T18001] ? ovl_show_options+0x550/0x550 [ 2634.976259][T18001] mount_nodev+0x68/0x110 [ 2634.976274][T18001] ovl_mount+0x2d/0x40 [ 2634.976285][T18001] ? ovl_own_xattr_set+0x10/0x10 [ 2634.976305][T18001] legacy_get_tree+0xf2/0x200 [ 2635.017920][T18001] vfs_get_tree+0x123/0x450 [ 2635.017957][T18001] do_mount+0x1436/0x2c40 [ 2635.017977][T18001] ? copy_mount_string+0x40/0x40 [ 2635.017994][T18001] ? _copy_from_user+0xdd/0x150 [ 2635.018015][T18001] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2635.027707][T18001] ? copy_mount_options+0x280/0x3a0 [ 2635.027725][T18001] ksys_mount+0xdb/0x150 [ 2635.027741][T18001] __x64_sys_mount+0xbe/0x150 [ 2635.027760][T18001] do_syscall_64+0x103/0x610 [ 2635.027779][T18001] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2635.027790][T18001] RIP: 0033:0x458c29 [ 2635.027809][T18001] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2635.105436][T18001] RSP: 002b:00007f0149244c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2635.113904][T18001] RAX: ffffffffffffffda RBX: 00007f0149244c90 RCX: 0000000000458c29 15:15:42 executing program 3 (fault-call:0 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) [ 2635.122237][T18001] RDX: 0000000020000300 RSI: 0000000020000000 RDI: 0000000000400000 [ 2635.130654][T18001] RBP: 000000000073bf00 R08: 0000000020000c40 R09: 0000000000000000 [ 2635.138846][T18001] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f01492456d4 [ 2635.147595][T18001] R13: 00000000004c4c89 R14: 00000000004d8978 R15: 0000000000000004 15:15:42 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x11) [ 2635.194186][T18022] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2635.221255][T18132] FAULT_INJECTION: forcing a failure. [ 2635.221255][T18132] name failslab, interval 1, probability 0, space 0, times 0 15:15:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 2635.287402][T18132] CPU: 0 PID: 18132 Comm: syz-executor.3 Not tainted 5.1.0-rc5 #68 [ 2635.295445][T18132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2635.306747][T18132] Call Trace: [ 2635.306774][T18132] dump_stack+0x172/0x1f0 [ 2635.306796][T18132] should_fail.cold+0xa/0x15 [ 2635.306812][T18132] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2635.306831][T18132] ? ___might_sleep+0x163/0x280 [ 2635.306847][T18132] __should_failslab+0x121/0x190 [ 2635.306862][T18132] should_failslab+0x9/0x14 [ 2635.306877][T18132] __kmalloc+0x2dc/0x740 [ 2635.306896][T18132] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2635.306909][T18132] ? ext4_xattr_block_set+0x712/0x2fb0 [ 2635.306949][T18132] ext4_xattr_block_set+0x712/0x2fb0 [ 2635.325601][T18132] ? __might_sleep+0x95/0x190 [ 2635.325631][T18132] ? ext4_xattr_ibody_set+0x2b0/0x2b0 [ 2635.325645][T18132] ? ___might_sleep+0x163/0x280 [ 2635.325661][T18132] ? __might_sleep+0x95/0x190 15:15:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2635.325682][T18132] ? __ext4_journal_get_write_access+0x70/0xa0 [ 2635.325696][T18132] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2635.325709][T18132] ? ext4_xattr_block_find.isra.0+0x65/0x6c0 [ 2635.325721][T18132] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2635.325735][T18132] ? ext4_xattr_ibody_set+0x1d9/0x2b0 [ 2635.325750][T18132] ext4_xattr_set_handle+0xa35/0x1010 [ 2635.325772][T18132] ? ext4_xattr_ibody_inline_set+0x2b0/0x2b0 [ 2635.325792][T18132] ? kasan_check_write+0x14/0x20 [ 2635.433053][T18132] ? do_raw_read_unlock+0x3f/0x70 15:15:42 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x60) [ 2635.433072][T18132] ? security_sid_to_context_core.isra.0+0x176/0x390 [ 2635.433091][T18132] ? security_sid_to_context_force+0x3a/0x50 [ 2635.433114][T18132] ? selinux_inode_create+0x30/0x30 [ 2635.433125][T18132] ? lock_downgrade+0x880/0x880 [ 2635.433142][T18132] ext4_initxattrs+0xc0/0x130 [ 2635.433162][T18132] security_inode_init_security+0x2d1/0x3c0 [ 2635.433181][T18132] ? ext4_init_acl+0x290/0x290 [ 2635.433200][T18132] ? security_skb_classify_flow+0xc0/0xc0 [ 2635.444885][T18132] ? posix_acl_create+0x11a/0x430 15:15:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/sequencer2\x00', 0x200000, 0x0) ioctl$UI_SET_PHYS(r2, 0x4008556c, &(0x7f0000000500)='syz1\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) fcntl$setsig(r0, 0xa, 0x6) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x2100, 0x0) r3 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x1ff, 0x100) mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000001, 0x8050, r3, 0x0) fstat(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r3, &(0x7f0000000380)={0xa0, 0xfffffffffffffffe, 0x5, {{0x3, 0x1, 0xf38, 0x10001, 0x1000, 0x4, {0x4, 0x6, 0xff, 0x4, 0x5, 0x1f2, 0x8000000000000000, 0x6, 0x5, 0x80000000, 0x8, r4, r5, 0x8, 0xffff}}, {0x0, 0x2}}}, 0xa0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x802, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ashmem\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x100) [ 2635.444901][T18132] ? lock_downgrade+0x880/0x880 [ 2635.444941][T18132] ? ext4_set_acl+0x4f0/0x4f0 [ 2635.444956][T18132] ? _raw_spin_unlock+0x2d/0x50 [ 2635.444974][T18132] ext4_init_security+0x34/0x40 [ 2635.444990][T18132] __ext4_new_inode+0x44b7/0x5450 [ 2635.445019][T18132] ? ext4_free_inode+0x1450/0x1450 [ 2635.445038][T18132] ? dqget+0x10d0/0x10d0 [ 2635.452524][T18022] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2635.456562][T18132] ? selinux_determine_inode_label+0x1b1/0x390 15:15:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000180)=ANY=[@ANYBLOB="64656275675f77616e745f65787472615f6973697a653d307830303030303030303030303030b030302c00c29b4e8d60ab63d4dc593602cc0fd903732fc87ac915eef4dad8cf63861bf728e2182a3cda1cdfae8db5a1f7"]) [ 2635.456585][T18132] ext4_mkdir+0x3d5/0xdf0 [ 2635.456608][T18132] ? ext4_init_dot_dotdot+0x520/0x520 [ 2635.547292][T18132] ? selinux_inode_mkdir+0x23/0x30 [ 2635.552423][T18132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2635.558772][T18132] ? security_inode_mkdir+0xee/0x120 [ 2635.564177][T18132] vfs_mkdir+0x433/0x690 [ 2635.568443][T18132] do_mkdirat+0x234/0x2a0 [ 2635.572887][T18132] ? __ia32_sys_mknod+0xb0/0xb0 [ 2635.577787][T18132] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2635.583269][T18132] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2635.589446][T18132] ? do_syscall_64+0x26/0x610 [ 2635.594219][T18132] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2635.599684][T18132] __x64_sys_mkdir+0x5c/0x80 [ 2635.604279][T18132] do_syscall_64+0x103/0x610 [ 2635.608871][T18132] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2635.614831][T18132] RIP: 0033:0x458c29 [ 2635.618734][T18132] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2635.639008][T18132] RSP: 002b:00007f6b3e028c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2635.647432][T18132] RAX: ffffffffffffffda RBX: 00007f6b3e028c90 RCX: 0000000000458c29 [ 2635.655488][T18132] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 2635.663490][T18132] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2635.673978][T18132] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6b3e0296d4 15:15:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003fffffffe0000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:42 executing program 3 (fault-call:0 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) [ 2635.682548][T18132] R13: 00000000004be3c9 R14: 00000000004d8690 R15: 0000000000000003 15:15:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x0, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, &(0x7f0000000280)={0x0, 0x1, 0x2212}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/32], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00!\x00'/56], 0xa8) ioctl$VIDIOC_SUBDEV_G_SELECTION(r4, 0xc040563d, &(0x7f0000000200)={0x1, 0x0, 0x102, 0x7, {0x3f, 0x8000, 0x40, 0x2}}) unlinkat(r3, &(0x7f00000000c0)='./file0\x00', 0x200) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2635.839222][T18359] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize=0x0000000000000°00" or missing value [ 2635.861316][T18364] FAULT_INJECTION: forcing a failure. [ 2635.861316][T18364] name failslab, interval 1, probability 0, space 0, times 0 15:15:43 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x1f4) [ 2635.890918][T18363] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x100000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2635.945957][T18364] CPU: 0 PID: 18364 Comm: syz-executor.3 Not tainted 5.1.0-rc5 #68 [ 2635.953930][T18364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2635.964099][T18364] Call Trace: [ 2635.967520][T18364] dump_stack+0x172/0x1f0 [ 2635.971966][T18364] should_fail.cold+0xa/0x15 [ 2635.976693][T18364] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2635.982711][T18364] ? ___might_sleep+0x163/0x280 [ 2635.987764][T18364] __should_failslab+0x121/0x190 15:15:43 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x22a) [ 2635.992848][T18364] should_failslab+0x9/0x14 [ 2635.997482][T18364] __kmalloc+0x2dc/0x740 [ 2636.001758][T18364] ? ext4_find_extent+0x76e/0x9d0 [ 2636.006847][T18364] ext4_find_extent+0x76e/0x9d0 [ 2636.011834][T18364] ext4_ext_map_blocks+0x1c3/0x5260 [ 2636.017257][T18364] ? ext4_ext_release+0x10/0x10 [ 2636.022412][T18364] ? lock_acquire+0x16f/0x3f0 [ 2636.027181][T18364] ? ext4_map_blocks+0x3fd/0x18e0 [ 2636.032243][T18364] ext4_map_blocks+0xec7/0x18e0 [ 2636.037117][T18364] ? ext4_issue_zeroout+0x190/0x190 [ 2636.042380][T18364] ? kasan_check_write+0x14/0x20 [ 2636.047325][T18364] ? __brelse+0x95/0xb0 [ 2636.051495][T18364] ext4_getblk+0xc4/0x510 [ 2636.055822][T18364] ? ext4_iomap_begin+0xfe0/0xfe0 [ 2636.060849][T18364] ? ext4_free_inode+0x1450/0x1450 [ 2636.066073][T18364] ext4_bread+0x8f/0x230 [ 2636.070458][T18364] ? ext4_getblk+0x510/0x510 [ 2636.075216][T18364] ext4_append+0x155/0x370 [ 2636.079633][T18364] ext4_mkdir+0x61b/0xdf0 [ 2636.084009][T18364] ? ext4_init_dot_dotdot+0x520/0x520 [ 2636.089647][T18364] ? selinux_inode_mkdir+0x23/0x30 [ 2636.094830][T18364] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2636.101073][T18364] ? security_inode_mkdir+0xee/0x120 [ 2636.107626][T18364] vfs_mkdir+0x433/0x690 [ 2636.111895][T18364] do_mkdirat+0x234/0x2a0 [ 2636.116340][T18364] ? __ia32_sys_mknod+0xb0/0xb0 [ 2636.121476][T18364] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2636.126990][T18364] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2636.133209][T18364] ? do_syscall_64+0x26/0x610 [ 2636.137984][T18364] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2636.144877][T18364] __x64_sys_mkdir+0x5c/0x80 [ 2636.149471][T18364] do_syscall_64+0x103/0x610 [ 2636.154385][T18364] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2636.160287][T18364] RIP: 0033:0x458c29 [ 2636.164455][T18364] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2636.185137][T18364] RSP: 002b:00007f6b3e028c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 15:15:43 executing program 3 (fault-call:0 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) [ 2636.193920][T18364] RAX: ffffffffffffffda RBX: 00007f6b3e028c90 RCX: 0000000000458c29 [ 2636.203748][T18364] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 2636.211727][T18364] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2636.219788][T18364] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6b3e0296d4 [ 2636.227759][T18364] R13: 00000000004be3c9 R14: 00000000004d8690 R15: 0000000000000003 15:15:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0xa080, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r1, 0x118, 0x0, &(0x7f00000000c0), 0x4) r2 = socket$packet(0x11, 0x80000000000a, 0x300) pread64(r0, &(0x7f0000000100)=""/59, 0x3b, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r2, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2636.289535][T18363] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:43 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x300) [ 2636.360739][T18395] FAULT_INJECTION: forcing a failure. [ 2636.360739][T18395] name failslab, interval 1, probability 0, space 0, times 0 [ 2636.374281][T18395] CPU: 0 PID: 18395 Comm: syz-executor.3 Not tainted 5.1.0-rc5 #68 [ 2636.382340][T18395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2636.392615][T18395] Call Trace: [ 2636.396029][T18395] dump_stack+0x172/0x1f0 [ 2636.400399][T18395] should_fail.cold+0xa/0x15 [ 2636.405019][T18395] ? fault_create_debugfs_attr+0x1e0/0x1e0 15:15:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x400, 0x0) getsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000140), &(0x7f0000000180)=0x4) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 2636.410880][T18395] ? __es_tree_search.isra.0+0x1bf/0x230 [ 2636.416553][T18395] __should_failslab+0x121/0x190 [ 2636.421519][T18395] should_failslab+0x9/0x14 [ 2636.426069][T18395] kmem_cache_alloc+0x47/0x6f0 [ 2636.430890][T18395] ? ext4_es_scan+0x730/0x730 [ 2636.435585][T18395] ? do_raw_write_lock+0x124/0x290 [ 2636.440806][T18395] __es_insert_extent+0x2cc/0xf20 [ 2636.445919][T18395] ext4_es_insert_extent+0x2b7/0xa40 [ 2636.451349][T18395] ? ext4_es_scan_clu+0x50/0x50 [ 2636.456206][T18395] ? rcu_read_lock_sched_held+0x110/0x130 [ 2636.462307][T18395] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2636.468554][T18395] ? ext4_es_find_extent_range+0xff/0x600 [ 2636.474377][T18395] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 2636.480154][T18395] ? ext4_rereserve_cluster+0x240/0x240 [ 2636.485778][T18395] ? ext4_find_extent+0x76e/0x9d0 [ 2636.490810][T18395] ? ext4_find_extent+0x6a6/0x9d0 [ 2636.495994][T18395] ext4_ext_map_blocks+0x20a8/0x5260 [ 2636.501296][T18395] ? ext4_ext_release+0x10/0x10 [ 2636.506173][T18395] ? lock_acquire+0x16f/0x3f0 [ 2636.510878][T18395] ? ext4_map_blocks+0x3fd/0x18e0 [ 2636.516082][T18395] ext4_map_blocks+0xec7/0x18e0 [ 2636.521159][T18395] ? ext4_issue_zeroout+0x190/0x190 [ 2636.526424][T18395] ? kasan_check_write+0x14/0x20 [ 2636.531447][T18395] ? __brelse+0x95/0xb0 [ 2636.535617][T18395] ext4_getblk+0xc4/0x510 [ 2636.540044][T18395] ? ext4_iomap_begin+0xfe0/0xfe0 [ 2636.545128][T18395] ? ext4_free_inode+0x1450/0x1450 [ 2636.550259][T18395] ext4_bread+0x8f/0x230 [ 2636.554526][T18395] ? ext4_getblk+0x510/0x510 [ 2636.559366][T18395] ext4_append+0x155/0x370 [ 2636.563797][T18395] ext4_mkdir+0x61b/0xdf0 [ 2636.568153][T18395] ? ext4_init_dot_dotdot+0x520/0x520 [ 2636.573620][T18395] ? selinux_inode_mkdir+0x23/0x30 [ 2636.578750][T18395] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2636.584987][T18395] ? security_inode_mkdir+0xee/0x120 [ 2636.590590][T18395] vfs_mkdir+0x433/0x690 [ 2636.594942][T18395] do_mkdirat+0x234/0x2a0 [ 2636.599629][T18395] ? __ia32_sys_mknod+0xb0/0xb0 [ 2636.604490][T18395] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2636.609998][T18395] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2636.616245][T18395] ? do_syscall_64+0x26/0x610 [ 2636.621023][T18395] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2636.626312][T18395] __x64_sys_mkdir+0x5c/0x80 [ 2636.631082][T18395] do_syscall_64+0x103/0x610 [ 2636.635761][T18395] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2636.641775][T18395] RIP: 0033:0x458c29 [ 2636.645789][T18395] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2636.666100][T18395] RSP: 002b:00007f6b3e028c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2636.674527][T18395] RAX: ffffffffffffffda RBX: 00007f6b3e028c90 RCX: 0000000000458c29 [ 2636.683733][T18395] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 2636.691722][T18395] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2636.699695][T18395] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6b3e0296d4 15:15:43 executing program 3 (fault-call:0 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) [ 2636.707750][T18395] R13: 00000000004be3c9 R14: 00000000004d8690 R15: 0000000000000003 15:15:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d19000300000fff0000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) [ 2636.768759][T18530] FAULT_INJECTION: forcing a failure. [ 2636.768759][T18530] name failslab, interval 1, probability 0, space 0, times 0 [ 2636.852675][T18595] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 2636.859697][T18530] CPU: 1 PID: 18530 Comm: syz-executor.3 Not tainted 5.1.0-rc5 #68 [ 2636.870030][T18530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2636.870037][T18530] Call Trace: [ 2636.870063][T18530] dump_stack+0x172/0x1f0 [ 2636.870085][T18530] should_fail.cold+0xa/0x15 [ 2636.870105][T18530] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2636.883476][T18530] ? ___might_sleep+0x163/0x280 [ 2636.883497][T18530] __should_failslab+0x121/0x190 [ 2636.883513][T18530] should_failslab+0x9/0x14 [ 2636.883525][T18530] kmem_cache_alloc+0x2b2/0x6f0 [ 2636.883545][T18530] ? rcu_read_lock_sched_held+0x110/0x130 [ 2636.891016][T18599] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2636.892854][T18530] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2636.892872][T18530] ? __mark_inode_dirty+0x241/0x1290 15:15:43 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in=@remote, @in6=@initdev}}, {{@in6=@initdev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x5d1200, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f00000f5000/0x5000)=nil, 0x5000, 0xc, 0x10, r2, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") connect$nfc_llcp(r2, &(0x7f00000001c0)={0x27, 0x0, 0x1, 0x4, 0x81, 0x6, "80c461edfa90a913e1e2c17728006a42c634a6b863627e91cd637f6a5335501586f4c9962c6a2e6a80945823b309ef7839e036a54345e3441269f476f03913", 0xd}, 0x60) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0505510, &(0x7f0000000140)={0x4, 0x2, 0xa0, 0x0, &(0x7f00000000c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r3, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:44 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x3e8) [ 2636.892892][T18530] ext4_mb_new_blocks+0x5a0/0x3c20 [ 2636.892906][T18530] ? mark_held_locks+0xa4/0xf0 [ 2636.892923][T18530] ? ext4_find_extent+0x76e/0x9d0 [ 2636.892949][T18530] ext4_ext_map_blocks+0x2b8a/0x5260 [ 2636.968414][T18530] ? ext4_ext_release+0x10/0x10 [ 2636.973269][T18530] ? find_held_lock+0x35/0x130 [ 2636.978382][T18530] ext4_map_blocks+0x8c5/0x18e0 [ 2636.983230][T18530] ? ext4_issue_zeroout+0x190/0x190 [ 2636.988776][T18530] ? kasan_check_write+0x14/0x20 [ 2636.993713][T18530] ? __brelse+0x95/0xb0 [ 2636.997877][T18530] ext4_getblk+0xc4/0x510 [ 2637.002290][T18530] ? ext4_iomap_begin+0xfe0/0xfe0 [ 2637.007363][T18530] ? ext4_free_inode+0x1450/0x1450 [ 2637.012663][T18530] ext4_bread+0x8f/0x230 [ 2637.017008][T18530] ? ext4_getblk+0x510/0x510 [ 2637.021693][T18530] ext4_append+0x155/0x370 [ 2637.026100][T18530] ext4_mkdir+0x61b/0xdf0 [ 2637.030428][T18530] ? ext4_init_dot_dotdot+0x520/0x520 [ 2637.035797][T18530] ? selinux_inode_mkdir+0x23/0x30 [ 2637.040924][T18530] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2637.047175][T18530] ? security_inode_mkdir+0xee/0x120 [ 2637.052463][T18530] vfs_mkdir+0x433/0x690 [ 2637.056743][T18530] do_mkdirat+0x234/0x2a0 [ 2637.061078][T18530] ? __ia32_sys_mknod+0xb0/0xb0 [ 2637.065925][T18530] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2637.071392][T18530] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2637.077456][T18530] ? do_syscall_64+0x26/0x610 [ 2637.082135][T18530] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2637.087512][T18530] __x64_sys_mkdir+0x5c/0x80 [ 2637.092098][T18530] do_syscall_64+0x103/0x610 [ 2637.097625][T18530] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2637.103605][T18530] RIP: 0033:0x458c29 [ 2637.107503][T18530] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2637.127478][T18530] RSP: 002b:00007f6b3e028c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2637.135884][T18530] RAX: ffffffffffffffda RBX: 00007f6b3e028c90 RCX: 0000000000458c29 [ 2637.143849][T18530] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 15:15:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x200000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:44 executing program 3 (fault-call:0 fault-nth:10): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) [ 2637.151833][T18530] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2637.159818][T18530] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6b3e0296d4 [ 2637.167913][T18530] R13: 00000000004be3c9 R14: 00000000004d8690 R15: 0000000000000003 15:15:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2637.292388][T18599] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2637.327034][T18661] FAULT_INJECTION: forcing a failure. [ 2637.327034][T18661] name failslab, interval 1, probability 0, space 0, times 0 15:15:44 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x500) [ 2637.339974][T18661] CPU: 1 PID: 18661 Comm: syz-executor.3 Not tainted 5.1.0-rc5 #68 [ 2637.347970][T18661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2637.358102][T18661] Call Trace: [ 2637.361599][T18661] dump_stack+0x172/0x1f0 [ 2637.365956][T18661] should_fail.cold+0xa/0x15 [ 2637.370579][T18661] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2637.376407][T18661] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2637.382237][T18661] ? __es_tree_search.isra.0+0x1bf/0x230 [ 2637.387890][T18661] __should_failslab+0x121/0x190 15:15:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getpeername$netrom(r0, &(0x7f0000000140)={{0x3, @rose}, [@rose, @null, @netrom, @rose, @null, @null, @netrom, @netrom]}, &(0x7f0000000080)=0x48) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x750, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@noload='noload'}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@nombcache='nombcache'}]}) [ 2637.387909][T18661] should_failslab+0x9/0x14 [ 2637.397352][T18661] kmem_cache_alloc+0x47/0x6f0 [ 2637.402217][T18661] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2637.408103][T18661] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 2637.413581][T18661] ? ext4_es_scan+0x730/0x730 [ 2637.418364][T18661] ? do_raw_write_lock+0x124/0x290 [ 2637.423487][T18661] __es_insert_extent+0x2cc/0xf20 [ 2637.423507][T18661] ext4_es_insert_extent+0x2b7/0xa40 [ 2637.423524][T18661] ? ext4_es_scan_clu+0x50/0x50 15:15:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400003, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2637.423555][T18661] ext4_map_blocks+0xb87/0x18e0 [ 2637.423576][T18661] ? ext4_issue_zeroout+0x190/0x190 [ 2637.423604][T18661] ? kasan_check_write+0x14/0x20 [ 2637.452034][T18727] overlayfs: filesystem on './file0' not supported as upperdir [ 2637.453846][T18661] ? __brelse+0x95/0xb0 [ 2637.453867][T18661] ext4_getblk+0xc4/0x510 [ 2637.453886][T18661] ? ext4_iomap_begin+0xfe0/0xfe0 [ 2637.453906][T18661] ? ext4_free_inode+0x1450/0x1450 [ 2637.453930][T18661] ext4_bread+0x8f/0x230 [ 2637.484592][T18661] ? ext4_getblk+0x510/0x510 [ 2637.489322][T18661] ext4_append+0x155/0x370 [ 2637.494733][T18661] ext4_mkdir+0x61b/0xdf0 [ 2637.499086][T18661] ? ext4_init_dot_dotdot+0x520/0x520 [ 2637.504760][T18661] ? selinux_inode_mkdir+0x23/0x30 [ 2637.509921][T18661] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2637.516538][T18661] ? security_inode_mkdir+0xee/0x120 [ 2637.521851][T18661] vfs_mkdir+0x433/0x690 [ 2637.526119][T18661] do_mkdirat+0x234/0x2a0 [ 2637.530472][T18661] ? __ia32_sys_mknod+0xb0/0xb0 [ 2637.535338][T18661] ? trace_hardirqs_on_thunk+0x1a/0x1c 15:15:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003f9fdffff0000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) [ 2637.540994][T18661] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2637.547165][T18661] ? do_syscall_64+0x26/0x610 [ 2637.551871][T18661] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2637.557187][T18661] __x64_sys_mkdir+0x5c/0x80 [ 2637.561869][T18661] do_syscall_64+0x103/0x610 [ 2637.566488][T18661] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2637.572417][T18661] RIP: 0033:0x458c29 [ 2637.576329][T18661] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2637.596560][T18661] RSP: 002b:00007f6b3e028c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2637.604989][T18661] RAX: ffffffffffffffda RBX: 00007f6b3e028c90 RCX: 0000000000458c29 [ 2637.612983][T18661] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 2637.620976][T18661] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2637.628956][T18661] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6b3e0296d4 15:15:44 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x700) [ 2637.628966][T18661] R13: 00000000004be3c9 R14: 00000000004d8690 R15: 0000000000000003 15:15:44 executing program 3 (fault-call:0 fault-nth:11): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) [ 2637.743103][T18734] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x40, 0x0) ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x1) r3 = open(&(0x7f00000002c0)='./file0\x00', 0x40001, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000300)=[@in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e22, 0x0, @mcast1, 0x5}, @in6={0xa, 0x4e21, 0x2, @mcast2, 0x1}, @in6={0xa, 0x4e22, 0x53ad, @local, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e23, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffffffffeff}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e21, 0x3, @remote, 0x2}], 0xcc) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2637.789485][T18850] overlayfs: filesystem on './file0' not supported as upperdir [ 2637.799032][T18817] EXT4-fs (sda1): can't enable nombcache during remount 15:15:44 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0xa00) 15:15:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400004, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2637.831976][T18854] FAULT_INJECTION: forcing a failure. [ 2637.831976][T18854] name failslab, interval 1, probability 0, space 0, times 0 [ 2637.859469][T18854] CPU: 0 PID: 18854 Comm: syz-executor.3 Not tainted 5.1.0-rc5 #68 [ 2637.867413][T18854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2637.877470][T18854] Call Trace: [ 2637.880883][T18854] dump_stack+0x172/0x1f0 [ 2637.885218][T18854] should_fail.cold+0xa/0x15 [ 2637.889966][T18854] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2637.895822][T18854] ? ___might_sleep+0x163/0x280 [ 2637.900900][T18854] __should_failslab+0x121/0x190 [ 2637.905965][T18854] should_failslab+0x9/0x14 [ 2637.910647][T18854] kmem_cache_alloc+0x2b2/0x6f0 [ 2637.915681][T18854] ? rcu_read_lock_sched_held+0x110/0x130 [ 2637.921562][T18854] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2637.927375][T18854] ? __mark_inode_dirty+0x241/0x1290 [ 2637.932669][T18854] ext4_mb_new_blocks+0x5a0/0x3c20 [ 2637.937801][T18854] ? mark_held_locks+0xa4/0xf0 [ 2637.949346][T18854] ? ext4_find_extent+0x76e/0x9d0 [ 2637.954375][T18854] ext4_ext_map_blocks+0x2b8a/0x5260 [ 2637.959704][T18854] ? ext4_ext_release+0x10/0x10 [ 2637.964556][T18854] ? find_held_lock+0x35/0x130 [ 2637.969328][T18854] ext4_map_blocks+0x8c5/0x18e0 [ 2637.974556][T18854] ? ext4_issue_zeroout+0x190/0x190 [ 2637.980071][T18854] ? kasan_check_write+0x14/0x20 [ 2637.988088][T18854] ? __brelse+0x95/0xb0 [ 2637.994675][T18854] ext4_getblk+0xc4/0x510 [ 2637.999962][T18854] ? ext4_iomap_begin+0xfe0/0xfe0 [ 2638.005078][T18854] ? ext4_free_inode+0x1450/0x1450 [ 2638.010207][T18854] ext4_bread+0x8f/0x230 [ 2638.014549][T18854] ? ext4_getblk+0x510/0x510 [ 2638.019257][T18854] ext4_append+0x155/0x370 [ 2638.023671][T18854] ext4_mkdir+0x61b/0xdf0 [ 2638.027999][T18854] ? ext4_init_dot_dotdot+0x520/0x520 [ 2638.033391][T18854] ? selinux_inode_mkdir+0x23/0x30 [ 2638.038497][T18854] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2638.044798][T18854] ? security_inode_mkdir+0xee/0x120 [ 2638.050172][T18854] vfs_mkdir+0x433/0x690 [ 2638.054415][T18854] do_mkdirat+0x234/0x2a0 [ 2638.058762][T18854] ? __ia32_sys_mknod+0xb0/0xb0 [ 2638.063611][T18854] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2638.069130][T18854] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2638.075204][T18854] ? do_syscall_64+0x26/0x610 [ 2638.079918][T18854] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2638.085295][T18854] __x64_sys_mkdir+0x5c/0x80 [ 2638.089925][T18854] do_syscall_64+0x103/0x610 [ 2638.094520][T18854] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2638.102450][T18854] RIP: 0033:0x458c29 [ 2638.106483][T18854] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2638.126607][T18854] RSP: 002b:00007f6b3e028c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2638.135425][T18854] RAX: ffffffffffffffda RBX: 00007f6b3e028c90 RCX: 0000000000458c29 [ 2638.143404][T18854] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 2638.151502][T18854] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2638.159563][T18854] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6b3e0296d4 [ 2638.167710][T18854] R13: 00000000004be3c9 R14: 00000000004d8690 R15: 0000000000000003 15:15:45 executing program 3 (fault-call:0 fault-nth:12): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) [ 2638.264209][T18734] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:45 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0xe00) 15:15:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000180)={[{@mode={'mode', 0x3d, 0x6}}], [{@pcr={'pcr', 0x3d, 0x29}}, {@obj_type={'obj_type', 0x3d, '+-:\\\xdc@'}}]}) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="64656275675f77616e745f65787472615f6973697a653d3078303030303030303c30303030303030022d00"]) [ 2638.357129][T18971] overlayfs: filesystem on './file0' not supported as upperdir 15:15:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 15:15:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003fcfdffff0000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400005, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:45 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0xf00) 15:15:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x2) 15:15:45 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2638.612977][T19085] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x3) 15:15:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x109000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x2, 0xfb1, 0x1}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000001c0)={r1, 0x6, 0x9}, &(0x7f0000000200)=0x8) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000240)={0x26e, 0x8, 0x3ff, 0x0, 0x1f, 0x3}) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000280)={0x8, 0x800}) 15:15:45 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x1100) [ 2638.690362][T19201] overlayfs: filesystem on './file0' not supported as upperdir 15:15:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2638.742993][T19085] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x7fffffff, 0x400000) accept4$inet(r0, &(0x7f0000000140)={0x2, 0x0, @initdev}, &(0x7f0000000180)=0x10, 0x80000) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) fsetxattr$security_capability(r0, &(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)=@v1={0x1000000, [{0x0, 0x6}]}, 0xc, 0x3) 15:15:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x4) 15:15:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x610001, 0x0) syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x7fff, 0xa000) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f00000000c0)={0x94c, 0x5, 0x4, 0x11000, {}, {0x1, 0xc, 0x4, 0x9, 0xfffffffffffffffb, 0xff, "fadda1e7"}, 0x8, 0x1, @offset=0x100000001, 0x4}) openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0xed0bb8c99e0ea066, 0x0) 15:15:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003fdfdffff0000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:45 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x2a02) 15:15:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x5) [ 2638.951597][T19325] overlayfs: filesystem on './file0' not supported as upperdir 15:15:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400007, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2639.020919][T19320] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 15:15:46 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x4000) 15:15:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x6) [ 2639.073028][T19396] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:46 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = socket$packet(0x11, 0x0, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0xa0080, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'bpq0\x00'}, 0x18) getsockname(r0, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='d{bug_want_extra_isize=0x0000000000000000,\x00']) 15:15:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x7) [ 2639.204063][T19396] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2639.230601][T19550] overlayfs: filesystem on './file0' not supported as upperdir 15:15:46 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x43ff) 15:15:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400008, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d1900037fffffff0000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0xc) [ 2639.398217][T19563] EXT4-fs (sda1): Unrecognized mount option "d{bug_want_extra_isize=0x0000000000000000" or missing value [ 2639.484627][T19647] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:46 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x6000) 15:15:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008916, &(0x7f0000000140)="319bd07000"/19) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x48000) getsockname$packet(r1, &(0x7f0000000100), &(0x7f0000000180)=0x14) r2 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r2, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0xd) [ 2639.529832][T19678] overlayfs: filesystem on './file0' not supported as upperdir 15:15:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400009, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d1900038cffffff0000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x10) 15:15:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [{@permit_directio='permit_directio'}, {@hash='hash'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@dont_measure='dont_measure'}]}) 15:15:46 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0xc3ff) [ 2639.828541][T19902] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2639.842463][T19904] overlayfs: filesystem on './file0' not supported as upperdir 15:15:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) fstat(r1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getegid() fstat(r0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000b40)={0x0, 0x0, 0x0}, &(0x7f0000000b80)=0xc) r17 = getgid() fsetxattr$system_posix_acl(r0, &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000bc0)={{}, {0x1, 0x4}, [{0x2, 0x5, r3}, {0x2, 0x3, r4}, {0x2, 0x6, r5}, {0x2, 0x1, r6}, {0x2, 0x4, r7}, {0x2, 0x1, r8}, {0x2, 0x2, r9}, {0x2, 0x0, r10}, {0x2, 0x3, r11}], {}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x0, r14}, {0x8, 0x2, r15}, {0x8, 0x2, r16}, {0x8, 0x4, r17}], {0x10, 0x2}, {0x20, 0x7}}, 0x9c, 0x3) symlinkat(&(0x7f0000000080)='./file0\x00', r2, &(0x7f0000000cc0)='./file0\x00') getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000c80)) 15:15:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x12) 15:15:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2639.916184][T19910] EXT4-fs (sda1): Unrecognized mount option "permit_directio" or missing value 15:15:47 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0xe803) 15:15:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x14) [ 2640.022883][T19902] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x20000, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x4) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f00000000c0)={0x8}, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000e6b000/0x3000)=nil, 0x3000, 0x1000002, 0x33, r0, 0x400000) getsockname(r2, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) openat$cgroup_int(r1, &(0x7f0000000100)='notify_on_release\x00', 0x2, 0x0) 15:15:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d19000397ffffff0000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:47 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0xf401) 15:15:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) sendto(r0, &(0x7f0000001900)="8fb6739291f7584ef51724f11fbb233a40927de2309aedc3560cfb12c79306d7f487b013826686f6f59210fb163264922c6d66b553a1e767fbf0d381e3b82bed2d83", 0x42, 0x4050, &(0x7f0000001980)=@x25={0x9, @remote={[], 0x0}}, 0x80) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="64656275675f77616e745f65787472615f6973697a653d3082d02d78303030303030303030303030303030"]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40000, 0x19) recvmsg$kcm(r1, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000000140)=""/136, 0x88}, {&(0x7f0000000200)=""/220, 0xdc}, {&(0x7f0000000300)=""/223, 0xdf}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/103, 0x67}, {&(0x7f0000001480)=""/74, 0x4a}, {&(0x7f0000001500)=""/167, 0xa7}, {&(0x7f00000015c0)=""/44, 0x2c}, {&(0x7f0000001600)=""/229, 0xe5}, {&(0x7f0000001700)=""/215, 0xd7}], 0xa}, 0x100) [ 2640.168764][T20021] overlayfs: filesystem on './file0' not supported as upperdir 15:15:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x28) 15:15:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x40000b, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2640.272430][T20038] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2640.355464][T20074] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize=0‚Ð-x000000000000000" or missing value 15:15:47 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0xff43) [ 2640.410991][T20038] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000080)=[{0x80000006, 0x0, 0x0, 0x3}]}, 0x10) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket(0x100000000000011, 0x3, 0x0) bind(r4, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x8001) sendfile(r3, r5, 0x0, 0x800000000024) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r6 = socket$packet(0x11, 0x80000000000a, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r6, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0xf0) [ 2640.472068][T20206] overlayfs: filesystem on './file0' not supported as upperdir 15:15:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003f0ffffff0000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:47 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0xffc3) 15:15:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x40000c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='debug_want_0000000000000000,\x00'/43]) 15:15:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x1e2) [ 2640.682463][T20275] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:47 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x34000) [ 2640.760381][T20284] overlayfs: filesystem on './file0' not supported as upperdir 15:15:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x40000d, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2640.811087][T20285] EXT4-fs (sda1): Unrecognized mount option "debug_want_0000000000000000" or missing value [ 2640.844315][T20275] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x300) 15:15:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x80000000000a, 0x300) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f0000000100)={0x3, r3, 0x1}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:48 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x40000) 15:15:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003f4ffffff0000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) [ 2641.066922][T20443] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x480) 15:15:48 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x400300) 15:15:48 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000000, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xb7, 0x20080) syz_mount_image$nfs(&(0x7f0000000200)='nfs\x00', &(0x7f0000000240)='./file0\x00', 0xce, 0x9, &(0x7f0000000740)=[{&(0x7f0000000280)="13c367088f9a53603ff4ac7d1a03f0df1168b6d25ae822964b0dd90370a00f20dc85e3b95588717e078e72a66a62bf8141514723c17dc41a50ae2bd79b010fe5c50d2037d39bbb3eac9f3d8fb4c069c0f55d11a8ac29430f180e6da05eec94d862db3be5e898ff93794a905018ea4d55a2a20c517eda0446ea547e21a96f90ebce07ef41c89e053754a108bc43fd3e1fe49ca5f6", 0x94, 0x80000000}, {&(0x7f0000000340)="415458c1c03924174f736c0c416a3807d5a6fc753c3e2c3f6904ede3e6595eea05de0ea72f35078aaead46deb7b50ee3476c3b489e1cb01355013c7804adce8b174cb005277ba176ff22e1877ede7a65ec6a05d3a420d986f5a55876a5d96c078be54c360d3722981dcf36285c07415a3cf266bd0f43663d29c811cd9080b945f1243ef897e9df81c2b3bd9891518a502aa61daa", 0x94, 0x2}, {&(0x7f0000000400)="e210863c7fafbe52b58213b66664ab6cd1d18f9c83e461f662209a477c9dd0c29ffe5ba41a39a17e1ba4fd904163d57bd74170219e739d30370499121da34a2fed4867c0ab9f9006d82aa8152d7096e385", 0x51}, {&(0x7f0000000480)="35cd8696a632ca77603a93f693cba8a4dcbf8424c136a1b8cff011d75593ea3f5c20cca0ea8eb33d884583f9ee7b6738f4cd8b3343645a23a90620", 0x3b, 0x8cbe}, {&(0x7f00000004c0)="c075dae58eaa95935aefa1cf9411432350186fdd97da3bf2cca051ec8f76924a81069ab26b0cfdf6ea694362585136bff6199f7ad6d18e25d6c214f394bd70049248d439f6f520728601c8c823eda24de1d57dc795aebdb56158bcee24cf9bcefa83859c75bbe77430315cb594ac12078edf6a2ec7d71d079c73cd0378d0faf3554655979b9e", 0x86, 0x4}, {&(0x7f0000000580)="2ae1cffe10b64b7b76a70b19b2e6d176577964f92188b144e1c2ae9479b61abeef9b8f2251bd60ef", 0x28, 0x1}, {&(0x7f00000005c0)="4e6993f18be792b0dd9d6156f6b74955055a32617076179dc948b7fd8b9d01ed", 0x20, 0x85}, {&(0x7f0000000600)="6fc4ea6b4c1a9806b438e9212d8818959be43bd00adb001e090d48aa44782828c9098153b51698d6bb2a19bd1516e2a1d2a7d3b33e8b46c54251cb7071fc37e32b1b904b8e608b11a6c605b68d4704ea73e1a4f35fa6818f97ba3aadd9fff9d9c0d66d337df24afb1e6c1d4a71ff8a47d93d8dadcfa0e5793643a48a59d92b9621c50a66667f378f9bcfbeb081016317", 0x90, 0x2}, {&(0x7f00000006c0)="8e1ba2b85f0484449bcf630353d380042611edc9297ea35cd8f5da69153683fe306654aae1cca03605c167cc49114ad0b0f71a2c2292b2da3c950b68cc3f5fc297e02dabe00561449c6e80e1bdd6556bd7b4cd3e5e5cb9214d6082c24c59d7e39d81f702240f757242e482587ba742fe7ea99424801dfb375e2fe3611a", 0x7d, 0x7}], 0x902023, &(0x7f0000000840)='debug_want_extra_isize') getpeername(r0, &(0x7f0000000140)=@nl=@proc, &(0x7f00000001c0)=0x80) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000880)=ANY=[@ANYBLOB="6465613ed3cafed9ef49dde72d7f1f020000074e5f65787472615f6973697ade5e7eb9cabd5cf83030e3700f2e5e79deaf30302c00"]) [ 2641.107314][T20508] overlayfs: filesystem on './file0' not supported as upperdir 15:15:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 15:15:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400010, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) [ 2641.186838][T20443] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 15:15:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x500) 15:15:48 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000000000000d0100000000845f"], 0x10}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x1000000) 15:15:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="800f04000000009d190003f5ffffff0000000102000000000100000001000000004000000040009160ee9c4399c97e006d5ebe5a0000ffff53efd3e856d34ece6ffb9585929e2ae23b76da1f68814707156154f3d6af211c08c59ff9241b300100000000000000b0", 0x68, 0x400}], 0x0, 0x0) 15:15:48 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_SECUREBITS(0x1b) r0 = accept4$llc(0xffffffffffffff9c, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000000c0)=0x10, 0x800) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() setregid(r1, r2) ioctl(r0, 0x100000890f, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2641.389625][T20740] overlayfs: filesystem on './file0' not supported as upperdir 15:15:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400012, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 15:15:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x301000, 0x0) setsockopt$packet_buf(r0, 0x107, 0x1f, &(0x7f0000000140)="92aab8530fad21e550c54a346d7015d191bbbc66", 0x14) time(&(0x7f0000000180)) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='debug_want_extra_isize=0x0000000020000000,\x00']) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000001c0), 0x4) 15:15:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x600) 15:15:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) [ 2641.559717][T20754] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities [ 2641.605745][ T7649] ================================================================== [ 2641.616932][ T7649] BUG: KASAN: slab-out-of-bounds in __ext4_expand_extra_isize+0x16c/0x240 [ 2641.625457][ T7649] Write of size 536870880 at addr ffff888085d1f1a0 by task rs:main Q:Reg/7649 [ 2641.634656][ T7649] [ 2641.637006][ T7649] CPU: 1 PID: 7649 Comm: rs:main Q:Reg Not tainted 5.1.0-rc5 #68 [ 2641.644948][ T7649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2641.655019][ T7649] Call Trace: [ 2641.658410][ T7649] dump_stack+0x172/0x1f0 [ 2641.662751][ T7649] ? __ext4_expand_extra_isize+0x16c/0x240 [ 2641.668606][ T7649] print_address_description.cold+0x7c/0x20d [ 2641.674618][ T7649] ? __ext4_expand_extra_isize+0x16c/0x240 [ 2641.680632][ T7649] ? __ext4_expand_extra_isize+0x16c/0x240 [ 2641.686478][ T7649] kasan_report.cold+0x1b/0x40 [ 2641.691648][ T7649] ? __ext4_expand_extra_isize+0x16c/0x240 [ 2641.697552][ T7649] check_memory_region+0x123/0x190 [ 2641.702759][ T7649] memset+0x24/0x40 [ 2641.706801][ T7649] __ext4_expand_extra_isize+0x16c/0x240 [ 2641.712759][ T7649] ext4_mark_inode_dirty+0x6e9/0x940 [ 2641.718372][ T7649] ? ext4_expand_extra_isize+0x550/0x550 [ 2641.726458][ T7649] ? ___might_sleep+0x163/0x280 [ 2641.731572][ T7649] ? __might_sleep+0x95/0x190 [ 2641.736743][ T7649] ? ext4_journal_check_start+0x188/0x230 [ 2641.741854][ T7815] BUG: unable to handle kernel paging request at ffff88808ad5e810 [ 2641.743708][ T7649] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2641.751590][ T7815] #PF error: [WRITE] [ 2641.758611][ T7649] ? __ext4_journal_start_sb+0x12d/0x4a0 [ 2641.762490][ T7815] PGD b201067 P4D b201067 PUD 21ffff067 PMD 7ffad063 PTE 0 [ 2641.768529][ T7649] ext4_dirty_inode+0x8f/0xc0 [ 2641.776054][ T7815] Oops: 0002 [#1] PREEMPT SMP KASAN [ 2641.780725][ T7649] ? ext4_setattr+0x2400/0x2400 [ 2641.786337][ T7815] CPU: 0 PID: 7815 Comm: syz-executor.1 Not tainted 5.1.0-rc5 #68 [ 2641.791210][ T7649] __mark_inode_dirty+0x919/0x1290 [ 2641.799247][ T7815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2641.805308][ T7649] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2641.815519][ T7815] RIP: 0010:switch_mm_irqs_off+0x1f4/0x1460 [ 2641.821729][ T7649] __generic_write_end+0x1b9/0x240 [ 2641.827644][ T7815] Code: 83 40 0d 00 00 83 7d d0 3f 0f 87 3d 0d 00 00 f0 48 0f b3 10 48 81 fb 80 a6 a3 88 74 16 83 7d d0 3f 0f 87 7e 0d 00 00 8b 45 d0 48 0f ab 83 d0 05 00 00 4c 8d a3 b0 03 00 00 be 08 00 00 00 4c [ 2641.832749][ T7649] generic_write_end+0x6c/0x90 [ 2641.853030][ T7815] RSP: 0018:ffff8880a85e7b28 EFLAGS: 00010093 [ 2641.857800][ T7649] ext4_da_write_end+0x3c8/0xa50 [ 2641.864243][ T7815] RAX: 0000000000000000 RBX: ffff88808ad5e240 RCX: ffffffff8132cb3a [ 2641.869178][ T7649] generic_perform_write+0x2f0/0x530 [ 2641.877414][ T7815] RDX: 0000000000000000 RSI: ffffffff8132cb44 RDI: 0000000000000007 [ 2641.882818][ T7649] ? page_endio+0x780/0x780 [ 2641.890778][ T7815] RBP: ffff8880a85e7b78 R08: ffff88809fdd4680 R09: ffffed1015d0504a [ 2641.895279][ T7649] ? current_time+0x140/0x140 [ 2641.903481][ T7815] R10: ffffed1015d05049 R11: ffff8880ae82824f R12: ffff888055d3a720 [ 2641.908259][ T7649] ? generic_write_check_limits+0x2a0/0x2a0 [ 2641.916206][ T7815] R13: ffff888092b0d1c0 R14: ffff888055d3a300 R15: ffff88808ad5e240 [ 2641.922176][ T7649] ? lock_acquire+0x16f/0x3f0 [ 2641.930130][ T7815] FS: 000000000234b940(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 2641.934911][ T7649] ? ext4_file_write_iter+0x257/0x11c0 [ 2641.950796][ T7815] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2641.950809][ T7815] CR2: ffff88808ad5e810 CR3: 000000009dbde000 CR4: 00000000001406f0 [ 2641.956300][ T7649] __generic_file_write_iter+0x25e/0x630 [ 2641.963121][ T7815] DR0: 000000000000b8c4 DR1: 0000000000000000 DR2: 0000000000000000 [ 2641.971181][ T7649] ext4_file_write_iter+0x346/0x11c0 [ 2641.977149][ T7815] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2641.985686][ T7649] ? ext4_file_mmap+0x410/0x410 [ 2641.993901][ T7815] Call Trace: [ 2642.002564][ T7649] ? mark_held_locks+0xf0/0xf0 [ 2642.007402][ T7815] __schedule+0x762/0x1cc0 [ 2642.010867][ T7649] ? __lock_acquire+0x548/0x3fb0 [ 2642.015704][ T7815] ? hrtimer_start_range_ns+0x66b/0xc80 [ 2642.020550][ T7649] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2642.025574][ T7815] ? __sched_text_start+0x8/0x8 [ 2642.031186][ T7649] ? iov_iter_init+0xee/0x220 [ 2642.037573][ T7815] ? __hrtimer_get_remaining+0x1a0/0x1a0 [ 2642.042754][ T7649] new_sync_write+0x4c7/0x760 [ 2642.047414][ T7815] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2642.053031][ T7649] ? default_llseek+0x2e0/0x2e0 [ 2642.057694][ T7815] schedule+0x92/0x180 [ 2642.063227][ T7649] __vfs_write+0xe4/0x110 [ 2642.068394][ T7815] do_nanosleep+0x201/0x6a0 [ 2642.072445][ T7649] vfs_write+0x20c/0x580 [ 2642.076815][ T7815] ? __debug_object_init+0x190/0xc30 [ 2642.081855][ T7649] ksys_write+0x14f/0x2d0 [ 2642.086251][ T7815] ? schedule_timeout_idle+0x90/0x90 [ 2642.091537][ T7649] ? __ia32_sys_read+0xb0/0xb0 [ 2642.095857][ T7815] ? memset+0x32/0x40 [ 2642.101560][ T7649] ? ksys_write+0x2d0/0x2d0 [ 2642.106392][ T7815] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2642.110358][ T7649] ? do_syscall_64+0xb5/0x610 [ 2642.114852][ T7815] ? __hrtimer_init+0xe1/0x250 [ 2642.121170][ T7649] __x64_sys_write+0x73/0xb0 [ 2642.125940][ T7815] hrtimer_nanosleep+0x2a6/0x570 [ 2642.130683][ T7649] do_syscall_64+0x103/0x610 [ 2642.135258][ T7815] ? nanosleep_copyout+0x110/0x110 [ 2642.140177][ T7649] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2642.145186][ T7815] ? _copy_from_user+0xdd/0x150 [ 2642.150448][ T7649] RIP: 0033:0x7f16fb91519d [ 2642.156323][ T7815] ? clock_was_set_work+0x30/0x30 [ 2642.161153][ T7649] Code: d1 20 00 00 75 10 b8 01 00 00 00 0f 05 48 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 be fa ff ff 48 89 04 24 b8 01 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 07 fb ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2642.165551][ T7815] __x64_sys_nanosleep+0x1a6/0x220 [ 2642.170726][ T7649] RSP: 002b:00007f16f9eb6000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 2642.190938][ T7815] ? hrtimer_nanosleep+0x570/0x570 [ 2642.196024][ T7649] RAX: ffffffffffffffda RBX: 0000000000000105 RCX: 00007f16fb91519d [ 2642.204526][ T7815] ? do_syscall_64+0x26/0x610 [ 2642.209612][ T7649] RDX: 0000000000000105 RSI: 0000000001849a90 RDI: 0000000000000001 [ 2642.217575][ T7815] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2642.222353][ T7649] RBP: 0000000001849a90 R08: 0000000001849b01 R09: 00007f16fb292dc7 [ 2642.230318][ T7815] ? trace_hardirqs_on+0x67/0x230 [ 2642.235663][ T7649] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 2642.243803][ T7815] do_syscall_64+0x103/0x610 [ 2642.249519][ T7649] R13: 00007f16f9eb6480 R14: 0000000000000002 R15: 0000000001849890 [ 2642.258224][ T7815] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2642.263262][ T7649] [ 2642.271336][ T7815] RIP: 0033:0x4863f0 [ 2642.277236][ T7649] The buggy address belongs to the page: [ 2642.279768][ T7815] Code: 00 00 48 c7 c0 d4 ff ff ff 64 c7 00 16 00 00 00 31 c0 eb be 66 0f 1f 44 00 00 83 3d 61 03 5d 00 00 75 14 b8 23 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 b4 e0 f8 ff c3 48 83 ec 08 e8 ea 53 fd ff [ 2642.283728][ T7649] page:ffffea00021747c0 count:2 mapcount:0 mapping:ffff888219e48558 index:0x427 [ 2642.289867][ T7815] RSP: 002b:00007ffdf99c4c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000023 [ 2642.309542][ T7649] def_blk_aops [ 2642.309551][ T7649] flags: 0x1fffc000000203a(referenced|dirty|lru|active|private) [ 2642.318523][ T7815] RAX: ffffffffffffffda RBX: 0000000000284e77 RCX: 00000000004863f0 [ 2642.327527][ T7649] raw: 01fffc000000203a ffffea000219e488 ffffea00025ec008 ffff888219e48558 [ 2642.330967][ T7815] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007ffdf99c4c20 [ 2642.338618][ T7649] raw: 0000000000000427 ffff8880930e71f8 00000002ffffffff ffff88821bafad00 [ 2642.346705][ T7815] RBP: 00000000000028be R08: 0000000000000001 R09: 000000000234b940 [ 2642.355304][ T7649] page dumped because: kasan: bad access detected [ 2642.363267][ T7815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 2642.371956][ T7649] page->mem_cgroup:ffff88821bafad00 [ 2642.379949][ T7815] R13: 00007ffdf99c4c70 R14: 0000000000284e68 R15: 00007ffdf99c4c80 [ 2642.386549][ T7649] [ 2642.394548][ T7815] Modules linked in: [ 2642.399745][ T7649] Memory state around the buggy address: [ 2642.407703][ T7815] CR2: ffff88808ad5e810 [ 2642.410018][ T7649] ffff888086807f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2642.413904][ T7815] ---[ end trace 115fe4ba1c33d3f5 ]--- [ 2642.419516][ T7649] ffff888086807f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2642.423664][ T7815] RIP: 0010:switch_mm_irqs_off+0x1f4/0x1460 [ 2642.431695][ T7649] >ffff888086808000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2642.437144][ T7815] Code: 83 40 0d 00 00 83 7d d0 3f 0f 87 3d 0d 00 00 f0 48 0f b3 10 48 81 fb 80 a6 a3 88 74 16 83 7d d0 3f 0f 87 7e 0d 00 00 8b 45 d0 48 0f ab 83 d0 05 00 00 4c 8d a3 b0 03 00 00 be 08 00 00 00 4c [ 2642.445180][ T7649] ^ [ 2642.451068][ T7815] RSP: 0018:ffff8880a85e7b28 EFLAGS: 00010093 [ 2642.459112][ T7649] ffff888086808080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2642.478914][ T7815] RAX: 0000000000000000 RBX: ffff88808ad5e240 RCX: ffffffff8132cb3a [ 2642.483090][ T7649] ffff888086808100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2642.490027][ T7815] RDX: 0000000000000000 RSI: ffffffff8132cb44 RDI: 0000000000000007 [ 2642.499805][ T7649] ================================================================== [ 2642.507769][ T7815] RBP: ffff8880a85e7b78 R08: ffff88809fdd4680 R09: ffffed1015d0504a [ 2642.515846][ C1] BUG: unable to handle kernel paging request at ffff88808fe87590 [ 2642.523813][ T7815] R10: ffffed1015d05049 R11: ffff8880ae82824f R12: ffff888055d3a720 [ 2642.532153][ C1] #PF error: [normal kernel read fault] [ 2642.540426][ T7815] R13: ffff888092b0d1c0 R14: ffff888055d3a300 R15: ffff88808ad5e240 [ 2642.548210][ C1] PGD b201067 P4D b201067 PUD 21ffff067 PMD 7f8d0063 PTE 0 [ 2642.556562][ T7815] FS: 000000000234b940(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 2642.562093][ C1] Oops: 0000 [#2] PREEMPT SMP KASAN [ 2642.570080][ T7815] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2642.577258][ C1] CPU: 1 PID: 7649 Comm: rs:main Q:Reg Tainted: G B D 5.1.0-rc5 #68 [ 2642.586340][ T7815] CR2: ffff88808ad5e810 CR3: 000000009dbde000 CR4: 00000000001406f0 [ 2642.591739][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2642.598323][ T7815] DR0: 000000000000b8c4 DR1: 0000000000000000 DR2: 0000000000000000 [ 2642.607724][ C1] RIP: 0010:rb_erase+0x2f6/0x1c10 [ 2642.615764][ T7815] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2642.627808][ C1] Code: 89 f8 48 c1 e8 03 80 3c 18 00 0f 85 01 0f 00 00 4d 8b 75 08 4d 85 f6 74 1b 4c 89 f0 48 c1 e8 03 80 3c 18 00 0f 85 d6 0c 00 00 <41> f6 06 01 0f 84 41 09 00 00 4d 85 ff 74 1b 4c 89 f8 48 c1 e8 03 [ 2642.635761][ T7815] Kernel panic - not syncing: Fatal exception [ 2642.640892][ C1] RSP: 0018:ffff8880ae907d50 EFLAGS: 00010046 [ 2642.680964][ C1] RAX: 1ffff11011fd0eb2 RBX: dffffc0000000000 RCX: 1ffff11015d24bb9 [ 2642.689025][ C1] RDX: ffffed1015d24bb8 RSI: ffff8880ae925dc0 RDI: ffff888094d5f598 [ 2642.697032][ C1] RBP: ffff8880ae907d98 R08: ffff8880ae926868 R09: ffff888094d5f5a0 [ 2642.705085][ C1] R10: fffffbfff14f4b1d R11: ffffffff8a7a58eb R12: ffff8880ae926860 [ 2642.713089][ C1] R13: ffff888094d5f590 R14: ffff88808fe87590 R15: 0000000000000000 [ 2642.723001][ C1] FS: 00007f16f9eb7700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2642.732143][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2642.738754][ C1] CR2: ffff88808fe87590 CR3: 00000000a8b30000 CR4: 00000000001406e0 [ 2642.746897][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2642.754949][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2642.764480][ C1] Call Trace: [ 2642.767759][ C1] [ 2642.770609][ C1] ? debug_stats_show+0x100/0x100 [ 2642.775632][ C1] timerqueue_del+0x86/0x150 [ 2642.780344][ C1] __remove_hrtimer+0xa8/0x1c0 [ 2642.785189][ C1] __hrtimer_run_queues+0x2a8/0xde0 [ 2642.790426][ C1] ? hrtimer_start_range_ns+0xc80/0xc80 [ 2642.795987][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2642.801789][ C1] ? __this_cpu_preempt_check+0x3a/0x270 [ 2642.807419][ C1] hrtimer_interrupt+0x314/0x770 [ 2642.812370][ C1] smp_apic_timer_interrupt+0x120/0x570 [ 2642.817911][ C1] apic_timer_interrupt+0xf/0x20 [ 2642.822840][ C1] [ 2642.825774][ C1] RIP: 0010:_raw_spin_unlock_irqrestore+0x95/0xe0 [ 2642.832194][ C1] Code: 48 c7 c0 70 96 92 88 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 39 48 83 3d 62 3d 82 01 00 74 24 48 89 df 57 9d <0f> 1f 44 00 00 bf 01 00 00 00 e8 cc 7f 3d fa 65 8b 05 65 94 f1 78 [ 2642.852030][ C1] RSP: 0018:ffff888099f67568 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 2642.860542][ C1] RAX: 1ffffffff11252ce RBX: 0000000000000282 RCX: 1ffffffff12bcc73 [ 2642.868520][ C1] RDX: dffffc0000000000 RSI: ffffffff8175f9de RDI: 0000000000000282 [ 2642.876574][ C1] RBP: ffff888099f67578 R08: ffff888084d563c0 R09: fffffbfff1148e61 [ 2642.884802][ C1] R10: fffffbfff1148e60 R11: ffffffff88a47303 R12: ffffffff88a47300 [ 2642.892946][ C1] R13: ffffffff81f11cfc R14: 000000001fffffe0 R15: ffff888085d1f1a0 [ 2642.901156][ C1] ? __ext4_expand_extra_isize+0x16c/0x240 [ 2642.907049][ C1] ? trace_hardirqs_on+0x5e/0x230 [ 2642.912083][ C1] end_report+0x32/0x4f [ 2642.916322][ C1] ? __ext4_expand_extra_isize+0x16c/0x240 [ 2642.922312][ C1] kasan_report.cold+0xe/0x40 [ 2642.927109][ C1] ? __ext4_expand_extra_isize+0x16c/0x240 [ 2642.932910][ C1] check_memory_region+0x123/0x190 [ 2642.941791][ C1] memset+0x24/0x40 [ 2642.945857][ C1] __ext4_expand_extra_isize+0x16c/0x240 [ 2642.951576][ C1] ext4_mark_inode_dirty+0x6e9/0x940 [ 2642.956867][ C1] ? ext4_expand_extra_isize+0x550/0x550 [ 2642.962528][ C1] ? ___might_sleep+0x163/0x280 [ 2642.967395][ C1] ? __might_sleep+0x95/0x190 [ 2642.972247][ C1] ? ext4_journal_check_start+0x188/0x230 [ 2642.978235][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2642.984482][ C1] ? __ext4_journal_start_sb+0x12d/0x4a0 [ 2642.990226][ C1] ext4_dirty_inode+0x8f/0xc0 [ 2642.994897][ C1] ? ext4_setattr+0x2400/0x2400 [ 2642.999829][ C1] __mark_inode_dirty+0x919/0x1290 [ 2643.005816][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2643.012313][ C1] __generic_write_end+0x1b9/0x240 [ 2643.017772][ C1] generic_write_end+0x6c/0x90 [ 2643.022550][ C1] ext4_da_write_end+0x3c8/0xa50 [ 2643.027659][ C1] generic_perform_write+0x2f0/0x530 [ 2643.032942][ C1] ? page_endio+0x780/0x780 [ 2643.037453][ C1] ? current_time+0x140/0x140 [ 2643.042308][ C1] ? generic_write_check_limits+0x2a0/0x2a0 [ 2643.048350][ C1] ? lock_acquire+0x16f/0x3f0 [ 2643.053718][ C1] ? ext4_file_write_iter+0x257/0x11c0 [ 2643.059177][ C1] __generic_file_write_iter+0x25e/0x630 [ 2643.066328][ C1] ext4_file_write_iter+0x346/0x11c0 [ 2643.073609][ C1] ? ext4_file_mmap+0x410/0x410 [ 2643.078463][ C1] ? mark_held_locks+0xf0/0xf0 [ 2643.083225][ C1] ? __lock_acquire+0x548/0x3fb0 [ 2643.088156][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2643.095309][ C1] ? iov_iter_init+0xee/0x220 [ 2643.103717][ C1] new_sync_write+0x4c7/0x760 [ 2643.111020][ C1] ? default_llseek+0x2e0/0x2e0 [ 2643.116221][ C1] __vfs_write+0xe4/0x110 [ 2643.120545][ C1] vfs_write+0x20c/0x580 [ 2643.124791][ C1] ksys_write+0x14f/0x2d0 [ 2643.129211][ C1] ? __ia32_sys_read+0xb0/0xb0 [ 2643.135310][ C1] ? ksys_write+0x2d0/0x2d0 [ 2643.139819][ C1] ? do_syscall_64+0xb5/0x610 [ 2643.144573][ C1] __x64_sys_write+0x73/0xb0 [ 2643.149254][ C1] do_syscall_64+0x103/0x610 [ 2643.153837][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2643.159725][ C1] RIP: 0033:0x7f16fb91519d [ 2643.164131][ C1] Code: d1 20 00 00 75 10 b8 01 00 00 00 0f 05 48 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 be fa ff ff 48 89 04 24 b8 01 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 07 fb ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2643.183734][ C1] RSP: 002b:00007f16f9eb6000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 2643.192131][ C1] RAX: ffffffffffffffda RBX: 0000000000000105 RCX: 00007f16fb91519d [ 2643.200089][ C1] RDX: 0000000000000105 RSI: 0000000001849a90 RDI: 0000000000000001 [ 2643.208159][ C1] RBP: 0000000001849a90 R08: 0000000001849b01 R09: 00007f16fb292dc7 [ 2643.216131][ C1] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 2643.224178][ C1] R13: 00007f16f9eb6480 R14: 0000000000000002 R15: 0000000001849890 [ 2643.232139][ C1] Modules linked in: [ 2643.236024][ C1] CR2: ffff88808fe87590 [ 2643.240195][ C1] ---[ end trace 115fe4ba1c33d3f6 ]--- [ 2643.245642][ C1] RIP: 0010:switch_mm_irqs_off+0x1f4/0x1460 [ 2643.251520][ C1] Code: 83 40 0d 00 00 83 7d d0 3f 0f 87 3d 0d 00 00 f0 48 0f b3 10 48 81 fb 80 a6 a3 88 74 16 83 7d d0 3f 0f 87 7e 0d 00 00 8b 45 d0 48 0f ab 83 d0 05 00 00 4c 8d a3 b0 03 00 00 be 08 00 00 00 4c [ 2643.271118][ C1] RSP: 0018:ffff8880a85e7b28 EFLAGS: 00010093 [ 2643.277186][ C1] RAX: 0000000000000000 RBX: ffff88808ad5e240 RCX: ffffffff8132cb3a [ 2643.285141][ C1] RDX: 0000000000000000 RSI: ffffffff8132cb44 RDI: 0000000000000007 [ 2643.293189][ C1] RBP: ffff8880a85e7b78 R08: ffff88809fdd4680 R09: ffffed1015d0504a [ 2643.301146][ C1] R10: ffffed1015d05049 R11: ffff8880ae82824f R12: ffff888055d3a720 [ 2643.309106][ C1] R13: ffff888092b0d1c0 R14: ffff888055d3a300 R15: ffff88808ad5e240 [ 2643.317067][ C1] FS: 00007f16f9eb7700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2643.325978][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2643.333306][ C1] CR2: ffff88808fe87590 CR3: 00000000a8b30000 CR4: 00000000001406e0 [ 2643.341265][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2643.349227][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2643.799968][ T7815] Shutting down cpus with NMI [ 2643.805650][ T7815] Kernel Offset: disabled [ 2643.809985][ T7815] Rebooting in 86400 seconds..