0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 371.187662][T20311] omfs: Invalid superblock (0) 09:12:11 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x28, &(0x7f0000000140)}, 0x10) umount2(0x0, 0x0) 09:12:11 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 371.317912][T20332] loop5: detected capacity change from 0 to 229376 [ 371.340473][T20333] loop0: detected capacity change from 0 to 4 [ 371.430588][T20340] loop1: detected capacity change from 0 to 229376 [ 371.483708][T20340] omfs: Invalid superblock (0) [ 371.507497][T20345] loop5: detected capacity change from 0 to 229376 09:12:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xa000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:11 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x8000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:11 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x8000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:12 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0xee00, r2) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000400)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000200)}, {&(0x7f0000000480)="1a1828d5de511fbcc532c5b19b5027aae58ded43fb8218f550fa9486925ecf2a627dd3851ddae51cbf09fe445d9e0c52bcb563d19b84d4745fc52013dc4050a1580260981b8f18d033a82259060779cf8bc97ba20a229eac11a97bb29e137b3e77a40cda87bd980d2bbb4fc518c61ace09ac17c01e4d10f5ca6e738d2b5d4d5b44d0465629e78b9b872d71fb2374ae3e100f2f25fdc6bbb091d744b2", 0x9c}, {&(0x7f0000000540)="74d429aae55ad5f022555d614b11e3c5f047562ce2bdeeb77d20c46edc3f15d2725c641b4ca19542a67ba1c87b35ad48682ac6948c99115a17894d0480fd36c002858da577137527bb875a6d18aebd7814f0ab119d4f2b36595c0bbfda40de3588fcd8d0e9e8d151b5d884076f1b077404ee70fd2f4bee93b31611517bfab4f101f9aff30b292dfaf476d8460536da96fe141e61a2b86ed553668001447c9a201f66b4eb13", 0xa5}, {&(0x7f0000000600)="2230df930ed3eb658f54c534d332bb5c395f9254198273c916ca64e04687de94ee6b8c87aea07553114be1ef7c55717215fa9f5bf23af89f9daf88e6735490ba4e0604b55712c5c03cc68f97633559afdec096531c40689f837d4cb17296d5646972e375c5c25a915c422327c334f6d3a2d09fe639aa121fc7da4f7a051f8946ed755e6cbcf795edcc501c4cdadf2ab88dfb38896b1718879636f4002a0a21130d5bda7d159631e8f3e597774e5b31608590e35faf5bf1", 0xb7}], 0x4, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002400003e72623e000000000001000000", @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00'], 0x80, 0x4000801}, 0x80) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup(r0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x7f, 0x4, 0x3, 0xd0, 0x0, 0x8001, 0x20, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x2, 0x5}, 0x10200, 0x80000001, 0x7f, 0x0, 0x3, 0x13, 0x100}, 0x0, 0xd, r4, 0x1) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000010006400000000002000400", @ANYRES32=r6, @ANYBLOB="040001000000000010000000000000002000040000000000"], 0x2c, 0x0) ioprio_get$uid(0x0, r6) fchown(r3, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) setresgid(0x0, 0xee00, r7) lchown(&(0x7f0000000040)='./file0\x00', r6, r7) rmdir(&(0x7f00000001c0)='./file0\x00') umount2(0x0, 0x0) 09:12:12 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) recvmsg(r0, &(0x7f0000000ac0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/54, 0x36}, {&(0x7f0000000c00)=""/84, 0x54}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000003040)=""/77, 0x4d}], 0x4, &(0x7f0000000980)=""/22, 0x16}, 0x100) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) [ 371.801782][T20358] loop1: detected capacity change from 0 to 262144 [ 371.864919][T20362] loop5: detected capacity change from 0 to 262144 09:12:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x10000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 372.043597][T20358] omfs: Invalid superblock (0) 09:12:12 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0xfeffffffffffffff, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:12 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x9000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:12 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x10000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 372.130933][T20374] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 09:12:12 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xa000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 372.220381][T20374] device team0 left promiscuous mode [ 372.226928][T20374] device team_slave_0 left promiscuous mode [ 372.233092][T20374] device team_slave_1 left promiscuous mode [ 372.240609][T20374] bridge0: port 3(team0) entered disabled state [ 372.250221][T20374] team0: Cannot enslave team device to itself [ 372.257947][T20383] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 09:12:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x20000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:12 executing program 3: clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000040)={0x10000, 0x9, 0x6, 0x2da740f7, 0x10000, 0xfffffffffffffff8, 0xb6d, 0x1ff}, &(0x7f0000000080)={0x9, 0x6, 0x3f, 0x80000000, 0x1000, 0x401, 0x8c45, 0x47}, &(0x7f0000000140)={0x4, 0x6, 0x20, 0x0, 0x3, 0x8001, 0x457, 0x6}, &(0x7f00000001c0)={r0, r1+10000000}, &(0x7f0000000240)={&(0x7f0000000200)={[0xfffffffffffffffa]}, 0x8}) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x4, &(0x7f0000000280)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x4484, 0x0) umount2(0x0, 0x0) [ 372.306529][T20383] bridge0: port 3(team0) entered blocking state [ 372.372532][T20383] bridge0: port 3(team0) entered disabled state [ 372.389253][T20390] loop5: detected capacity change from 0 to 264192 [ 372.391294][T20391] loop1: detected capacity change from 0 to 264192 [ 372.439197][T20383] device team0 entered promiscuous mode [ 372.466026][T20383] device team_slave_0 entered promiscuous mode [ 372.473995][T20391] omfs: Invalid superblock (0) [ 372.479506][T20383] device team_slave_1 entered promiscuous mode [ 372.486255][T20383] bridge0: port 3(team0) entered blocking state [ 372.492568][T20383] bridge0: port 3(team0) entered forwarding state 09:12:12 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000180)="e79c1a80d98f78b48d14221f9a3518382bad8e5a65407855d9c64f531398cce5a37e4a2fbffd63c146b9e9582402906488a6d6368329dd72c393df4055661aba2572246f649791718666fc970e1f6001a9fca759d830006912af5967467e990156", 0x61, 0x100000001}, {&(0x7f0000000200), 0x0, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}, {'hugetlbfs\x00'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@uid_eq={'uid'}}, {@uid_lt={'uid<', 0xee00}}, {@appraise='appraise'}]}) 09:12:12 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xc000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:12 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x80200, 0x4) [ 372.611488][T20404] loop5: detected capacity change from 0 to 264192 [ 372.648535][T20410] loop2: detected capacity change from 0 to 264192 09:12:12 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x20000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x20100000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 372.699791][T20410] befs: Unrecognized mount option "{Ù" or missing value [ 372.737787][T20410] befs: (loop2): cannot parse mount options 09:12:13 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) [ 372.951400][T20423] loop1: detected capacity change from 0 to 264192 [ 372.957295][T20422] loop5: detected capacity change from 0 to 264192 [ 373.035804][T20423] omfs: Invalid superblock (0) 09:12:13 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0xffffffff00000000, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:13 executing program 2: clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000040)={0x10000, 0x9, 0x6, 0x2da740f7, 0x10000, 0xfffffffffffffff8, 0xb6d, 0x1ff}, &(0x7f0000000080)={0x9, 0x6, 0x3f, 0x80000000, 0x1000, 0x401, 0x8c45, 0x47}, &(0x7f0000000140)={0x4, 0x6, 0x20, 0x0, 0x3, 0x8001, 0x457, 0x6}, &(0x7f00000001c0)={r0, r1+10000000}, &(0x7f0000000240)={&(0x7f0000000200)={[0xfffffffffffffffa]}, 0x8}) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x4, &(0x7f0000000280)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x4484, 0x0) umount2(0x0, 0x0) 09:12:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x3f000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:13 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYRES32=0x0, @ANYRES64=r2, @ANYRES32=0x0, @ANYRESOCT, @ANYRES32=0x0, @ANYBLOB="040000004a0000000000000003000000000000000500f0ffffff5f7265667300"/52, @ANYBLOB="0500000002000000000000000500000000ab82b44272b9426562000100040040000000000000000000000000000008000000ff00000000000000e6ffffffffffffffd8080000b5ffff00"/87, @ANYRES32=0xee01], 0x350) r3 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="02000000010006000000000002000400", @ANYRES32=r5, @ANYBLOB="0400010000fcff001000000000000032e0010400000010000029"], 0x2c, 0x0) ioprio_get$uid(0x0, r5) fchown(r3, r5, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x6}, [{0x2, 0x4, r8}], {0x4, 0x1}, [], {}, {0x20, 0x4}}, 0x2c, 0x0) ioprio_get$uid(0x0, r8) fchown(r6, r8, 0x0) statx(r0, &(0x7f0000000140)='./file1\x00', 0x400, 0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$fuse(&(0x7f0000000040)='fuse\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67729275705f69643d", @ANYRESDEC=r2, @ANYBLOB=',blksize=0x0000000000000400,max_read=0x000000000000002a,smackfsfloor=,fowner=', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r8, @ANYBLOB=',fowner<', @ANYRESDEC=r9, @ANYBLOB=',\x00']) 09:12:13 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x20100000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:13 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xd000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:13 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xc000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 373.449915][T20451] loop1: detected capacity change from 0 to 264192 [ 373.467920][T20455] loop2: detected capacity change from 0 to 264192 09:12:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x41504890, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 373.559722][T20451] omfs: Invalid superblock (0) 09:12:13 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x33890000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 373.648100][T20455] omfs: Invalid superblock (0) 09:12:14 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x3b9, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:14 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) r0 = getegid() r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x6}, [{0x2, 0x4, r3}], {0x4, 0x1}, [], {}, {0x20, 0x4}}, 0x2c, 0x0) ioprio_get$uid(0x0, r3) fchown(r1, r3, 0x0) r4 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x6}, [{0x2, 0x4, r6}], {0x4, 0x1}, [], {}, {0x20, 0x4}}, 0x2c, 0x0) ioprio_get$uid(0x0, r6) fchown(r4, r6, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x7, &(0x7f0000000600)=[{&(0x7f0000000180)="975c2a42c85b069e4f24a3ad3b0346a17037e7e472606eb7c355d82d1cdec8127d5f6792434d2b0668ccbb5a4ed0185cb8fdb865a54799c4fea6e5e847185f05e5841bd1c6394dd8d3c8652052cde1fe184fcad7fc0b3dd4054e99836e9edf", 0x5f, 0x400}, {&(0x7f0000000200)="58aaef176d883cc790b2b759a4ac7c249746807ecb4e3aca804433054089c5eba7ae3c671af70b470d9931113e0d8aeb76c677b3", 0x34, 0x5}, {&(0x7f0000000240)="d0207cc8fefb5d1097dc8b52b7cee9d8a2e33e069dd99c407be09139ee60850d3cb37aaebadebbac77e86fe5648dcf6847d313902c7a2f63713778190ba02502adcdfd3dc2cb7623f2b6cf78c62fc3906a5bfcda2732e9acd0f3218250fb68f840c2e563f933b18bec87d43916f11f2fc6a2087c06c75cc90ffcb525419c8c4875c840cd979ec3b980bf9496275517c5", 0x90, 0x4}, {&(0x7f0000000300)="f80b91389b17f600c91234bbf453c29c46f73e61b0259f67351afc14f0869bad9e87f84353f3a4c8b2213c3a3172b34543878f4ba30f37892823c4bba7d482062db0ed71417ed09ab6ede524ed67e0d635a9f7e568eff0876380c05d91080dc71905582190b63e1216485670f392977d6249badcde1cd2d4700c63f4fb496ed1ec114f366eabfa840a130d11621938ad81cdc927079bdeec550cdd4e7047648a3d61ba5b2927c9f065c953e0ad95c78fd8b801ea7c4a39e0e60b3f352b42d77f698a6a3301d6839b259d1329fc031a74cc69934469926d94f1b7390359b70f995b328fded0dca077026681", 0xeb, 0x4}, {&(0x7f0000000400)="fa2df87f1157ce83429b68b40d31b1c6931a1e6f6020dfe71830d51bd4ee098dd62ad371543cd59db19ca8d8338ed517ff29c04882c9aafd7603b340ab3f5bd98b3ee4c32a8cad2481abf1f5c88b725f65575d206e9e1c6b71f0c20fa03d607b8005cefa7b88ff5c347fe8ec0dc5be7dc256eb4d730b592aba0e3565d172e86bd33a1fa90509e912539445f8e03100d1e89af4dcabf72a88a69c2953f35ee859998b", 0xa2, 0x7fffffff}, {&(0x7f00000004c0)="f960b82c4d1c04f287df12f19596a23a17f5a1f15758c6a236c1fb02a3d7ddcc245c3e4217b2545ff481c9b00788073327a0e8174615", 0x36, 0xc23b}, {&(0x7f0000000500)="a05af0acfacc32ca187ad0a531e7be3872bc1143a274435eab09bed67912f5496988485d1a143899a514049c807f5e332a312367950ce04d33f08b3be3f257080481bffcaf587aced94c7c98821595dc89bf7b5cec383fb167b1904c06f3097a9c754f578fb0808150730175644e4290b8810b31f4fc7fb33734449bbd3716bbfb9949f2b31c1cc4fa459a341829d2aa8953bcfdde727c8ab5a926563faa95d0126ffae0ae262dc471b72a264d8506f83d23b8901c8ba92c65d31bef434d70ab5a200ed6cbdb09cd99149fc4d3aef016d09662233284", 0xd6, 0x2}], 0x8018, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r0}}, {@size={'size', 0x3d, [0x36, 0x30, 0x74, 0x35]}}, {@huge_advise='huge=advise'}, {@nr_blocks={'nr_blocks', 0x3d, [0x6b]}}, {@mpol={'mpol', 0x3d, {'prefer', '', @void}}}, {@huge_advise='huge=advise'}, {@huge_advise='huge=advise'}], [{@hash='hash'}, {@fsmagic={'fsmagic', 0x3d, 0x20000}}, {@fsname={'fsname', 0x3d, ':*\x96!$]^'}}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@fowner_eq={'fowner', 0x3d, r3}}, {@euid_gt={'euid>', r6}}]}) unlink(&(0x7f0000000040)='./file1\x00') umount2(0x0, 0x0) 09:12:14 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xf000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 373.903706][T20470] loop5: detected capacity change from 0 to 264192 [ 373.969205][T20475] loop3: detected capacity change from 0 to 264192 [ 374.139900][T20475] tmpfs: Bad value for 'size' [ 374.184095][T20486] loop2: detected capacity change from 0 to 1 [ 374.224525][T20489] loop1: detected capacity change from 0 to 264192 [ 374.334008][T20486] omfs: Invalid superblock (0) [ 374.345142][T20489] omfs: Invalid superblock (0) 09:12:14 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0xfffffffffffff000, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:14 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x48000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:14 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r0, 0x1) chdir(&(0x7f0000000140)='./file0\x00') openat(r0, &(0x7f0000000040)='./file0\x00', 0x400, 0xc) 09:12:14 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x10000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:14 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x3f000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:14 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x3b9, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 374.627176][T20508] loop2: detected capacity change from 0 to 1 [ 374.645162][T20511] o2cb: This node has not been configured. 09:12:14 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x4c000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 374.688065][T20511] o2cb: Cluster check failed. Fix errors before retrying. [ 374.703040][T20508] omfs: Invalid superblock (0) [ 374.727392][T20511] (syz-executor.3,20511,0):user_dlm_register:663 ERROR: status = -22 [ 374.748999][T20515] loop5: detected capacity change from 0 to 264192 [ 374.829806][T20511] (syz-executor.3,20511,0):dlmfs_mkdir:431 ERROR: Error -22 could not register domain "file0" 09:12:15 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xf000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 374.875055][T20517] loop1: detected capacity change from 0 to 264192 09:12:15 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x41504890, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x68000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 375.082944][T20517] omfs: Invalid superblock (0) 09:12:15 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="aecfa106662dc1a4e82ccee128023bd956c0282348567a5a02e1370ee8a968f7c8061b417e501d63102cd7f8c4f1add06ed8718ea576297334339bba57d8303098b54d27ac18579acc8f48686ed50c058ecbfad5b8b9f9a5488c98e7cbe1405d4480b787fc079a98fa6896fdb77db21fe6badf8999ea339c16e2f6d3fe4309", 0x7f, 0x5000000000000000}, {&(0x7f00000001c0)="4262eba2b61fca2855e2a01383871c050ce59e96ae3d53195e8557a87da648295906a8a8528e6016be030133ce01e338d0161bc60513b76203902c8114d6f6795f98ac684ff66dce71a59e1cd9e66b2d0d29d56782da39c9a086ab9d9b56f479756144ac94586a9a80e0c020b7d8699caa6f17ad120a44fcaa1b0a087345b1442bbf6f0819a3f4de83d5d69c0cba65f401626c302103f2d6d5a2b6000ff704755ef7687e35908f4881d71a0cf04417b0c9caac5506e99b801845b2b63930541be57ea211dde8db8d310a65e11e02adebf42b83dcd398f1acd4bf82", 0xdb, 0x2764}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='dmask=01777777777777777776000,dots,dots,debug,euid<', @ANYRESDEC=0xee00, @ANYBLOB=',euid<', @ANYRESDEC=r0, @ANYBLOB=',audit,permit]direm\v\x00\x00\x00\x00\x00\x00ontex<', @ANYRESDEC=0x0, @ANYBLOB=',appraise_type=imasig,\x00']) umount2(0x0, 0x0) setresgid(0x0, 0xee00, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYRES32=0x0, @ANYRES64=r3, @ANYRES32=0x0, @ANYRESOCT, @ANYRES32=0x0, @ANYBLOB="040000004a00000000000000030000000000000005000000000000000b00000014000000636c8861725f72656673000000000000", @ANYBLOB="050000000200000000000000050000000000000000000000080000000100000001000000400000000000000004000000000000000000000000000000ff000000000000000800000000000000d8000000b5ffffff050000", @ANYRES32=0xee01], 0x350) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0xee00, r5) r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYRES32=0x0, @ANYRES64=r7, @ANYRES32=0x0, @ANYRESOCT, @ANYRES32=0x0, @ANYBLOB="040000004a00000000000000030000000000000005000000000000000b00000014000000636c8861725f72656673000000000000", @ANYBLOB="050000000200000000000000050000000000000000000000080000000100000001000000400000000000000004000000000000000000000000000000ff000000000000000800000000000000d8000000b5ffffff050000", @ANYRES32=0xee01], 0x350) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0xee00, r8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0xee00, r9) setxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='system.posix_acl_access\x00', &(0x7f0000000580)={{}, {0x1, 0x4}, [], {0x4, 0x6}, [{}, {0x8, 0x1, r1}, {0x8, 0x0, r3}, {0x8, 0x4, r4}, {0x8, 0x4, r5}, {0x8, 0x0, r7}, {0x8, 0x4, r8}, {0x8, 0x2, r1}, {0x8, 0x1, r9}]}, 0x6c, 0x1) 09:12:15 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x11000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 375.200401][T20531] loop2: detected capacity change from 0 to 264192 [ 375.313682][T20545] loop3: detected capacity change from 0 to 264192 [ 375.322606][T20545] FAT-fs (loop3): Unrecognized mount option "euid<00000000000000060928" or missing value [ 375.334560][T20542] loop1: detected capacity change from 0 to 264192 [ 375.391665][T20546] loop5: detected capacity change from 0 to 264192 [ 375.580038][T20531] omfs: Invalid superblock (0) 09:12:15 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0xfffffffffffffffe, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x6c000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:15 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x48000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:15 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x80002, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'U+', 0x9a81}, 0x16, 0x2) 09:12:16 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x600, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 375.756817][T20542] omfs: Invalid superblock (0) 09:12:16 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x1f000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 375.861090][T20566] loop5: detected capacity change from 0 to 264192 [ 376.010780][T20580] loop5: detected capacity change from 0 to 264192 09:12:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r0, 0x1) epoll_wait(r0, &(0x7f0000000040)=[{}, {}, {}, {}, {}], 0x5, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r1, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001300)={r1, 0x0, 0xee, 0x1000, &(0x7f0000000140)="6eb033472a70e747fe1978c7a9b6a5bb37a5de4be277f91721a0deeaff879577e64b6cfde4df31cb4c69651c6baac1719f87a26578a7f292cb656dc30c7118e628cc45d7f0f273ab3189b23505a289808dfc7cd2f55708789b6666d2129426f36d6bfc24c4f3248b537abb08486958804b5ab0a5ebead40cb814cae40f3e2669f69c8aea3f51505300c61513f5ced59e2ea74e8e3a4d1ba04d4918e92af7a4a01a79f66e72a43d161b150d1c1d21e701bd4f36d3ef6c41bcfb6717d1d23c1fc10a7bad861a5674fa8ba80fa01a9ec4f942dd430a51e41d05d9eee5c56f5bdcaa21a41923f12af2b636093827c8c4", &(0x7f0000000240)=""/4096, 0x80000001, 0x0, 0x4f, 0x35, &(0x7f0000001240)="0578cbf3631e9d6a511751729f1861ea6a38cf76409e1c9ea8026827ecce51fa8c69191f230712895c91b3d262985dfb7584263a92a6cbc51dcd771bfc39808268db3349143c38e3e7b8530975843a", &(0x7f00000012c0)="1a14d937653c3063cf6173c10fc1208dbc81b16b5a7f7ce6304ee2cd398222358a4b09974effc6d41b3d2d5efd1f7966c4c30e186e", 0x1, 0xfff}, 0x48) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x15, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) 09:12:16 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x4c000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:16 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x20000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:16 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x74000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 376.332413][T20593] loop1: detected capacity change from 0 to 264192 [ 376.345463][T20594] loop5: detected capacity change from 0 to 264192 09:12:16 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) recvmmsg(r0, &(0x7f0000001d00)=[{{&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)=""/119, 0x77}, {&(0x7f0000000240)=""/217, 0xd9}, {&(0x7f0000000340)=""/253, 0xfd}, {&(0x7f0000000440)=""/206, 0xce}, {&(0x7f0000000540)=""/209, 0xd1}, {&(0x7f0000000640)=""/65, 0x41}], 0x6}, 0xfffffff9}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000740)=""/155, 0x9b}, {&(0x7f0000000080)=""/39, 0x27}, {&(0x7f0000000800)=""/34, 0x22}, {&(0x7f0000000840)=""/99, 0x63}], 0x4, &(0x7f0000000900)=""/4, 0x4}, 0x10001}, {{&(0x7f0000000940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000001bc0)=[{&(0x7f00000009c0)=""/92, 0x5c}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000001a40)=""/180, 0xb4}, {&(0x7f0000001b00)=""/86, 0x56}, {&(0x7f0000001b80)=""/29, 0x1d}], 0x5, &(0x7f0000001c40)=""/189, 0xbd}, 0x8}], 0x3, 0x400000c1, &(0x7f0000001dc0)={0x77359400}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001e80)={&(0x7f0000001e00)=@newtclass={0x58, 0x28, 0x10, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, r1, {0x6}, {0x7, 0xc}, {0xffff, 0x6}}, [@TCA_RATE={0x6, 0x5, {0x32, 0x3f}}, @tclass_kind_options=@c_tbf={0x8, 0x1, 'tbf\x00'}, @tclass_kind_options=@c_red={0x8, 0x1, 'red\x00'}, @TCA_RATE={0x6, 0x5, {0x4, 0x4}}, @TCA_RATE={0x6, 0x5, {0x9, 0x4}}, @tclass_kind_options=@c_ingress={0xc, 0x1, 'ingress\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x840}, 0x5) mount(&(0x7f0000001f00)=@sg0='/dev/sg0\x00', &(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)='openpromfs\x00', 0x0, &(0x7f0000002000)='t\xfabf\xc6\xce\xad\xbf\xc4y]\xe6\xc3\xa3\xd6\x04\xa2,\x9c\xba\xea\x17\x18\r\xc8\x95L\'\x87\xd6]\xc0\xael') setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000001fc0)=0x1a, 0x4) [ 376.570266][T20608] loop5: detected capacity change from 0 to 264192 09:12:16 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x7a000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 376.630059][T20581] omfs: Invalid superblock (0) [ 376.691808][T20593] omfs: Invalid superblock (0) 09:12:16 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0xffffffffffffffff, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:16 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x68000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:17 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x11000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x8cffffff, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:17 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x20100000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:17 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3244051, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='cpuset\x00', 0x480c0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x9) umount2(0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x1) [ 376.892316][T20629] loop5: detected capacity change from 0 to 264192 09:12:17 executing program 3: ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x1) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x6, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TIOCSBRK(r0, 0x5427) umount2(0x0, 0x0) [ 376.974483][T20639] loop2: detected capacity change from 0 to 264192 [ 376.994009][T20640] loop5: detected capacity change from 0 to 264192 [ 377.127408][T20646] loop1: detected capacity change from 0 to 264192 [ 377.181820][T20639] omfs: Invalid superblock (0) 09:12:17 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x6c000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 377.269338][T20646] omfs: Invalid superblock (0) [ 377.296655][T20655] loop5: detected capacity change from 0 to 264192 09:12:17 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x23000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x90485041, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:17 executing program 2 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 377.415012][T20663] loop5: detected capacity change from 0 to 264192 09:12:17 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) recvmsg(r0, &(0x7f0000000ac0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/54, 0x36}, {&(0x7f0000000c00)=""/84, 0x54}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000003040)=""/77, 0x4d}], 0x4, &(0x7f0000000980)=""/22, 0x16}, 0x100) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000008, 0x13, r0, 0xe962e000) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x16400, 0x28) unlink(&(0x7f0000000080)='./file0/file0\x00') umount2(0x0, 0x0) [ 377.493341][T20668] loop1: detected capacity change from 0 to 264192 [ 377.540156][T20668] omfs: Invalid superblock (0) [ 377.634345][T20675] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 377.644842][T20677] FAULT_INJECTION: forcing a failure. [ 377.644842][T20677] name failslab, interval 1, probability 0, space 0, times 0 [ 377.658447][T20675] device team0 left promiscuous mode [ 377.664300][T20675] device team_slave_0 left promiscuous mode [ 377.670320][T20677] CPU: 1 PID: 20677 Comm: syz-executor.2 Not tainted 5.12.0-rc7-syzkaller #0 [ 377.679111][T20677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 377.689164][T20677] Call Trace: [ 377.692434][T20677] dump_stack+0x141/0x1d7 [ 377.696854][T20677] should_fail.cold+0x5/0xa [ 377.701373][T20677] ? __do_sys_memfd_create+0xf7/0x5a0 [ 377.706738][T20677] should_failslab+0x5/0x10 [ 377.711321][T20677] __kmalloc+0x72/0x310 [ 377.715467][T20677] __do_sys_memfd_create+0xf7/0x5a0 [ 377.720742][T20677] ? hmm_vma_walk_hugetlb_entry+0x8a0/0x8a0 [ 377.726625][T20677] ? syscall_enter_from_user_mode+0x27/0x70 [ 377.732513][T20677] do_syscall_64+0x2d/0x70 [ 377.736941][T20677] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 377.742823][T20677] RIP: 0033:0x466459 [ 377.746705][T20677] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 377.766395][T20677] RSP: 002b:00007f02b8aa4f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 377.774797][T20677] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000466459 [ 377.782756][T20677] RDX: 0000000000000012 RSI: 0000000000000000 RDI: 00000000004beba8 [ 377.790717][T20677] RBP: 0000000000000002 R08: 0000000000000009 R09: ffffffffffffffff [ 377.798680][T20677] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 377.806637][T20677] R13: 0000000020000140 R14: 0000000000000012 R15: 00000000200002c0 [ 377.815819][ T3239] ieee802154 phy0 wpan0: encryption failed: -22 [ 377.822651][ T3239] ieee802154 phy1 wpan1: encryption failed: -22 [ 377.833701][T20675] device team_slave_1 left promiscuous mode [ 377.854073][T20675] bridge0: port 3(team0) entered disabled state 09:12:18 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x2, &(0x7f0000003900)) 09:12:18 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x74000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:18 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x3f000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 377.877841][T20675] team0: Cannot enslave team device to itself 09:12:18 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x97ffffff, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 377.929210][T20681] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 377.951633][T20681] bridge0: port 3(team0) entered blocking state [ 377.962476][T20689] loop5: detected capacity change from 0 to 264192 [ 378.000136][T20681] bridge0: port 3(team0) entered disabled state [ 378.017088][T20694] loop1: detected capacity change from 0 to 264192 09:12:18 executing program 2 (fault-call:1 fault-nth:1): perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 378.059928][T20681] device team0 entered promiscuous mode 09:12:18 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xc0ed0000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 378.101029][T20694] omfs: Invalid superblock (0) [ 378.114044][T20681] device team_slave_0 entered promiscuous mode [ 378.120483][T20681] device team_slave_1 entered promiscuous mode [ 378.127869][T20681] bridge0: port 3(team0) entered blocking state [ 378.131523][T20704] loop5: detected capacity change from 0 to 264192 [ 378.134202][T20681] bridge0: port 3(team0) entered forwarding state [ 378.150544][T20675] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 09:12:18 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x3, &(0x7f0000003900)) [ 378.206597][T20710] FAULT_INJECTION: forcing a failure. [ 378.206597][T20710] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 378.220800][T20710] CPU: 1 PID: 20710 Comm: syz-executor.2 Not tainted 5.12.0-rc7-syzkaller #0 [ 378.229565][T20710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.239620][T20710] Call Trace: [ 378.242897][T20710] dump_stack+0x141/0x1d7 [ 378.247226][T20710] should_fail.cold+0x5/0xa [ 378.251727][T20710] _copy_from_user+0x2c/0x180 [ 378.256398][T20710] __do_sys_memfd_create+0x169/0x5a0 [ 378.261676][T20710] ? hmm_vma_walk_hugetlb_entry+0x8a0/0x8a0 [ 378.267559][T20710] ? syscall_enter_from_user_mode+0x27/0x70 [ 378.273448][T20710] do_syscall_64+0x2d/0x70 [ 378.277854][T20710] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 378.283743][T20710] RIP: 0033:0x466459 [ 378.287625][T20710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 378.307246][T20710] RSP: 002b:00007f02b8aa4f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 378.315653][T20710] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000466459 [ 378.323611][T20710] RDX: 0000000000000012 RSI: 0000000000000000 RDI: 00000000004beba8 [ 378.331569][T20710] RBP: 0000000000000002 R08: 0000000000000009 R09: ffffffffffffffff [ 378.339535][T20710] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 378.347584][T20710] R13: 0000000020000140 R14: 0000000000000012 R15: 00000000200002c0 09:12:18 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x40000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:18 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) quotactl(0xffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)="8e89daabb068062a87e51d25277488c2358165f8866654e7e87b54d444e3f6960cececa5d046f20da12f6ae70bd97660a6dba94497a26fdd8c12e8b27471d6c1b97c8d1c834b97fdee2c41ee89eb4bd7e81ee3a74fc21a15c684ce2111eb025d47cad67280ec94981ae5e55c19102de5536f194f8d359a9aa713e0a0432815e9c715993d8d660b3bc77cda0eae1e0a06178e45a4b2057b2c8dfa30a323515707a273c80fea2706f05fa1eb0c6066dfe7c332267bc3cc04827487fe") umount2(0x0, 0x0) 09:12:18 executing program 2 (fault-call:1 fault-nth:2): perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:18 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7a000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:18 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xf6ffffff, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:18 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x4, &(0x7f0000003900)) [ 378.475714][T20719] loop1: detected capacity change from 0 to 264192 [ 378.525971][T20719] omfs: Invalid superblock (0) [ 378.537245][T20722] FAULT_INJECTION: forcing a failure. [ 378.537245][T20722] name failslab, interval 1, probability 0, space 0, times 0 [ 378.551458][T20722] CPU: 0 PID: 20722 Comm: syz-executor.2 Not tainted 5.12.0-rc7-syzkaller #0 [ 378.560227][T20722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.570284][T20722] Call Trace: [ 378.573560][T20722] dump_stack+0x141/0x1d7 [ 378.577901][T20722] should_fail.cold+0x5/0xa [ 378.582410][T20722] ? shmem_alloc_inode+0x18/0x40 [ 378.587352][T20722] ? shmem_alloc_inode+0x18/0x40 [ 378.592299][T20722] should_failslab+0x5/0x10 [ 378.596807][T20722] kmem_cache_alloc+0x5e/0x370 [ 378.601575][T20722] ? shmem_destroy_inode+0x70/0x70 [ 378.606691][T20722] shmem_alloc_inode+0x18/0x40 [ 378.611462][T20722] ? shmem_destroy_inode+0x70/0x70 [ 378.616574][T20722] alloc_inode+0x61/0x230 [ 378.620910][T20722] new_inode+0x27/0x2f0 09:12:18 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x5, &(0x7f0000003900)) [ 378.625079][T20722] shmem_get_inode+0x195/0xc20 [ 378.629856][T20722] __shmem_file_setup+0xb8/0x310 [ 378.634797][T20722] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 378.641050][T20722] __do_sys_memfd_create+0x26b/0x5a0 [ 378.646344][T20722] ? hmm_vma_walk_hugetlb_entry+0x8a0/0x8a0 [ 378.652249][T20722] ? syscall_enter_from_user_mode+0x27/0x70 [ 378.658177][T20722] do_syscall_64+0x2d/0x70 [ 378.662604][T20722] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 378.668504][T20722] RIP: 0033:0x466459 09:12:18 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x6, &(0x7f0000003900)) [ 378.672405][T20722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 378.692018][T20722] RSP: 002b:00007f02b8aa4f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 378.700437][T20722] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000466459 [ 378.708413][T20722] RDX: 0000000000000012 RSI: 0000000000000000 RDI: 00000000004beba8 [ 378.716388][T20722] RBP: 0000000000000002 R08: 0000000000000009 R09: ffffffffffffffff 09:12:19 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x7, &(0x7f0000003900)) [ 378.724364][T20722] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 378.732343][T20722] R13: 0000000020000140 R14: 0000000000000012 R15: 00000000200002c0 09:12:19 executing program 2 (fault-call:1 fault-nth:3): perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:19 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x48000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 378.806676][T20732] loop5: detected capacity change from 0 to 264192 09:12:19 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xf9fdffff, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:19 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x18, &(0x7f0000003900)) [ 378.946449][T20750] loop1: detected capacity change from 0 to 264192 [ 378.955388][T20752] FAULT_INJECTION: forcing a failure. [ 378.955388][T20752] name failslab, interval 1, probability 0, space 0, times 0 09:12:19 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="dc26032263f61461c40204915aa02f7364b548392aa53da772ad21c0fc809905ce1f51e097320a8431e49a28627aa878bc5c1010b0038bc93443522254634e842b6f8ca12698616cc67e640ca4990ca2cc689ccaac8820196132617c9404022d12a07a67186ec3b1553d8f4ebd3a7e4b0158f86b4d89abb7e6d0b3b937df62905e79", 0x82}, {&(0x7f0000000200)="493f224e49f76d61bb3868489295576d3a8c88c8c1028e8f6688864815e83e459f623464fe1f17bdbd104a204b8fd4af6650669e275f656082408f731630c6ed8d177e9957df52d0fb889ea6a5", 0x4d, 0x3}, {&(0x7f0000000280)="578ff97c804da7c22608297dece8b7057829a3bec2abc5e8ff459b6eb3c6f51c48c4bf5d24b044d8a63accb3d7143106dcb78f471faa26200f4a53b606d1c5c5251d411cd7c431cff974b74ab9c1791b67167c93e569b1a7189b4b4585710c2550b316840a2a08762cc27f044863c192e02802b6883cfd894ffce9aaf7567f3d5c59248732d83e5930bcd9249e5868ea60130d86dc3cf64c5ffcdfb42e92f987924071ae5828fc97002312a60ccb9d75c5693d3c0fe1405ce8da56d174bec7e584cb5d65e8228c50310ee92bb11e821ed4adef345fad7a93e94553265078d9940ad9c85c545f8027", 0xe8, 0xb3}], 0x1800, &(0x7f0000000400)={[{@nr_inodes={'nr_inodes', 0x3d, [0x25, 0x39]}}, {@mpol={'mpol', 0x3d, {'prefer', '', @val={0x3a, [0x32, 0x3a, 0x39, 0x30]}}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x31, 0x34, 0x78, 0x2d, 0x39, 0x28, 0x38, 0x32]}}], [{@smackfsdef={'smackfsdef'}}, {@dont_hash='dont_hash'}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) [ 379.004355][T20758] loop5: detected capacity change from 0 to 264192 [ 379.041366][T20752] CPU: 1 PID: 20752 Comm: syz-executor.2 Not tainted 5.12.0-rc7-syzkaller #0 [ 379.050231][T20752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.060289][T20752] Call Trace: [ 379.063566][T20752] dump_stack+0x141/0x1d7 [ 379.068005][T20752] should_fail.cold+0x5/0xa [ 379.072510][T20752] ? security_inode_alloc+0x34/0x160 [ 379.077803][T20752] ? security_inode_alloc+0x34/0x160 [ 379.083097][T20752] should_failslab+0x5/0x10 [ 379.087610][T20752] kmem_cache_alloc+0x5e/0x370 [ 379.092387][T20752] security_inode_alloc+0x34/0x160 [ 379.097512][T20752] inode_init_always+0x5d8/0xd60 [ 379.102462][T20752] alloc_inode+0x82/0x230 [ 379.106794][T20752] new_inode+0x27/0x2f0 [ 379.110959][T20752] shmem_get_inode+0x195/0xc20 [ 379.115731][T20752] __shmem_file_setup+0xb8/0x310 [ 379.120673][T20752] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 379.126925][T20752] __do_sys_memfd_create+0x26b/0x5a0 [ 379.132239][T20752] ? hmm_vma_walk_hugetlb_entry+0x8a0/0x8a0 [ 379.138130][T20752] ? syscall_enter_from_user_mode+0x27/0x70 [ 379.144038][T20752] do_syscall_64+0x2d/0x70 [ 379.148451][T20752] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 379.154347][T20752] RIP: 0033:0x466459 [ 379.158252][T20752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 379.177871][T20752] RSP: 002b:00007f02b8aa4f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 379.186273][T20752] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000466459 [ 379.194232][T20752] RDX: 0000000000000012 RSI: 0000000000000000 RDI: 00000000004beba8 [ 379.202189][T20752] RBP: 0000000000000002 R08: 0000000000000009 R09: ffffffffffffffff [ 379.210149][T20752] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 379.218108][T20752] R13: 0000000020000140 R14: 0000000000000012 R15: 00000000200002c0 09:12:19 executing program 2 (fault-call:1 fault-nth:4): perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:19 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x81000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:19 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0xf0, &(0x7f0000003900)) [ 379.337098][T20750] omfs: Invalid superblock (0) 09:12:19 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xfcfdffff, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:19 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x4c000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:19 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0xfe, &(0x7f0000003900)) 09:12:19 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x300, &(0x7f0000003900)) [ 379.479674][T20777] FAULT_INJECTION: forcing a failure. [ 379.479674][T20777] name failslab, interval 1, probability 0, space 0, times 0 [ 379.510518][T20778] loop5: detected capacity change from 0 to 264192 [ 379.565458][T20777] CPU: 1 PID: 20777 Comm: syz-executor.2 Not tainted 5.12.0-rc7-syzkaller #0 [ 379.574339][T20777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.584583][T20777] Call Trace: [ 379.587861][T20777] dump_stack+0x141/0x1d7 [ 379.592210][T20777] should_fail.cold+0x5/0xa [ 379.596724][T20777] ? __d_alloc+0x2a/0x950 [ 379.601071][T20777] ? __d_alloc+0x2a/0x950 [ 379.605410][T20777] should_failslab+0x5/0x10 [ 379.609917][T20777] kmem_cache_alloc+0x5e/0x370 [ 379.614770][T20777] ? lockdep_hardirqs_on+0x79/0x100 [ 379.619968][T20777] __d_alloc+0x2a/0x950 [ 379.624123][T20777] d_alloc_pseudo+0x19/0x70 [ 379.628624][T20777] alloc_file_pseudo+0xc6/0x250 [ 379.633468][T20777] ? alloc_file+0x5a0/0x5a0 [ 379.637962][T20777] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 379.644200][T20777] ? shmem_get_inode+0x59a/0xc20 [ 379.649135][T20777] __shmem_file_setup+0x144/0x310 [ 379.654153][T20777] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 379.660396][T20777] __do_sys_memfd_create+0x26b/0x5a0 [ 379.665683][T20777] ? hmm_vma_walk_hugetlb_entry+0x8a0/0x8a0 [ 379.671574][T20777] ? syscall_enter_from_user_mode+0x27/0x70 [ 379.677467][T20777] do_syscall_64+0x2d/0x70 [ 379.681886][T20777] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 379.687772][T20777] RIP: 0033:0x466459 [ 379.691656][T20777] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 09:12:19 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x500, 0xc) setxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="a0f6dfff0aebfa48d8ff23ca5755f82e2001c34a95adc80429b9aaa0"], 0xd, 0x2) umount2(0x0, 0x0) [ 379.711260][T20777] RSP: 002b:00007f02b8aa4f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 379.719671][T20777] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000466459 [ 379.727635][T20777] RDX: 0000000000000012 RSI: 0000000000000000 RDI: 00000000004beba8 [ 379.735598][T20777] RBP: 0000000000000002 R08: 0000000000000009 R09: ffffffffffffffff [ 379.743558][T20777] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 379.751521][T20777] R13: 0000000020000140 R14: 0000000000000012 R15: 00000000200002c0 09:12:20 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xfdfdffff, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:20 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x500, &(0x7f0000003900)) [ 379.787875][T20797] loop5: detected capacity change from 0 to 264192 [ 379.799601][T20795] loop1: detected capacity change from 0 to 264192 09:12:20 executing program 2 (fault-call:1 fault-nth:5): perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:20 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x8cffffff, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 380.044922][T20795] omfs: Invalid superblock (0) 09:12:20 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xfdffffff, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:20 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x600, &(0x7f0000003900)) [ 380.104528][T20816] FAULT_INJECTION: forcing a failure. [ 380.104528][T20816] name failslab, interval 1, probability 0, space 0, times 0 [ 380.156857][T20817] loop5: detected capacity change from 0 to 264192 [ 380.165201][T20816] CPU: 1 PID: 20816 Comm: syz-executor.2 Not tainted 5.12.0-rc7-syzkaller #0 [ 380.173975][T20816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.184020][T20816] Call Trace: [ 380.187291][T20816] dump_stack+0x141/0x1d7 [ 380.191620][T20816] should_fail.cold+0x5/0xa [ 380.196113][T20816] ? __alloc_file+0x21/0x280 [ 380.200699][T20816] ? __alloc_file+0x21/0x280 [ 380.205280][T20816] should_failslab+0x5/0x10 [ 380.209775][T20816] kmem_cache_alloc+0x5e/0x370 [ 380.214528][T20816] __alloc_file+0x21/0x280 [ 380.218939][T20816] alloc_empty_file+0x6d/0x170 [ 380.223696][T20816] alloc_file+0x5e/0x5a0 [ 380.227933][T20816] alloc_file_pseudo+0x165/0x250 [ 380.232867][T20816] ? alloc_file+0x5a0/0x5a0 [ 380.237362][T20816] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 380.243598][T20816] ? shmem_get_inode+0x59a/0xc20 [ 380.248529][T20816] __shmem_file_setup+0x144/0x310 [ 380.253546][T20816] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 380.259780][T20816] __do_sys_memfd_create+0x26b/0x5a0 [ 380.265056][T20816] ? hmm_vma_walk_hugetlb_entry+0x8a0/0x8a0 [ 380.270938][T20816] ? syscall_enter_from_user_mode+0x27/0x70 [ 380.276828][T20816] do_syscall_64+0x2d/0x70 [ 380.281265][T20816] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 380.287170][T20816] RIP: 0033:0x466459 [ 380.291055][T20816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 380.310654][T20816] RSP: 002b:00007f02b8aa4f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 380.319057][T20816] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000466459 [ 380.327015][T20816] RDX: 0000000000000012 RSI: 0000000000000000 RDI: 00000000004beba8 [ 380.334973][T20816] RBP: 0000000000000002 R08: 0000000000000009 R09: ffffffffffffffff [ 380.342949][T20816] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 09:12:20 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x60000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 380.350905][T20816] R13: 0000000020000140 R14: 0000000000000012 R15: 00000000200002c0 09:12:20 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x820, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x400}}], [{@smackfshat={'smackfshat', 0x3d, 'ocfs2_dlmfs\x00'}}]}}) 09:12:20 executing program 2 (fault-call:1 fault-nth:6): perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 380.466703][T20827] loop1: detected capacity change from 0 to 264192 [ 380.477139][T20831] loop5: detected capacity change from 0 to 264192 09:12:20 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x90485041, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:20 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x700, &(0x7f0000003900)) [ 380.582477][T20839] FAULT_INJECTION: forcing a failure. [ 380.582477][T20839] name failslab, interval 1, probability 0, space 0, times 0 [ 380.596369][T20827] omfs: Invalid superblock (0) [ 380.606800][T20839] CPU: 0 PID: 20839 Comm: syz-executor.2 Not tainted 5.12.0-rc7-syzkaller #0 [ 380.615662][T20839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.625717][T20839] Call Trace: 09:12:20 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x1800, &(0x7f0000003900)) [ 380.628996][T20839] dump_stack+0x141/0x1d7 [ 380.633342][T20839] should_fail.cold+0x5/0xa [ 380.637856][T20839] ? security_file_alloc+0x34/0x170 [ 380.643062][T20839] ? security_file_alloc+0x34/0x170 [ 380.648266][T20839] should_failslab+0x5/0x10 [ 380.652781][T20839] kmem_cache_alloc+0x5e/0x370 [ 380.657553][T20839] security_file_alloc+0x34/0x170 [ 380.662585][T20839] __alloc_file+0xd8/0x280 [ 380.667018][T20839] alloc_empty_file+0x6d/0x170 [ 380.671792][T20839] alloc_file+0x5e/0x5a0 [ 380.676045][T20839] alloc_file_pseudo+0x165/0x250 09:12:20 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x2000, &(0x7f0000003900)) [ 380.680991][T20839] ? alloc_file+0x5a0/0x5a0 [ 380.685503][T20839] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 380.691758][T20839] ? shmem_get_inode+0x59a/0xc20 [ 380.696707][T20839] __shmem_file_setup+0x144/0x310 [ 380.701737][T20839] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 380.707989][T20839] __do_sys_memfd_create+0x26b/0x5a0 [ 380.713280][T20839] ? hmm_vma_walk_hugetlb_entry+0x8a0/0x8a0 [ 380.719182][T20839] ? syscall_enter_from_user_mode+0x27/0x70 [ 380.725087][T20839] do_syscall_64+0x2d/0x70 09:12:21 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xfeffffff, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 380.729608][T20839] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 380.735514][T20839] RIP: 0033:0x466459 [ 380.739413][T20839] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 380.759203][T20839] RSP: 002b:00007f02b8aa4f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 380.767627][T20839] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000466459 [ 380.775599][T20839] RDX: 0000000000000012 RSI: 0000000000000000 RDI: 00000000004beba8 09:12:21 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0xf000, &(0x7f0000003900)) 09:12:21 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0xfeff, &(0x7f0000003900)) [ 380.783572][T20839] RBP: 0000000000000002 R08: 0000000000000009 R09: ffffffffffffffff [ 380.791550][T20839] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 380.799774][T20839] R13: 0000000020000140 R14: 0000000000000012 R15: 00000000200002c0 09:12:21 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x68000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:21 executing program 2 (fault-call:1 fault-nth:7): perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:21 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0xfffe, &(0x7f0000003900)) [ 380.877359][T20843] loop5: detected capacity change from 0 to 264192 [ 380.953590][T20860] loop5: detected capacity change from 0 to 264192 [ 381.007460][T20867] loop1: detected capacity change from 0 to 264192 09:12:21 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x4, &(0x7f0000000540)=[{&(0x7f0000000240)="27468f06f8c6df05c1a2cea0b9bac10129c6001de9c63a57d5a7fe992bb5bebfba16aeca9e400cffd1496f0e74f519149b2d899bcca51225e5364fc923af27c7548504344a", 0x45, 0x1f}, {&(0x7f00000002c0)="52d46fc7231247fd7216a61cdf0479bc7e4c78ab54c0a1bed8374434ef498002868ff3e6f20f796f179d3d7c41a105c0606bee85cdfa5f83bec5f067eae563b440d1a62bcda1ae14085f15211c851c553611ebda695cb55f4c37f6d272b67300656fa1c2cd12d281ed9dfd18ddaf49c2007e01cc75a4f7e97d2b809ef4c129196fb747e1b007a05dde9d1e84051c74cfce2ae57ffba348fa3378babae84320e641b76f2200f39369236a97b811cd07ea2159553bf8507a03be818d5d19c469d51b70041837aa2a4ffa3d0c693e34a65784f8642eefbac7", 0xd7}, {&(0x7f00000003c0)="22dcd52b8f78f07e36a024a4d600d0b56dc8de9d7b7d5a6259a1ce690913fa9e20182357d25053c39d224f7b78853b038034d9161e0474ebc34fd6306b48f11586dd1d70731071567370d34982b44f7d78338aa691b376a1d63f586e39d80df8413ad474c2c9a622ba0c8c922a35af24c373bacbb8a9918ab7dde1cf6da5dc111fe4018400c3589ae5bc9596fb8e34f21e2e465c2e518ec195877916b94ea5c47baad7bdf0a6cc783b107a6c8f", 0xad, 0x9}, {&(0x7f0000000480)="0105c2ed829f308e042e27f7fd0345e59a2177b83b14c6def8913c63b460669e1884879fa1545a4dc2b004be302c03abdcad3a9b6d157137399cab58553cbe9f24212ed809264c6967c6e8efcbb2d206bf0f51c49b933afaca715e502270b212da7c0e8f80729d7bf2f8e81976e785dd9d7545f1ecbe8f920b33c630f99d5d4a9e61574c8a7c28111e4625f4bd413502dc1f215eb2fda6abd769e11cca449cd88722da0f97806fa593f1c2c47391", 0xae, 0x1}], 0x20, &(0x7f00000005c0)={[{@nodots='nodots'}, {@nodots='nodots'}], [{@context={'context', 0x3d, 'staff_u'}}]}) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20ncci\x00', 0x100, 0x0) openat(r0, &(0x7f0000000680)='./file1\x00', 0x0, 0x2c) truncate(&(0x7f0000000600)='./file0\x00', 0x8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=@getchain={0x34, 0x66, 0x100, 0x70bd2a, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0xfff2}, {0xa, 0xffff}, {0x8, 0x7}}, [{0x8, 0xb, 0x2}, {0x8, 0xb, 0x6}]}, 0x34}, 0x1, 0x0, 0x0, 0x24048001}, 0x8000) 09:12:21 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x97ffffff, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 381.072131][T20875] FAULT_INJECTION: forcing a failure. [ 381.072131][T20875] name failslab, interval 1, probability 0, space 0, times 0 [ 381.092604][T20875] CPU: 1 PID: 20875 Comm: syz-executor.2 Not tainted 5.12.0-rc7-syzkaller #0 [ 381.101380][T20875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.111443][T20875] Call Trace: [ 381.114727][T20875] dump_stack+0x141/0x1d7 [ 381.119067][T20875] should_fail.cold+0x5/0xa [ 381.123569][T20875] ? tomoyo_realpath_from_path+0xc3/0x620 [ 381.129282][T20875] should_failslab+0x5/0x10 [ 381.133778][T20875] __kmalloc+0x72/0x310 [ 381.137931][T20875] tomoyo_realpath_from_path+0xc3/0x620 [ 381.143473][T20875] ? tomoyo_profile+0x42/0x50 [ 381.148145][T20875] tomoyo_path_perm+0x21b/0x400 [ 381.152994][T20875] ? tomoyo_path_perm+0x1c1/0x400 [ 381.158029][T20875] ? tomoyo_check_open_permission+0x380/0x380 [ 381.164105][T20875] ? find_held_lock+0x2d/0x110 [ 381.168887][T20875] security_path_truncate+0xcf/0x140 [ 381.174171][T20875] do_sys_ftruncate+0x52f/0x8c0 [ 381.179022][T20875] do_syscall_64+0x2d/0x70 [ 381.183997][T20875] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 381.189885][T20875] RIP: 0033:0x466417 [ 381.193771][T20875] Code: 48 89 e7 e8 cb e5 ff ff 48 8b 4c 24 18 64 48 2b 0c 25 28 00 00 00 75 05 48 83 c4 28 c3 e8 11 1a 00 00 90 b8 4d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 [ 381.213370][T20875] RSP: 002b:00007f02b8aa4f48 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 381.221776][T20875] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000466417 [ 381.229736][T20875] RDX: 0000000000000012 RSI: 0000000000000012 RDI: 0000000000000005 [ 381.237695][T20875] RBP: 0000000000000002 R08: 0000000000000009 R09: ffffffffffffffff [ 381.245657][T20875] R10: 0000000000000002 R11: 0000000000000217 R12: 0000000000000005 [ 381.253616][T20875] R13: 0000000000000005 R14: 0000000000000012 R15: 00000000200002c0 [ 381.266072][T20875] ERROR: Out of memory at tomoyo_realpath_from_path. 09:12:21 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xff000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 381.336626][T20867] omfs: Invalid superblock (0) 09:12:21 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x200000, &(0x7f0000003900)) [ 381.377279][T20875] befs: Unrecognized mount option "{Ù" or missing value [ 381.384783][T20875] befs: (loop2): cannot parse mount options [ 381.391477][T20883] loop5: detected capacity change from 0 to 264192 09:12:21 executing program 2 (fault-call:1 fault-nth:8): perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:21 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x6c000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:21 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0xf0ffff, &(0x7f0000003900)) 09:12:21 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xff0f0000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:21 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xc0ed0000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 381.729897][T20909] FAULT_INJECTION: forcing a failure. [ 381.729897][T20909] name failslab, interval 1, probability 0, space 0, times 0 [ 381.768620][T20909] CPU: 0 PID: 20909 Comm: syz-executor.2 Not tainted 5.12.0-rc7-syzkaller #0 [ 381.777422][T20909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.787482][T20909] Call Trace: [ 381.790763][T20909] dump_stack+0x141/0x1d7 [ 381.795108][T20909] should_fail.cold+0x5/0xa [ 381.799625][T20909] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 381.804999][T20909] should_failslab+0x5/0x10 [ 381.809512][T20909] __kmalloc+0x72/0x310 [ 381.813681][T20909] tomoyo_encode2.part.0+0xe9/0x3a0 [ 381.818889][T20909] tomoyo_encode+0x28/0x50 [ 381.823399][T20909] tomoyo_realpath_from_path+0x186/0x620 [ 381.829040][T20909] ? tomoyo_profile+0x42/0x50 [ 381.833725][T20909] tomoyo_path_perm+0x21b/0x400 [ 381.838758][T20909] ? tomoyo_path_perm+0x1c1/0x400 [ 381.843967][T20909] ? tomoyo_check_open_permission+0x380/0x380 [ 381.850487][T20909] ? find_held_lock+0x2d/0x110 [ 381.855664][T20909] security_path_truncate+0xcf/0x140 [ 381.861072][T20909] do_sys_ftruncate+0x52f/0x8c0 [ 381.866122][T20909] do_syscall_64+0x2d/0x70 [ 381.870534][T20909] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 381.876414][T20909] RIP: 0033:0x466417 [ 381.880469][T20909] Code: 48 89 e7 e8 cb e5 ff ff 48 8b 4c 24 18 64 48 2b 0c 25 28 00 00 00 75 05 48 83 c4 28 c3 e8 11 1a 00 00 90 b8 4d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 [ 381.900455][T20909] RSP: 002b:00007f02b8aa4f48 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 381.908870][T20909] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000466417 [ 381.916832][T20909] RDX: 0000000000000012 RSI: 0000000000000012 RDI: 0000000000000005 09:12:22 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x1000000, &(0x7f0000003900)) 09:12:22 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000040)='squashfs\x00', &(0x7f0000000080)='./file1\x00', 0x4, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)="7e2d17", 0x3, 0x4}, {&(0x7f0000000180)="631ad00760e5965a218ff257669f604e8031ab057852513284ea41f1d62d5ed472c5f30581d428cf36e8c36aee6ce35dbf9adcb785bab39abece0bf4b5b3b57e3663272234da6fa1f8a3dd343404c6f0039741da1996c5c0f5aa3f1cf024f72f05150e6263d50c829b85b9347a5c7bcb4b423a9930ccdae9e96dd6b0426a1703f8a0702c5178a011b0bb2446a564a7308c522fc2a22f7da8e414526e519f26c348cbbfd4794c8a9b13c28d333eb33907", 0xb0, 0xfe4}, {&(0x7f0000000240)="5fd0dc613134eb0fa48aa0abf76a2d07768e1a6851e87f4b4feeb9c237468a1a5e8f9ff330e55950d890e9df5b39898c009f839feb01f0e62d6d6c595f4ee25a6cec8c32d3294eb815f4199e63eaad1f474be55d66deaa76fe59ee", 0x5b, 0x9}, {&(0x7f00000002c0)="0b64dcf958ee9cac45cb8c42fe57d13300af38778e73f40b43c1ab6e6676c8981664e061048076d9fd72eeae84ac0386f11669de9d0140a6bc7a10f653f19fe539c2f71c07431e88543132d566e278b99b7d4c6cc3b5328391ad16a8e7ef21fa634c467d1d48f9a88290757c2368a022a0bb3974abb24aa85f0720834d37173e8e7d1d181130cc38e820696673a75da118cf2060a6165e36d19914173cd3ab7963a8f6492c", 0xa5, 0x7}], 0x1000808, &(0x7f0000000400)={[{','}, {'ocfs2_dlmfs\x00'}, {'ocfs2_dlmfs\x00'}], [{@fsuuid={'fsuuid', 0x3d, {[0x63, 0x62, 0x31, 0x37, 0x65, 0x34, 0x36, 0x39], 0x2d, [0x31, 0x37, 0x61, 0x38], 0x2d, [0x37, 0x61, 0x35, 0x36], 0x2d, [0x38, 0x39, 0x31, 0x37], 0x2d, [0x62, 0x34, 0x33, 0x36, 0x39, 0x34, 0x61, 0x37]}}}]}) umount2(0x0, 0x0) [ 381.924791][T20909] RBP: 0000000000000002 R08: 0000000000000009 R09: ffffffffffffffff [ 381.932747][T20909] R10: 0000000000000002 R11: 0000000000000217 R12: 0000000000000005 [ 381.940897][T20909] R13: 0000000000000005 R14: 0000000000000012 R15: 00000000200002c0 09:12:22 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xfffffdf9, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 381.999819][T20909] ERROR: Out of memory at tomoyo_realpath_from_path. [ 382.007749][T20914] loop1: detected capacity change from 0 to 264192 [ 382.036925][T20914] omfs: Invalid superblock (0) [ 382.092374][T20922] loop5: detected capacity change from 0 to 264192 [ 382.131008][T20909] befs: Unrecognized mount option "{Ù" or missing value 09:12:22 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x74000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 382.139893][T20909] befs: (loop2): cannot parse mount options 09:12:22 executing program 2 (fault-call:1 fault-nth:9): perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 382.183568][T20932] loop3: detected capacity change from 0 to 15 [ 382.208243][T20932] squashfs: Unknown parameter 'ocfs2_dlmfs' 09:12:22 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x2000000, &(0x7f0000003900)) [ 382.252732][T20939] loop5: detected capacity change from 0 to 264192 [ 382.254425][T20944] FAULT_INJECTION: forcing a failure. [ 382.254425][T20944] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 382.317863][T20944] CPU: 1 PID: 20944 Comm: syz-executor.2 Not tainted 5.12.0-rc7-syzkaller #0 [ 382.326835][T20944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.336894][T20944] Call Trace: [ 382.340174][T20944] dump_stack+0x141/0x1d7 [ 382.344521][T20944] should_fail.cold+0x5/0xa [ 382.349038][T20944] __alloc_pages_nodemask+0x189/0x730 [ 382.354618][T20944] ? __alloc_pages_slowpath.constprop.0+0x2270/0x2270 [ 382.361391][T20944] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 382.367366][T20944] ? mark_lock+0xef/0x17b0 [ 382.371783][T20944] alloc_pages_vma+0xdd/0x770 [ 382.376460][T20944] shmem_alloc_page+0x11f/0x1f0 [ 382.381308][T20944] ? shmem_link+0x360/0x360 [ 382.385800][T20944] ? lock_downgrade+0x6e0/0x6e0 [ 382.390659][T20944] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 382.396896][T20944] ? percpu_counter_add_batch+0xbd/0x180 [ 382.402527][T20944] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 382.408325][T20944] ? __vm_enough_memory+0x184/0x360 [ 382.413527][T20944] shmem_alloc_and_acct_page+0x161/0x8a0 [ 382.419164][T20944] shmem_getpage_gfp+0x558/0x2480 [ 382.424213][T20944] ? shmem_mfill_atomic_pte+0x1d70/0x1d70 [ 382.429929][T20944] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 382.436173][T20944] ? iov_iter_fault_in_readable+0x1f9/0x3f0 [ 382.442062][T20944] shmem_write_begin+0xf9/0x1d0 [ 382.446908][T20944] generic_perform_write+0x20a/0x4f0 [ 382.452195][T20944] ? generic_file_readonly_mmap+0x1b0/0x1b0 [ 382.458081][T20944] ? current_time+0x2c0/0x2c0 [ 382.462767][T20944] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 382.468478][T20944] ? generic_write_checks+0x2a9/0x380 [ 382.473852][T20944] __generic_file_write_iter+0x24e/0x610 [ 382.479486][T20944] generic_file_write_iter+0xd7/0x220 [ 382.484852][T20944] ? iov_iter_init+0x3c/0x130 [ 382.489522][T20944] new_sync_write+0x426/0x650 [ 382.494194][T20944] ? new_sync_read+0x6e0/0x6e0 [ 382.498953][T20944] ? lock_release+0x720/0x720 [ 382.503619][T20944] ? apparmor_file_permission+0x26e/0x4e0 [ 382.509343][T20944] vfs_write+0x796/0xa30 [ 382.513580][T20944] __x64_sys_pwrite64+0x1fd/0x250 [ 382.518602][T20944] ? ksys_pwrite64+0x1a0/0x1a0 [ 382.523360][T20944] ? syscall_enter_from_user_mode+0x27/0x70 [ 382.529268][T20944] do_syscall_64+0x2d/0x70 [ 382.533679][T20944] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 382.539566][T20944] RIP: 0033:0x4195f7 [ 382.543451][T20944] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b 09:12:22 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x3000000, &(0x7f0000003900)) [ 382.563051][T20944] RSP: 002b:00007f02b8aa4f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 382.571455][T20944] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 00000000004195f7 [ 382.579418][T20944] RDX: 0000000000000046 RSI: 0000000020000200 RDI: 0000000000000005 [ 382.587376][T20944] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 382.595336][T20944] R10: 0000000000000009 R11: 0000000000000293 R12: 0000000000000005 [ 382.603298][T20944] R13: 0000000000000005 R14: 0000000020000298 R15: 0000000000000001 [ 382.674772][T20945] loop3: detected capacity change from 0 to 15 [ 382.681972][T20945] squashfs: Unknown parameter 'ocfs2_dlmfs' 09:12:23 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x4000000, &(0x7f0000003900)) 09:12:23 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xfffffdfc, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:23 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xf6ffffff, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:23 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xf9fdffff, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:23 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x5000000, &(0x7f0000003900)) [ 382.818117][T20958] loop1: detected capacity change from 0 to 264192 [ 382.830034][T20964] loop5: detected capacity change from 0 to 264192 [ 382.843235][T20944] befs: Unrecognized mount option "{Ù" or missing value [ 382.891654][T20944] befs: (loop2): cannot parse mount options 09:12:23 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) syz_mount_image$ocfs2(&(0x7f0000000300)='ocfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f00000004c0)=[{&(0x7f0000000380)="af4880d2a76f40e5a23a221ac817ec80ff5387156f7d25285416049b7583d256ead373e1f23c63f465e0d89b", 0x2c, 0x3ff}, {&(0x7f00000003c0)="aa50131909afeb4690d63a1abfba1c1203a691d999b31b2083ffcc8b2b5a18bb153796428d43cc358024faadfe50ce6af83545945163a322809c1764b9003b67cab474e88bb95651e77e8554d47ac858cf4a7534ebf3f2be210f62d0afcb264accd3f08c9e0e6a40fe8f9fdd74a39f27f753b60067a4defc9b88f877759e94307e7cf71e4a33ffe5b498eba18c0be158fc1c89f26bb1543bac11817d6f8c64d5b57350f4a1ed591b", 0xa8, 0x9}, {&(0x7f0000000280)="89faad35b35e077c2d997d5ede2b3071514b55c4d1bc", 0x16, 0x1ff}], 0x10a0080, &(0x7f0000000600)={[{'J]'}, {'afs\x00'}, {'/dev/md0\x00'}, {'overlay\x00'}, {'+'}, {'})[\\\x00'}], [{@fowner_eq={'fowner', 0x3d, r1}}]}) creat(&(0x7f0000000680)='./file2\x00', 0xd0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2469878261f3988304"], &(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='dax\x00', 0x1111021, &(0x7f0000000640)='ocfs2_dlmfs\x00') mount(&(0x7f0000000200)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='incremental-fs\x00', 0x2041, &(0x7f00000002c0)='\xa9\xf9[\\\x00') mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x4000010, r0, 0x551e7000) umount2(0x0, 0x0) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7) mkdir(&(0x7f00000001c0)='./file0\x00', 0x10) [ 382.939716][T20958] omfs: Invalid superblock (0) 09:12:23 executing program 2 (fault-call:1 fault-nth:10): perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:23 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xfffffdfd, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:23 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7a000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:23 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x6000000, &(0x7f0000003900)) [ 383.134386][T20981] loop5: detected capacity change from 0 to 264192 [ 383.211137][T20988] FAULT_INJECTION: forcing a failure. [ 383.211137][T20988] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 383.224689][T20988] CPU: 0 PID: 20988 Comm: syz-executor.2 Not tainted 5.12.0-rc7-syzkaller #0 [ 383.233601][T20988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.243837][T20988] Call Trace: [ 383.247102][T20988] dump_stack+0x141/0x1d7 [ 383.251431][T20988] should_fail.cold+0x5/0xa [ 383.256111][T20988] iov_iter_copy_from_user_atomic+0x411/0xc50 [ 383.262166][T20988] ? shmem_write_begin+0xf9/0x1d0 [ 383.267654][T20988] ? shmem_write_begin+0x103/0x1d0 [ 383.272755][T20988] generic_perform_write+0x277/0x4f0 [ 383.278040][T20988] ? generic_file_readonly_mmap+0x1b0/0x1b0 [ 383.281076][T20996] loop3: detected capacity change from 0 to 3 [ 383.283938][T20988] ? current_time+0x2c0/0x2c0 [ 383.283963][T20988] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 383.283989][T20988] ? generic_write_checks+0x2a9/0x380 [ 383.284022][T20988] __generic_file_write_iter+0x24e/0x610 [ 383.311792][T20988] generic_file_write_iter+0xd7/0x220 [ 383.317756][T20988] ? iov_iter_init+0x3c/0x130 [ 383.322430][T20988] new_sync_write+0x426/0x650 [ 383.327102][T20988] ? new_sync_read+0x6e0/0x6e0 [ 383.331868][T20988] ? lock_acquire+0x1ef/0x740 [ 383.336732][T20988] ? lock_release+0x720/0x720 [ 383.341402][T20988] ? apparmor_file_permission+0x26e/0x4e0 [ 383.347130][T20988] vfs_write+0x796/0xa30 [ 383.351394][T20988] __x64_sys_pwrite64+0x1fd/0x250 [ 383.356426][T20988] ? ksys_pwrite64+0x1a0/0x1a0 [ 383.361180][T20988] ? syscall_enter_from_user_mode+0x27/0x70 [ 383.367280][T20988] do_syscall_64+0x2d/0x70 [ 383.371690][T20988] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 383.377590][T20988] RIP: 0033:0x4195f7 [ 383.381471][T20988] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 383.401084][T20988] RSP: 002b:00007f02b8aa4f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 383.409711][T20988] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 00000000004195f7 [ 383.417670][T20988] RDX: 0000000000000046 RSI: 0000000020000200 RDI: 0000000000000005 [ 383.425643][T20988] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 383.433611][T20988] R10: 0000000000000009 R11: 0000000000000293 R12: 0000000000000005 [ 383.441569][T20988] R13: 0000000000000005 R14: 0000000020000298 R15: 0000000000000001 [ 383.494655][T20993] loop1: detected capacity change from 0 to 264192 [ 383.531529][T20996] loop3: detected capacity change from 0 to 3 09:12:23 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xffffff7f, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 383.604068][T21003] loop5: detected capacity change from 0 to 264192 09:12:23 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfcfdffff, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:23 executing program 3: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='configfs\x00', 0x0, 0x0) umount2(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x50b0c0, 0x8) 09:12:23 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x7000000, &(0x7f0000003900)) [ 383.678908][T20988] befs: Unrecognized mount option "{Ù" or missing value [ 383.692083][T20988] befs: (loop2): cannot parse mount options [ 383.744244][T20993] omfs: Invalid superblock (0) 09:12:24 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x18000000, &(0x7f0000003900)) 09:12:24 executing program 2 (fault-call:1 fault-nth:11): perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:24 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xffffff8c, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:24 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x873d99c2, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 383.895403][T21030] loop5: detected capacity change from 0 to 264192 09:12:24 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=""/245, 0xf5) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) mount(&(0x7f0000000280)=@sr0='/dev/sr0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='hpfs\x00', 0x4, &(0x7f0000000340)='&/\x00') [ 384.035116][T21041] loop5: detected capacity change from 0 to 264192 [ 384.058654][T21045] FAULT_INJECTION: forcing a failure. [ 384.058654][T21045] name failslab, interval 1, probability 0, space 0, times 0 [ 384.082532][T21047] loop1: detected capacity change from 0 to 264192 [ 384.102115][T21045] CPU: 1 PID: 21045 Comm: syz-executor.2 Not tainted 5.12.0-rc7-syzkaller #0 [ 384.110976][T21045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.121157][T21045] Call Trace: [ 384.124619][T21045] dump_stack+0x141/0x1d7 [ 384.128951][T21045] should_fail.cold+0x5/0xa [ 384.133445][T21045] ? getname_flags.part.0+0x50/0x4f0 [ 384.138725][T21045] ? getname_flags.part.0+0x50/0x4f0 [ 384.144000][T21045] should_failslab+0x5/0x10 [ 384.148494][T21045] kmem_cache_alloc+0x5e/0x370 [ 384.153248][T21045] getname_flags.part.0+0x50/0x4f0 [ 384.158350][T21045] getname+0x8e/0xd0 [ 384.162234][T21045] do_sys_openat2+0xf5/0x420 [ 384.166816][T21045] ? build_open_flags+0x6f0/0x6f0 [ 384.171838][T21045] ? __context_tracking_exit+0xb8/0xe0 [ 384.177292][T21045] ? lock_downgrade+0x6e0/0x6e0 [ 384.182160][T21045] __x64_sys_openat+0x13f/0x1f0 [ 384.187003][T21045] ? __ia32_sys_open+0x1c0/0x1c0 [ 384.191935][T21045] ? syscall_enter_from_user_mode+0x27/0x70 [ 384.197820][T21045] do_syscall_64+0x2d/0x70 [ 384.202233][T21045] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 384.208116][T21045] RIP: 0033:0x419544 [ 384.212000][T21045] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 09:12:24 executing program 2 (fault-call:1 fault-nth:12): perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 384.231595][T21045] RSP: 002b:00007f02b8aa4ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 384.239996][T21045] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000419544 [ 384.247956][T21045] RDX: 0000000000000002 RSI: 00007f02b8aa5000 RDI: 00000000ffffff9c [ 384.255913][T21045] RBP: 00007f02b8aa5000 R08: 0000000000000000 R09: ffffffffffffffff [ 384.263977][T21045] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 384.271953][T21045] R13: 0000000000000005 R14: 00000000200002b0 R15: 0000000000000002 09:12:24 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0xf6ffffff, &(0x7f0000003900)) 09:12:24 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xffffff97, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:24 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfdfdffff, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 384.393270][T21047] omfs: Invalid superblock (0) 09:12:24 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) r1 = syz_mount_image$nfs4(&(0x7f0000000040)='nfs4\x00', &(0x7f00000002c0)='.\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000140)="e2776a64f8ae1c5301fc274e1f2ed812dfee908e349933322015914f3958d1a29f2371fd63c30be85809a291c7a33009be5a3352d11bb16f0d754f72e3cfacbd3dc94fb523b7efffc27e5f691cb38b6d7d68359d71913b0fcd9e5a5a7108936f7fd6961a5816768609ca2a7cb2b90adb57a2df08f5e56d69045c9645ad602186db6adf46d65a57035e113090533b309c4e665603cb8d1d80630406e803d0c0661f79a1e16e6c86aa866c60851169caab92558c3a3cb72a448c36d4773ef982cd0449d2f0388e41a6cc58bf7942875d82", 0xd0, 0x3}], 0x10, &(0x7f0000000280)=ANY=[@ANYRES16=r0, @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) openat(r1, &(0x7f0000000300)='./file0\x00', 0x636202, 0x0) 09:12:24 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x88030000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 384.451446][T21057] FAULT_INJECTION: forcing a failure. [ 384.451446][T21057] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 384.538328][T21067] loop5: detected capacity change from 0 to 264192 [ 384.551104][T21057] CPU: 0 PID: 21057 Comm: syz-executor.2 Not tainted 5.12.0-rc7-syzkaller #0 [ 384.559881][T21057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.569933][T21057] Call Trace: [ 384.573213][T21057] dump_stack+0x141/0x1d7 [ 384.577557][T21057] should_fail.cold+0x5/0xa [ 384.582075][T21057] strncpy_from_user+0x34/0x3e0 [ 384.586941][T21057] getname_flags.part.0+0x95/0x4f0 [ 384.592062][T21057] getname+0x8e/0xd0 [ 384.595961][T21057] do_sys_openat2+0xf5/0x420 [ 384.600558][T21057] ? build_open_flags+0x6f0/0x6f0 [ 384.605586][T21057] ? __context_tracking_exit+0xb8/0xe0 [ 384.611033][T21057] ? lock_downgrade+0x6e0/0x6e0 [ 384.615873][T21057] __x64_sys_openat+0x13f/0x1f0 [ 384.620714][T21057] ? __ia32_sys_open+0x1c0/0x1c0 [ 384.625654][T21057] ? syscall_enter_from_user_mode+0x27/0x70 [ 384.631534][T21057] do_syscall_64+0x2d/0x70 [ 384.635939][T21057] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 384.641820][T21057] RIP: 0033:0x419544 [ 384.645893][T21057] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 384.665889][T21057] RSP: 002b:00007f02b8aa4ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 384.674290][T21057] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000419544 09:12:24 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xfffffff6, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:24 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0xfcfdffff, &(0x7f0000003900)) [ 384.682450][T21057] RDX: 0000000000000002 RSI: 00007f02b8aa5000 RDI: 00000000ffffff9c [ 384.690133][T21074] nfs4: Unknown parameter 'ÿÿ00000000000000060929' [ 384.690406][T21057] RBP: 00007f02b8aa5000 R08: 0000000000000000 R09: ffffffffffffffff [ 384.704848][T21057] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 384.712815][T21057] R13: 0000000000000005 R14: 00000000200002b0 R15: 0000000000000002 09:12:25 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x92200, 0x0) readlinkat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/102400, 0x19000) [ 384.772110][T21080] loop5: detected capacity change from 0 to 264192 09:12:25 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfdffffff, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:25 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="00000700000000000000003cdc7537ac8bfcc9bff4338b29ac15f546ea234c145a67b07ccbbaa8c166fb0e86c1d3d398b356a153792e6d2052a4d923075c7c7e4fd1030bba7cb79f8ad025b72ee9bc29d696e3e7a0476f7efe0982c2adc57d571db10f3c04000000e909b77ba0ea3a3bc60a0afe71b8628ff155ba945dfb8c8590242755aba4477d5d8e7bd1d87c51f099d698"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='hostfs\x00', 0x2040090, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) ftruncate(r0, 0xfffffffffffffffc) umount2(0x0, 0x0) [ 384.891492][T21087] loop1: detected capacity change from 0 to 264192 09:12:25 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0xfeffffff, &(0x7f0000003900)) [ 385.027502][T21098] loop5: detected capacity change from 0 to 264192 09:12:25 executing program 2 (fault-call:1 fault-nth:13): perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:25 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xfffffffd, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:25 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x66) umount2(0x0, 0x0) [ 385.083020][T21087] omfs: Invalid superblock (0) 09:12:25 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x8cffffff, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 385.164030][T21112] loop5: detected capacity change from 0 to 264192 09:12:25 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfeffffff, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:25 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0xfffff000, &(0x7f0000003900)) [ 385.236761][T21109] FAULT_INJECTION: forcing a failure. [ 385.236761][T21109] name failslab, interval 1, probability 0, space 0, times 0 [ 385.270826][T21109] CPU: 0 PID: 21109 Comm: syz-executor.2 Not tainted 5.12.0-rc7-syzkaller #0 [ 385.279701][T21109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.289755][T21109] Call Trace: [ 385.293032][T21109] dump_stack+0x141/0x1d7 [ 385.297376][T21109] should_fail.cold+0x5/0xa [ 385.301891][T21109] ? __alloc_file+0x21/0x280 [ 385.306494][T21109] ? __alloc_file+0x21/0x280 [ 385.311094][T21109] should_failslab+0x5/0x10 [ 385.315604][T21109] kmem_cache_alloc+0x5e/0x370 [ 385.320367][T21109] ? stack_trace_save+0x8c/0xc0 [ 385.325213][T21109] __alloc_file+0x21/0x280 [ 385.329643][T21109] alloc_empty_file+0x6d/0x170 [ 385.334419][T21109] path_openat+0xe3/0x27e0 [ 385.338842][T21109] ? __lock_acquire+0x16b3/0x54c0 [ 385.343896][T21109] ? path_lookupat+0x850/0x850 [ 385.348662][T21109] ? irqentry_enter+0x2b/0x50 [ 385.353347][T21109] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 385.359345][T21109] do_filp_open+0x190/0x3d0 [ 385.363852][T21109] ? may_open_dev+0xf0/0xf0 [ 385.368371][T21109] ? alloc_fd+0x2bc/0x640 [ 385.372708][T21109] ? lock_downgrade+0x6e0/0x6e0 [ 385.377566][T21109] ? do_raw_spin_lock+0x120/0x2b0 [ 385.382598][T21109] ? rwlock_bug.part.0+0x90/0x90 [ 385.387548][T21109] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 385.393802][T21109] ? _raw_spin_unlock+0x24/0x40 [ 385.398662][T21109] ? alloc_fd+0x2bc/0x640 [ 385.403028][T21109] do_sys_openat2+0x16d/0x420 [ 385.407715][T21109] ? build_open_flags+0x6f0/0x6f0 [ 385.412749][T21109] ? __context_tracking_exit+0xb8/0xe0 [ 385.418217][T21109] ? lock_downgrade+0x6e0/0x6e0 [ 385.423081][T21109] __x64_sys_openat+0x13f/0x1f0 [ 385.427939][T21109] ? __ia32_sys_open+0x1c0/0x1c0 [ 385.432894][T21109] ? syscall_enter_from_user_mode+0x27/0x70 [ 385.438801][T21109] do_syscall_64+0x2d/0x70 [ 385.443231][T21109] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 385.449133][T21109] RIP: 0033:0x419544 [ 385.453029][T21109] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 385.472640][T21109] RSP: 002b:00007f02b8aa4ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 09:12:25 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0xfffffdfc, &(0x7f0000003900)) 09:12:25 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0xfffffff6, &(0x7f0000003900)) 09:12:25 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0xfffffffe, &(0x7f0000003900)) 09:12:25 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x1000000000000, &(0x7f0000003900)) 09:12:25 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x20000000000000, &(0x7f0000003900)) [ 385.481058][T21109] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000419544 [ 385.489034][T21109] RDX: 0000000000000002 RSI: 00007f02b8aa5000 RDI: 00000000ffffff9c [ 385.497007][T21109] RBP: 00007f02b8aa5000 R08: 0000000000000000 R09: ffffffffffffffff [ 385.504981][T21109] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 385.512952][T21109] R13: 0000000000000005 R14: 00000000200002b0 R15: 0000000000000002 09:12:25 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xfffffffe, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:25 executing program 2 (fault-call:1 fault-nth:14): perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:25 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0xf0ffffffffffff, &(0x7f0000003900)) 09:12:25 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') connect(0xffffffffffffffff, &(0x7f0000000040)=@x25={0x9, @null=' \x00'}, 0x80) umount2(0x0, 0x0) [ 385.622035][T21139] loop1: detected capacity change from 0 to 264192 [ 385.660178][T21139] omfs: Invalid superblock (0) [ 385.664250][T21138] loop5: detected capacity change from 0 to 264192 09:12:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xa9260000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 385.773241][T21148] FAULT_INJECTION: forcing a failure. [ 385.773241][T21148] name failslab, interval 1, probability 0, space 0, times 0 [ 385.790484][T21148] CPU: 0 PID: 21148 Comm: syz-executor.2 Not tainted 5.12.0-rc7-syzkaller #0 [ 385.799257][T21148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.809313][T21148] Call Trace: [ 385.812593][T21148] dump_stack+0x141/0x1d7 [ 385.816940][T21148] should_fail.cold+0x5/0xa [ 385.821451][T21148] ? security_file_alloc+0x34/0x170 [ 385.826655][T21148] ? security_file_alloc+0x34/0x170 [ 385.832046][T21148] should_failslab+0x5/0x10 [ 385.836544][T21148] kmem_cache_alloc+0x5e/0x370 [ 385.841302][T21148] security_file_alloc+0x34/0x170 [ 385.846317][T21148] __alloc_file+0xd8/0x280 [ 385.850728][T21148] alloc_empty_file+0x6d/0x170 [ 385.855487][T21148] path_openat+0xe3/0x27e0 [ 385.859901][T21148] ? path_lookupat+0x850/0x850 [ 385.864653][T21148] ? lockdep_hardirqs_on+0x79/0x100 [ 385.869843][T21148] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 385.876001][T21148] do_filp_open+0x190/0x3d0 [ 385.880495][T21148] ? may_open_dev+0xf0/0xf0 [ 385.884988][T21148] ? alloc_fd+0x2bc/0x640 [ 385.889312][T21148] ? lock_downgrade+0x6e0/0x6e0 [ 385.894157][T21148] ? do_raw_spin_lock+0x120/0x2b0 [ 385.899174][T21148] ? rwlock_bug.part.0+0x90/0x90 [ 385.904105][T21148] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 385.910344][T21148] ? _raw_spin_unlock+0x24/0x40 [ 385.915189][T21148] ? alloc_fd+0x2bc/0x640 [ 385.919515][T21148] do_sys_openat2+0x16d/0x420 [ 385.924186][T21148] ? build_open_flags+0x6f0/0x6f0 [ 385.929207][T21148] ? __context_tracking_exit+0xb8/0xe0 [ 385.934657][T21148] ? lock_downgrade+0x6e0/0x6e0 [ 385.939501][T21148] __x64_sys_openat+0x13f/0x1f0 [ 385.944343][T21148] ? __ia32_sys_open+0x1c0/0x1c0 [ 385.949272][T21148] ? syscall_enter_from_user_mode+0x27/0x70 [ 385.955159][T21148] do_syscall_64+0x2d/0x70 [ 385.959568][T21148] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 385.965452][T21148] RIP: 0033:0x419544 [ 385.969333][T21148] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 385.988930][T21148] RSP: 002b:00007f02b8aa4ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 385.997334][T21148] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000419544 [ 386.005295][T21148] RDX: 0000000000000002 RSI: 00007f02b8aa5000 RDI: 00000000ffffff9c [ 386.013255][T21148] RBP: 00007f02b8aa5000 R08: 0000000000000000 R09: ffffffffffffffff [ 386.021216][T21148] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 386.029176][T21148] R13: 0000000000000005 R14: 00000000200002b0 R15: 0000000000000002 [ 386.060216][T21150] loop5: detected capacity change from 0 to 264192 09:12:26 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x100000000000000, &(0x7f0000003900)) 09:12:26 executing program 2 (fault-call:1 fault-nth:15): perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:26 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xff000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:26 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x80000000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 386.292415][T21163] loop1: detected capacity change from 0 to 264192 [ 386.326974][T21169] o2cb: This node has not been configured. [ 386.338800][T21170] loop5: detected capacity change from 0 to 264192 [ 386.361229][T21169] o2cb: Cluster check failed. Fix errors before retrying. [ 386.369019][T21169] (syz-executor.3,21169,0):user_dlm_register:663 ERROR: status = -22 [ 386.383219][T21169] (syz-executor.3,21169,0):dlmfs_mkdir:431 ERROR: Error -22 could not register domain "file0" 09:12:26 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xedc000000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 386.441127][T21178] FAULT_INJECTION: forcing a failure. [ 386.441127][T21178] name failslab, interval 1, probability 0, space 0, times 0 [ 386.510256][T21185] loop5: detected capacity change from 0 to 264192 [ 386.534546][T21178] CPU: 1 PID: 21178 Comm: syz-executor.2 Not tainted 5.12.0-rc7-syzkaller #0 [ 386.543414][T21178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.553468][T21178] Call Trace: [ 386.556746][T21178] dump_stack+0x141/0x1d7 [ 386.561089][T21178] should_fail.cold+0x5/0xa [ 386.565599][T21178] ? tomoyo_realpath_from_path+0xc3/0x620 [ 386.571321][T21178] should_failslab+0x5/0x10 [ 386.575831][T21178] __kmalloc+0x72/0x310 [ 386.579994][T21178] tomoyo_realpath_from_path+0xc3/0x620 [ 386.585542][T21178] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 386.591792][T21178] tomoyo_check_open_permission+0x272/0x380 [ 386.597694][T21178] ? tomoyo_path_number_perm+0x590/0x590 [ 386.603345][T21178] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 386.609359][T21178] ? path_get+0x5d/0x80 [ 386.613525][T21178] ? lock_downgrade+0x6e0/0x6e0 [ 386.618392][T21178] ? do_raw_spin_lock+0x120/0x2b0 [ 386.623428][T21178] tomoyo_file_open+0xa3/0xd0 [ 386.628108][T21178] security_file_open+0x52/0x4f0 [ 386.633058][T21178] do_dentry_open+0x358/0x11b0 [ 386.637835][T21178] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 386.644080][T21178] ? may_open+0x1f6/0x420 [ 386.648420][T21178] path_openat+0x1c0e/0x27e0 [ 386.653020][T21178] ? path_lookupat+0x850/0x850 [ 386.657790][T21178] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 386.663784][T21178] do_filp_open+0x190/0x3d0 [ 386.668290][T21178] ? may_open_dev+0xf0/0xf0 [ 386.672800][T21178] ? do_raw_spin_lock+0x120/0x2b0 [ 386.677832][T21178] ? rwlock_bug.part.0+0x90/0x90 [ 386.682779][T21178] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 386.689030][T21178] ? _raw_spin_unlock+0x24/0x40 [ 386.693886][T21178] ? alloc_fd+0x2bc/0x640 [ 386.698228][T21178] do_sys_openat2+0x16d/0x420 [ 386.702909][T21178] ? build_open_flags+0x6f0/0x6f0 [ 386.707941][T21178] ? __context_tracking_exit+0xb8/0xe0 [ 386.713401][T21178] ? lock_downgrade+0x6e0/0x6e0 [ 386.718263][T21178] __x64_sys_openat+0x13f/0x1f0 [ 386.723119][T21178] ? __ia32_sys_open+0x1c0/0x1c0 [ 386.728066][T21178] ? syscall_enter_from_user_mode+0x27/0x70 [ 386.733967][T21178] do_syscall_64+0x2d/0x70 [ 386.738392][T21178] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 386.744290][T21178] RIP: 0033:0x419544 [ 386.748412][T21178] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 386.768032][T21178] RSP: 002b:00007f02b8a83ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 386.776448][T21178] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000419544 [ 386.784415][T21178] RDX: 0000000000000002 RSI: 00007f02b8a84000 RDI: 00000000ffffff9c [ 386.792385][T21178] RBP: 00007f02b8a84000 R08: 0000000000000000 R09: ffffffffffffffff [ 386.800354][T21178] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 09:12:27 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfffffdf9, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:27 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x200000000000000, &(0x7f0000003900)) [ 386.808319][T21178] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 [ 386.821908][T21178] ERROR: Out of memory at tomoyo_realpath_from_path. [ 386.836711][T21178] befs: Unrecognized mount option "{Ù" or missing value [ 386.846152][T21163] omfs: Invalid superblock (0) 09:12:27 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xad260000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 386.948792][T21178] befs: (loop2): cannot parse mount options 09:12:27 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x300000000000000, &(0x7f0000003900)) 09:12:27 executing program 2 (fault-call:1 fault-nth:16): perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 387.088690][T21197] loop5: detected capacity change from 0 to 264192 [ 387.185040][T21207] loop1: detected capacity change from 0 to 264192 09:12:27 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x2000000000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:27 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x400000000000000, &(0x7f0000003900)) [ 387.370616][T21207] omfs: Invalid superblock (0) 09:12:27 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfffffdfc, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 387.400683][T21213] FAULT_INJECTION: forcing a failure. [ 387.400683][T21213] name failslab, interval 1, probability 0, space 0, times 0 [ 387.440057][T21213] CPU: 0 PID: 21213 Comm: syz-executor.2 Not tainted 5.12.0-rc7-syzkaller #0 [ 387.449147][T21213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 387.459203][T21213] Call Trace: [ 387.462484][T21213] dump_stack+0x141/0x1d7 [ 387.466831][T21213] should_fail.cold+0x5/0xa [ 387.471355][T21213] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 387.476731][T21213] should_failslab+0x5/0x10 [ 387.481242][T21213] __kmalloc+0x72/0x310 [ 387.485406][T21213] tomoyo_encode2.part.0+0xe9/0x3a0 [ 387.490616][T21213] tomoyo_encode+0x28/0x50 [ 387.495037][T21213] tomoyo_realpath_from_path+0x186/0x620 09:12:27 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x500000000000000, &(0x7f0000003900)) [ 387.500685][T21213] tomoyo_check_open_permission+0x272/0x380 [ 387.506592][T21213] ? tomoyo_path_number_perm+0x590/0x590 [ 387.512244][T21213] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 387.518250][T21213] ? path_get+0x5d/0x80 [ 387.522420][T21213] ? lock_downgrade+0x6e0/0x6e0 [ 387.527278][T21213] ? do_raw_spin_lock+0x120/0x2b0 [ 387.532319][T21213] tomoyo_file_open+0xa3/0xd0 [ 387.537004][T21213] security_file_open+0x52/0x4f0 [ 387.541953][T21213] do_dentry_open+0x358/0x11b0 [ 387.546729][T21213] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 387.552981][T21213] ? may_open+0x1f6/0x420 [ 387.557327][T21213] path_openat+0x1c0e/0x27e0 [ 387.561928][T21213] ? lock_chain_get_class+0x50/0xc0 [ 387.567138][T21213] ? path_lookupat+0x850/0x850 [ 387.571914][T21213] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 387.577914][T21213] do_filp_open+0x190/0x3d0 [ 387.582425][T21213] ? may_open_dev+0xf0/0xf0 [ 387.586949][T21213] ? alloc_fd+0xe9/0x640 [ 387.591213][T21213] ? _raw_spin_unlock+0x24/0x40 [ 387.596071][T21213] ? alloc_fd+0x2bc/0x640 09:12:27 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x600000000000000, &(0x7f0000003900)) [ 387.600419][T21213] do_sys_openat2+0x16d/0x420 [ 387.605104][T21213] ? build_open_flags+0x6f0/0x6f0 [ 387.610143][T21213] ? irqentry_enter+0x2b/0x50 [ 387.614831][T21213] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 387.621003][T21213] __x64_sys_openat+0x13f/0x1f0 [ 387.625861][T21213] ? __ia32_sys_open+0x1c0/0x1c0 [ 387.630829][T21213] do_syscall_64+0x2d/0x70 [ 387.635265][T21213] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 387.641172][T21213] RIP: 0033:0x419544 09:12:27 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x700000000000000, &(0x7f0000003900)) [ 387.645067][T21213] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 387.664683][T21213] RSP: 002b:00007f02b8aa4ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 387.673107][T21213] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000419544 [ 387.681082][T21213] RDX: 0000000000000002 RSI: 00007f02b8aa5000 RDI: 00000000ffffff9c [ 387.689055][T21213] RBP: 00007f02b8aa5000 R08: 0000000000000000 R09: ffffffffffffffff [ 387.697030][T21213] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 387.705007][T21213] R13: 0000000000000005 R14: 00000000200002b0 R15: 0000000000000002 09:12:28 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xb7030000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:28 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x1800000000000000, &(0x7f0000003900)) [ 387.825243][T21219] loop5: detected capacity change from 0 to 264192 09:12:28 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x40000000000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:28 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2000400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) r1 = creat(&(0x7f0000000140)='./file0/../file0\x00', 0x100) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000540)='./file0\x00', 0x7ff, 0x3, &(0x7f0000000300)=[{&(0x7f0000000140), 0x0, 0xf0}, {&(0x7f0000000180)="21c25344bbba005025e3398aa21725f5cdfd2ebeafa96acccfece14d757921c328fdff9acea6630da4cf9ab209b88b882e5046b38c16c9caa88432338f190f24258d6d9f2ef84190e044c934b0e735a3b84aaf8ce7f5", 0x56, 0xcf}, {&(0x7f0000000200)="4ebfadfa53b8c80749f22b15252f5a04892097d96d4bb9c516fbe6428cacde306f5989bd81c4d8e198ef80d7c1b38c4404c8ff60bf1a9ef679eb3b6ecb62496de88c7973383659a04ad52a21cf663b8cf9011b9908c59359731faab3af3a2f45f20c24954575ec11f1bd5a064ad7c16d9c8b2e3fcb1e7e2a4b9f1fef002df0da7e4223a61de1ddcd0a33188991bd83990d5a4043e754f89efe115549d3d986c3d0dd6a241b7f4fe4821fa5df4833465f83fe0e99621b4eee43846ae1aa993287b6da54edf842ff04cdba953a50f8e1044249ec33f34fa838c12f34e5925e5368df8e", 0xe2, 0x2}], 0x1004, &(0x7f00000004c0)={[{@fat=@umask={'umask', 0x3d, 0x22}}, {@nodots='nodots'}], [{@euid_eq={'euid', 0x3d, r0}}]}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000180)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0x80082102, &(0x7f0000000200)={r3}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x40082102, &(0x7f0000000500)=r3) umount2(0x0, 0x0) [ 387.967673][T21239] loop3: detected capacity change from 0 to 3 [ 387.976926][T21213] ERROR: Out of memory at tomoyo_realpath_from_path. 09:12:28 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfffffdfd, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 388.060776][T21213] befs: Unrecognized mount option "{Ù" or missing value [ 388.082521][T21213] befs: (loop2): cannot parse mount options 09:12:28 executing program 2 (fault-call:1 fault-nth:17): perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:28 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x8000000000000000, &(0x7f0000003900)) [ 388.156914][T21247] loop1: detected capacity change from 0 to 264192 09:12:28 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0xf6ffffff00000000, &(0x7f0000003900)) [ 388.228040][T21247] omfs: Invalid superblock (0) 09:12:28 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x100000000000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:28 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xb8030000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 388.356316][T21265] FAULT_INJECTION: forcing a failure. [ 388.356316][T21265] name failslab, interval 1, probability 0, space 0, times 0 [ 388.433661][T21267] loop5: detected capacity change from 0 to 264192 [ 388.436102][T21265] CPU: 1 PID: 21265 Comm: syz-executor.2 Not tainted 5.12.0-rc7-syzkaller #0 [ 388.449158][T21265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.459393][T21265] Call Trace: [ 388.462671][T21265] dump_stack+0x141/0x1d7 [ 388.467019][T21265] should_fail.cold+0x5/0xa [ 388.471543][T21265] ? tomoyo_realpath_from_path+0xc3/0x620 [ 388.477271][T21265] should_failslab+0x5/0x10 [ 388.481772][T21265] __kmalloc+0x72/0x310 [ 388.485924][T21265] tomoyo_realpath_from_path+0xc3/0x620 [ 388.491462][T21265] ? tomoyo_profile+0x42/0x50 [ 388.496135][T21265] tomoyo_path_number_perm+0x1d5/0x590 [ 388.501596][T21265] ? tomoyo_path_number_perm+0x18d/0x590 [ 388.507226][T21265] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 388.513054][T21265] ? lock_downgrade+0x6e0/0x6e0 [ 388.517907][T21265] ? __fget_files+0x288/0x3d0 [ 388.522582][T21265] security_file_ioctl+0x50/0xb0 [ 388.527517][T21265] __x64_sys_ioctl+0xb3/0x200 [ 388.532188][T21265] do_syscall_64+0x2d/0x70 [ 388.536599][T21265] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 388.542484][T21265] RIP: 0033:0x466217 [ 388.546369][T21265] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 388.565973][T21265] RSP: 002b:00007f02b8aa4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 388.574378][T21265] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 388.582348][T21265] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 388.590313][T21265] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 388.598271][T21265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 388.606228][T21265] R13: 0000000000000005 R14: 00000000200002b0 R15: 0000000000000002 [ 388.626260][T21265] ERROR: Out of memory at tomoyo_realpath_from_path. 09:12:28 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0xfcfdffff00000000, &(0x7f0000003900)) [ 388.758107][T21265] befs: Unrecognized mount option "{Ù" or missing value [ 388.765606][T21265] befs: (loop2): cannot parse mount options [ 388.794390][T21274] loop1: detected capacity change from 0 to 264192 09:12:29 executing program 2 (fault-call:1 fault-nth:18): perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 388.803997][ T37] audit: type=1326 audit(1618737149.045:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=21238 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x7fc00000 [ 388.832254][T21284] loop3: detected capacity change from 0 to 3 [ 388.865232][T21282] loop5: detected capacity change from 0 to 264192 09:12:29 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x200000000000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:29 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0xfeffffff00000000, &(0x7f0000003900)) 09:12:29 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xffffff7f, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 389.059618][T21274] omfs: Invalid superblock (0) [ 389.078824][ T37] audit: type=1326 audit(1618737149.045:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=21238 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=16 compat=0 ip=0x466459 code=0x7fc00000 [ 389.148400][ T37] audit: type=1326 audit(1618737149.045:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=21238 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x7fc00000 [ 389.171164][ T37] audit: type=1326 audit(1618737149.045:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=21238 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x7fc00000 [ 389.195325][ T37] audit: type=1326 audit(1618737149.045:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=21238 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x7fc00000 [ 389.196805][T21301] FAULT_INJECTION: forcing a failure. [ 389.196805][T21301] name failslab, interval 1, probability 0, space 0, times 0 [ 389.221393][ T37] audit: type=1326 audit(1618737149.045:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=21238 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x7fc00000 [ 389.232760][T21301] CPU: 1 PID: 21301 Comm: syz-executor.2 Not tainted 5.12.0-rc7-syzkaller #0 [ 389.261690][T21301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 389.271739][T21301] Call Trace: [ 389.275009][T21301] dump_stack+0x141/0x1d7 [ 389.279338][T21301] should_fail.cold+0x5/0xa [ 389.283838][T21301] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 389.289210][T21301] should_failslab+0x5/0x10 [ 389.293709][T21301] __kmalloc+0x72/0x310 [ 389.297860][T21301] tomoyo_encode2.part.0+0xe9/0x3a0 [ 389.303060][T21301] tomoyo_encode+0x28/0x50 [ 389.307462][T21301] tomoyo_realpath_from_path+0x186/0x620 [ 389.313090][T21301] tomoyo_path_number_perm+0x1d5/0x590 [ 389.318543][T21301] ? tomoyo_path_number_perm+0x18d/0x590 [ 389.324191][T21301] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 389.330032][T21301] ? lock_downgrade+0x6e0/0x6e0 [ 389.334889][T21301] ? __fget_files+0x288/0x3d0 [ 389.339564][T21301] security_file_ioctl+0x50/0xb0 [ 389.344499][T21301] __x64_sys_ioctl+0xb3/0x200 [ 389.349173][T21301] do_syscall_64+0x2d/0x70 [ 389.353586][T21301] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 389.359475][T21301] RIP: 0033:0x466217 [ 389.363359][T21301] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 389.382960][T21301] RSP: 002b:00007f02b8aa4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 389.391372][T21301] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 389.399335][T21301] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 389.407297][T21301] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 389.415256][T21301] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 389.423213][T21301] R13: 0000000000000005 R14: 00000000200002b0 R15: 0000000000000002 [ 389.597690][T21301] ERROR: Out of memory at tomoyo_realpath_from_path. [ 389.607487][ T37] audit: type=1326 audit(1618737149.045:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=21238 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x7fc00000 [ 389.634715][ T37] audit: type=1326 audit(1618737149.045:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=21238 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x7fc00000 [ 389.653485][T21301] befs: Unrecognized mount option "{Ù" or missing value [ 389.659675][ T37] audit: type=1326 audit(1618737149.045:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=21238 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x7fc00000 [ 389.686345][T21301] befs: (loop2): cannot parse mount options 09:12:29 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x101000, 0x108) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='btrfs\x00', 0x0, 0x0) umount2(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x6}, [{0x2, 0x4, r2}], {0x4, 0x1}, [], {}, {0x20, 0x4}}, 0x2c, 0x0) ioprio_get$uid(0x0, r2) fchown(r0, r2, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000140)={0x7db4, 0xc98, {}, {0xee00}, 0x4, 0x2}) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x2000000, &(0x7f0000000180)={[{@xino_off='xino=off'}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@dont_appraise='dont_appraise'}, {@fowner_eq={'fowner', 0x3d, r2}}, {@smackfsroot={'smackfsroot', 0x3d, 'btrfs\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0xc, 0x35, 0x35, 0x66, 0x39, 0x62, 0x31, 0x65], 0x2d, [0x37, 0x63, 0x37, 0x37], 0x2d, [0x34, 0x0, 0x35, 0x33], 0x2d, [0x39, 0x62, 0x64, 0x66], 0x2d, [0x0, 0x65, 0x62, 0x33, 0x39, 0x0, 0x31, 0x54]}}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, 'btrfs\x00'}}]}) 09:12:30 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xb9030000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x300000000000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:30 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0xfeffffffffffffff, &(0x7f0000003900)) [ 389.688094][ T37] audit: type=1326 audit(1618737149.045:26): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=21238 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x7fc00000 [ 389.774382][T21314] loop5: detected capacity change from 0 to 264192 09:12:30 executing program 2 (fault-call:1 fault-nth:19): perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 389.870011][T21318] loop1: detected capacity change from 0 to 264192 09:12:30 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xffffff8c, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 389.962847][T21318] omfs: Invalid superblock (0) 09:12:30 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0xffffffff00000000, &(0x7f0000003900)) [ 390.008346][T21324] overlayfs: unrecognized mount option "dont_appraise" or missing value [ 390.023554][T21331] FAULT_INJECTION: forcing a failure. [ 390.023554][T21331] name failslab, interval 1, probability 0, space 0, times 0 [ 390.037809][T21331] CPU: 1 PID: 21331 Comm: syz-executor.2 Not tainted 5.12.0-rc7-syzkaller #0 [ 390.046579][T21331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.056623][T21331] Call Trace: [ 390.059890][T21331] dump_stack+0x141/0x1d7 [ 390.064219][T21331] should_fail.cold+0x5/0xa [ 390.068721][T21331] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 390.074083][T21331] should_failslab+0x5/0x10 [ 390.078579][T21331] __kmalloc+0x72/0x310 [ 390.082726][T21331] tomoyo_encode2.part.0+0xe9/0x3a0 [ 390.087917][T21331] tomoyo_encode+0x28/0x50 [ 390.092325][T21331] tomoyo_realpath_from_path+0x186/0x620 [ 390.097955][T21331] tomoyo_path_number_perm+0x1d5/0x590 [ 390.103405][T21331] ? tomoyo_path_number_perm+0x18d/0x590 [ 390.109034][T21331] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 390.114877][T21331] ? lock_downgrade+0x6e0/0x6e0 [ 390.119747][T21331] ? __fget_files+0x288/0x3d0 [ 390.124421][T21331] security_file_ioctl+0x50/0xb0 [ 390.129354][T21331] __x64_sys_ioctl+0xb3/0x200 [ 390.134030][T21331] do_syscall_64+0x2d/0x70 [ 390.138467][T21331] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 390.144377][T21331] RIP: 0033:0x466217 [ 390.148264][T21331] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 390.167861][T21331] RSP: 002b:00007f02b8aa4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 390.176266][T21331] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 390.184227][T21331] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 390.192187][T21331] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 390.200147][T21331] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 09:12:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x400000000000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 390.208108][T21331] R13: 0000000000000005 R14: 00000000200002b0 R15: 0000000000000002 [ 390.230332][T21331] ERROR: Out of memory at tomoyo_realpath_from_path. [ 390.294105][T21331] befs: Unrecognized mount option "{Ù" or missing value [ 390.301444][T21331] befs: (loop2): cannot parse mount options 09:12:30 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xba030000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:30 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x11c00b4, 0x0) umount2(0x0, 0x0) 09:12:30 executing program 2 (fault-call:1 fault-nth:20): perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:30 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0xfffffffffffff000, &(0x7f0000003900)) 09:12:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x500000000000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 390.575000][T21347] loop5: detected capacity change from 0 to 264192 09:12:30 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0xfffffffffffffffe, &(0x7f0000003900)) 09:12:30 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x66, 0x0, 0x1000, 0x0) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x20, 0x3f7, 0x4, 0x70bd2c, 0x25dfdbfe, {0x0, 0x7, '', './file0'}, ["", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10}, 0x4000) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) [ 390.698850][T21357] loop1: detected capacity change from 0 to 264192 09:12:31 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0xffffffffffffffff, &(0x7f0000003900)) 09:12:31 executing program 3: ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='veth1_virt_wifi\x00'}) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000180)={0x0, 0x8}, &(0x7f00000001c0)=0x8) rename(&(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='./file0\x00') r2 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x6}, [{0x2, 0x4, r4}], {0x4, 0x1}, [], {}, {0x20, 0x4}}, 0x2c, 0x0) ioprio_get$uid(0x0, r4) fchown(r2, r4, 0x0) mount$overlay(0x0, &(0x7f0000000300)='./file2\x00', &(0x7f0000000340)='overlay\x00', 0x1010, &(0x7f0000000380)={[{@xino_off='xino=off'}, {@workdir={'workdir', 0x3d, './file1'}}, {@index_off='index=off'}, {@xino_off='xino=off'}, {@metacopy_on='metacopy=on'}, {@xino_off='xino=off'}, {@xino_auto='xino=auto'}, {@xino_on='xino=on'}], [{@fowner_gt={'fowner>', r4}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) open(&(0x7f0000000440)='./file2\x00', 0xa000, 0x149) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000200)={r1, 0x20, 0x676, 0x100, 0x3}, &(0x7f0000000240)=0x14) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) umount2(0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x1) [ 390.905468][T21366] FAULT_INJECTION: forcing a failure. [ 390.905468][T21366] name failslab, interval 1, probability 0, space 0, times 0 [ 390.920111][T21366] CPU: 1 PID: 21366 Comm: syz-executor.2 Not tainted 5.12.0-rc7-syzkaller #0 [ 390.928884][T21366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.938939][T21366] Call Trace: [ 390.942220][T21366] dump_stack+0x141/0x1d7 [ 390.946568][T21366] should_fail.cold+0x5/0xa [ 390.951078][T21366] ? __kernfs_new_node+0xd4/0x8b0 [ 390.956109][T21366] ? __kernfs_new_node+0xd4/0x8b0 [ 390.961136][T21366] should_failslab+0x5/0x10 [ 390.965649][T21366] kmem_cache_alloc+0x5e/0x370 [ 390.970424][T21366] __kernfs_new_node+0xd4/0x8b0 [ 390.975283][T21366] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 390.980746][T21366] ? update_load_avg+0x1b6/0x18b0 [ 390.985786][T21366] ? find_held_lock+0x2d/0x110 [ 390.990558][T21366] ? set_user_nice.part.0+0x3e8/0xe60 [ 390.995943][T21366] kernfs_create_dir_ns+0x9c/0x220 [ 391.001060][T21366] internal_create_group+0x798/0xb20 [ 391.006362][T21366] ? sysfs_remove_group+0x170/0x170 [ 391.011566][T21366] ? __disk_unblock_events+0x2d0/0x2d0 [ 391.017033][T21366] ? __sanitizer_cov_trace_cmp1+0x22/0x80 [ 391.022757][T21366] ? __loop_update_dio+0x2d2/0x690 [ 391.027883][T21366] loop_configure+0xac5/0x13a0 [ 391.032671][T21366] lo_ioctl+0x3f7/0x1620 [ 391.036920][T21366] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 391.042822][T21366] ? loop_set_status_old+0x250/0x250 [ 391.048118][T21366] ? find_held_lock+0x2d/0x110 [ 391.052896][T21366] ? tomoyo_path_number_perm+0x204/0x590 [ 391.058559][T21366] ? lock_downgrade+0x6e0/0x6e0 [ 391.063416][T21366] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 391.069662][T21366] ? tomoyo_path_number_perm+0x441/0x590 [ 391.075307][T21366] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 391.081554][T21366] ? tomoyo_path_number_perm+0x24e/0x590 [ 391.087223][T21366] ? generic_block_fiemap+0x60/0x60 [ 391.092425][T21366] ? lock_downgrade+0x6e0/0x6e0 [ 391.097286][T21366] ? loop_set_status_old+0x250/0x250 [ 391.102575][T21366] blkdev_ioctl+0x2a1/0x6d0 [ 391.107084][T21366] ? blkdev_common_ioctl+0x17e0/0x17e0 [ 391.112553][T21366] ? __fget_files+0x288/0x3d0 [ 391.117235][T21366] block_ioctl+0xf9/0x140 [ 391.121567][T21366] ? blkdev_read_iter+0x180/0x180 [ 391.126789][T21366] __x64_sys_ioctl+0x193/0x200 [ 391.131666][T21366] do_syscall_64+0x2d/0x70 [ 391.136087][T21366] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 391.141985][T21366] RIP: 0033:0x466217 [ 391.145882][T21366] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 391.165494][T21366] RSP: 002b:00007f02b8a83f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 391.173906][T21366] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 391.181881][T21366] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 391.189850][T21366] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 391.197823][T21366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 391.205790][T21366] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 [ 391.240225][T21357] omfs: Invalid superblock (0) 09:12:31 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xffffff97, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:31 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:31 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x600000000000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xbb030000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 391.282138][T21366] befs: Unrecognized mount option "{Ù" or missing value [ 391.336197][T21366] befs: (loop2): cannot parse mount options 09:12:31 executing program 2 (fault-call:1 fault-nth:21): perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 391.425556][T21386] loop5: detected capacity change from 0 to 264192 09:12:31 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x700000000000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 391.530980][T21396] loop1: detected capacity change from 0 to 264192 [ 391.592927][T21396] omfs: Invalid superblock (0) 09:12:31 executing program 3: openat$fb1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb1\x00', 0x40000, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @default}, [@rose, @default, @bcast, @rose, @remote, @remote, @bcast]}, &(0x7f0000000140)=0x48) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FBIOBLANK(r1, 0x4611, 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) ftruncate(r0, 0x7) umount2(0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x10201, 0x82) 09:12:31 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)={[], [], 0x2}) 09:12:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xbc030000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:32 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfffffff6, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 391.747649][T21407] FAULT_INJECTION: forcing a failure. [ 391.747649][T21407] name failslab, interval 1, probability 0, space 0, times 0 [ 391.824674][T21407] CPU: 1 PID: 21407 Comm: syz-executor.2 Not tainted 5.12.0-rc7-syzkaller #0 [ 391.833470][T21407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 391.843524][T21407] Call Trace: [ 391.846804][T21407] dump_stack+0x141/0x1d7 [ 391.851154][T21407] should_fail.cold+0x5/0xa [ 391.855664][T21407] ? __kernfs_new_node+0xd4/0x8b0 [ 391.860696][T21407] ? __kernfs_new_node+0xd4/0x8b0 [ 391.865726][T21407] should_failslab+0x5/0x10 [ 391.870233][T21407] kmem_cache_alloc+0x5e/0x370 [ 391.874994][T21407] __kernfs_new_node+0xd4/0x8b0 [ 391.879840][T21407] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 391.885289][T21407] ? lock_downgrade+0x6e0/0x6e0 [ 391.890138][T21407] ? mutex_lock_io_nested+0xf70/0xf70 [ 391.895497][T21407] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 391.901738][T21407] ? __mutex_unlock_slowpath+0xe2/0x610 [ 391.907281][T21407] kernfs_new_node+0x93/0x120 [ 391.911951][T21407] __kernfs_create_file+0x51/0x350 [ 391.917055][T21407] sysfs_add_file_mode_ns+0x226/0x540 [ 391.922426][T21407] internal_create_group+0x328/0xb20 [ 391.927711][T21407] ? sysfs_remove_group+0x170/0x170 [ 391.932901][T21407] ? __disk_unblock_events+0x2d0/0x2d0 [ 391.938354][T21407] ? __sanitizer_cov_trace_cmp1+0x22/0x80 [ 391.944089][T21407] ? __loop_update_dio+0x2d2/0x690 [ 391.949201][T21407] loop_configure+0xac5/0x13a0 [ 391.953976][T21407] lo_ioctl+0x3f7/0x1620 [ 391.958214][T21407] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 391.964016][T21407] ? loop_set_status_old+0x250/0x250 [ 391.969297][T21407] ? find_held_lock+0x2d/0x110 [ 391.974053][T21407] ? tomoyo_path_number_perm+0x204/0x590 [ 391.979680][T21407] ? lock_downgrade+0x6e0/0x6e0 [ 391.984522][T21407] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 391.990755][T21407] ? tomoyo_path_number_perm+0x441/0x590 [ 391.996389][T21407] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 392.002622][T21407] ? tomoyo_path_number_perm+0x24e/0x590 [ 392.008276][T21407] ? generic_block_fiemap+0x60/0x60 [ 392.013467][T21407] ? lock_downgrade+0x6e0/0x6e0 [ 392.018313][T21407] ? loop_set_status_old+0x250/0x250 [ 392.023589][T21407] blkdev_ioctl+0x2a1/0x6d0 [ 392.028087][T21407] ? blkdev_common_ioctl+0x17e0/0x17e0 [ 392.033541][T21407] ? __fget_files+0x288/0x3d0 [ 392.038218][T21407] block_ioctl+0xf9/0x140 [ 392.042538][T21407] ? blkdev_read_iter+0x180/0x180 [ 392.047554][T21407] __x64_sys_ioctl+0x193/0x200 [ 392.052312][T21407] do_syscall_64+0x2d/0x70 [ 392.056722][T21407] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 392.062605][T21407] RIP: 0033:0x466217 [ 392.066485][T21407] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 392.086082][T21407] RSP: 002b:00007f02b8aa4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 392.094484][T21407] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 392.102441][T21407] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 392.110398][T21407] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 392.118356][T21407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 392.126409][T21407] R13: 0000000000000005 R14: 00000000200002b0 R15: 0000000000000002 [ 392.151497][T21416] loop1: detected capacity change from 0 to 264192 09:12:32 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x800000000000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 392.232532][T21416] omfs: Invalid superblock (0) [ 392.235457][T21407] befs: Unrecognized mount option "{Ù" or missing value 09:12:32 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)={[], [], 0x3}) [ 392.285230][T21426] loop5: detected capacity change from 0 to 264192 [ 392.320803][T21407] befs: (loop2): cannot parse mount options 09:12:32 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xbd030000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r0, 0x1) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000040)) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) 09:12:32 executing program 2 (fault-call:1 fault-nth:22): perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 392.393929][T21434] loop5: detected capacity change from 0 to 264192 09:12:32 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)={[], [], 0x4}) 09:12:32 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfffffffd, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:32 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)={[], [], 0x5}) 09:12:32 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xa00000000000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 392.572710][T21449] loop1: detected capacity change from 0 to 264192 09:12:32 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)={[], [], 0x6}) [ 392.674174][T21461] loop5: detected capacity change from 0 to 264192 [ 392.674557][T21452] FAULT_INJECTION: forcing a failure. [ 392.674557][T21452] name failslab, interval 1, probability 0, space 0, times 0 [ 392.710042][T21452] CPU: 0 PID: 21452 Comm: syz-executor.2 Not tainted 5.12.0-rc7-syzkaller #0 [ 392.718910][T21452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 392.728965][T21452] Call Trace: [ 392.732244][T21452] dump_stack+0x141/0x1d7 [ 392.736595][T21452] should_fail.cold+0x5/0xa [ 392.741104][T21452] ? __kernfs_new_node+0xd4/0x8b0 [ 392.746135][T21452] ? __kernfs_new_node+0xd4/0x8b0 [ 392.751168][T21452] should_failslab+0x5/0x10 [ 392.755685][T21452] kmem_cache_alloc+0x5e/0x370 [ 392.760461][T21452] __kernfs_new_node+0xd4/0x8b0 [ 392.765512][T21452] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 392.770995][T21452] ? __mutex_unlock_slowpath+0xe2/0x610 [ 392.771162][T21449] omfs: Invalid superblock (0) [ 392.776550][T21452] ? wait_for_completion_io+0x270/0x270 [ 392.776576][T21452] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 392.776605][T21452] ? kernfs_next_descendant_post+0x1a3/0x290 [ 392.776635][T21452] kernfs_new_node+0x93/0x120 [ 392.776661][T21452] __kernfs_create_file+0x51/0x350 [ 392.808923][T21452] sysfs_add_file_mode_ns+0x226/0x540 [ 392.814310][T21452] internal_create_group+0x328/0xb20 [ 392.819691][T21452] ? sysfs_remove_group+0x170/0x170 [ 392.824898][T21452] ? __disk_unblock_events+0x2d0/0x2d0 [ 392.830371][T21452] ? __sanitizer_cov_trace_cmp1+0x22/0x80 [ 392.836103][T21452] ? __loop_update_dio+0x2d2/0x690 [ 392.841226][T21452] loop_configure+0xac5/0x13a0 [ 392.846007][T21452] lo_ioctl+0x3f7/0x1620 [ 392.850343][T21452] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 392.856163][T21452] ? loop_set_status_old+0x250/0x250 [ 392.861457][T21452] ? find_held_lock+0x2d/0x110 [ 392.866236][T21452] ? tomoyo_path_number_perm+0x204/0x590 [ 392.871880][T21452] ? lock_downgrade+0x6e0/0x6e0 [ 392.876744][T21452] ? tomoyo_path_number_perm+0x441/0x590 [ 392.882397][T21452] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 392.888649][T21452] ? tomoyo_path_number_perm+0x24e/0x590 [ 392.894319][T21452] ? generic_block_fiemap+0x60/0x60 [ 392.899526][T21452] ? lock_downgrade+0x6e0/0x6e0 [ 392.904392][T21452] ? loop_set_status_old+0x250/0x250 [ 392.909685][T21452] blkdev_ioctl+0x2a1/0x6d0 [ 392.914203][T21452] ? blkdev_common_ioctl+0x17e0/0x17e0 [ 392.919675][T21452] ? __fget_files+0x288/0x3d0 09:12:33 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='./file0\x00') umount2(0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000600)='./file0\x00', 0x100, 0x702, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x6}, [{0x2, 0x4, r5}], {0x4, 0x1}, [], {}, {0x20, 0x4}}, 0x2c, 0x0) ioprio_get$uid(0x0, r5) fchown(r3, r5, 0x0) syz_mount_image$tmpfs(&(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='./file0\x00', 0x3, 0x4, &(0x7f0000000580)=[{&(0x7f00000002c0)="ebfe0b9be2636642947ccb0014780678ac1d59e373c9fb94a401e017526d6e8b7a40cf3a1288710bdb3109a4e957861254fb286c7e3c1e2c0baa59eb55f079a96be891515b61405e59a9dcadabd22e8758564657f1ee1163f59affea5d219106c0220bb8c9485c0e3f57200a142fec", 0x6f, 0x5}, {&(0x7f0000000340)="57e42e674a8f78574f136a5ae272a8a92bac5d01f9d6a6b3ca6d036b31e63d3ac7d32a3b2a9ba426981bd1e9f5bd8ede9cbeb1384293d0d18103d2b78b6296e47015c9a5618d7a182cb3769fcc110e25096dfd5b6cef3cf9ea1ff489ecc2e919757172543a009b5cd5c70a3ab5457b37f1fb9a4f05fae810658654cd20bcf215c7eee0965dafd06c86d138352c37837479b42da993ab3ff5381f82d7105467b5fdb80ca8205ee34d49df59fb8cf2af9d3adff58b30f7aa85d006a8fe9968f2986cc709e2198326b6d94159faddc5582cf95238b75de1efaf3472a014f3dc7618", 0xe0, 0xf0}, {&(0x7f0000000440)="6ba53ee4903a4cd168707129c8526169f16b91033a3d7683ef1050d81f87abe121cb130d9f224825b96014ce95ab1a6eb142fd151cfbe851995eb2bffa0db9c96b7ee92897ee357b684947824fd6eb55b5efb49a12018df5d047360a116a3d7c4986d30c6c51063daaac18a5bef1b5aa57a0560f95ccb2dc6337aaa09a33e99a332a1a33a635ea5d94a6bd445b4a7a34afbc383dc53a13935ae319869f02b77ae23bd64b086a52a2b3d67bfe5b602dd8e6ac0f33389ea0a0058b25e69cc3b5ff86b84198658baede56d08e4abe6d21", 0xcf, 0x2}, {&(0x7f0000000540), 0x0, 0x1ff}], 0x4, &(0x7f0000002780)={[{@gid={'gid', 0x3d, r1}}, {@huge_never='huge=never'}, {@huge_within_size='huge=within_size'}, {@nr_inodes={'nr_inodes', 0x3d, [0x31, 0x65, 0x30, 0x78]}}], [{@dont_appraise='dont_appraise'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, r0}}, {@subj_user={'subj_user', 0x3d, '\\:.@\xc4&'}}, {@euid_eq={'euid', 0x3d, r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ocfs2_dlmfs\x00'}}, {@uid_lt={'uid<', r0}}, {@fowner_eq={'fowner', 0x3d, r5}}, {@euid_eq={'euid', 0x3d, r0}}]}) 09:12:33 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)={[], [], 0x7}) 09:12:33 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)={[], [], 0x18}) 09:12:33 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)={[], [], 0xfe}) [ 392.924366][T21452] block_ioctl+0xf9/0x140 [ 392.928703][T21452] ? blkdev_read_iter+0x180/0x180 [ 392.933823][T21452] __x64_sys_ioctl+0x193/0x200 [ 392.938597][T21452] do_syscall_64+0x2d/0x70 [ 392.943022][T21452] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 392.948924][T21452] RIP: 0033:0x466217 [ 392.952819][T21452] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 392.972429][T21452] RSP: 002b:00007f02b8aa4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 392.980850][T21452] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 392.988818][T21452] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 392.996788][T21452] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 393.004744][T21452] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 393.012698][T21452] R13: 0000000000000005 R14: 00000000200002b0 R15: 0000000000000002 [ 393.111298][T21452] befs: Unrecognized mount option "{Ù" or missing value 09:12:33 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x1000000000000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:33 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xbe030000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 393.175933][T21452] befs: (loop2): cannot parse mount options 09:12:33 executing program 2 (fault-call:1 fault-nth:23): perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:33 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)={[], [], 0xff}) 09:12:33 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfffffffe, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 393.296829][T21483] loop3: detected capacity change from 0 to 1 [ 393.394978][T21494] loop1: detected capacity change from 0 to 264192 [ 393.403346][T21496] loop5: detected capacity change from 0 to 264192 [ 393.427501][T21493] FAULT_INJECTION: forcing a failure. [ 393.427501][T21493] name failslab, interval 1, probability 0, space 0, times 0 [ 393.469543][T21483] tmpfs: Bad value for 'nr_inodes' [ 393.484384][T21493] CPU: 1 PID: 21493 Comm: syz-executor.2 Not tainted 5.12.0-rc7-syzkaller #0 [ 393.493153][T21493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 393.503296][T21493] Call Trace: [ 393.506750][T21493] dump_stack+0x141/0x1d7 [ 393.511094][T21493] should_fail.cold+0x5/0xa [ 393.515599][T21493] ? __kernfs_new_node+0xd4/0x8b0 [ 393.520718][T21493] ? __kernfs_new_node+0xd4/0x8b0 [ 393.523203][T21494] omfs: Invalid superblock (0) [ 393.525740][T21493] should_failslab+0x5/0x10 [ 393.525767][T21493] kmem_cache_alloc+0x5e/0x370 [ 393.525788][T21493] ? kernfs_add_one+0x36a/0x4c0 [ 393.525812][T21493] __kernfs_new_node+0xd4/0x8b0 [ 393.525835][T21493] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 393.525858][T21493] ? __mutex_unlock_slowpath+0xe2/0x610 [ 393.525885][T21493] ? wait_for_completion_io+0x270/0x270 [ 393.525906][T21493] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 393.525931][T21493] ? kernfs_next_descendant_post+0x1a3/0x290 [ 393.578237][T21493] kernfs_new_node+0x93/0x120 [ 393.582913][T21493] __kernfs_create_file+0x51/0x350 [ 393.588024][T21493] sysfs_add_file_mode_ns+0x226/0x540 [ 393.593418][T21493] internal_create_group+0x328/0xb20 [ 393.598699][T21493] ? sysfs_remove_group+0x170/0x170 [ 393.603888][T21493] ? __disk_unblock_events+0x2d0/0x2d0 [ 393.609339][T21493] ? __sanitizer_cov_trace_cmp1+0x22/0x80 [ 393.615048][T21493] ? __loop_update_dio+0x2d2/0x690 [ 393.620154][T21493] loop_configure+0xac5/0x13a0 [ 393.624920][T21493] lo_ioctl+0x3f7/0x1620 [ 393.629154][T21493] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 393.634954][T21493] ? loop_set_status_old+0x250/0x250 [ 393.640235][T21493] ? find_held_lock+0x2d/0x110 [ 393.644990][T21493] ? tomoyo_path_number_perm+0x204/0x590 [ 393.650620][T21493] ? lock_downgrade+0x6e0/0x6e0 [ 393.655462][T21493] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 393.661700][T21493] ? tomoyo_path_number_perm+0x441/0x590 [ 393.667339][T21493] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 393.673573][T21493] ? tomoyo_path_number_perm+0x24e/0x590 [ 393.679222][T21493] ? generic_block_fiemap+0x60/0x60 [ 393.684411][T21493] ? lock_downgrade+0x6e0/0x6e0 [ 393.689255][T21493] ? loop_set_status_old+0x250/0x250 [ 393.694532][T21493] blkdev_ioctl+0x2a1/0x6d0 [ 393.699027][T21493] ? blkdev_common_ioctl+0x17e0/0x17e0 [ 393.704481][T21493] ? __fget_files+0x288/0x3d0 [ 393.709158][T21493] block_ioctl+0xf9/0x140 [ 393.713475][T21493] ? blkdev_read_iter+0x180/0x180 [ 393.718492][T21493] __x64_sys_ioctl+0x193/0x200 [ 393.723253][T21493] do_syscall_64+0x2d/0x70 [ 393.727661][T21493] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 393.733543][T21493] RIP: 0033:0x466217 [ 393.737422][T21493] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 393.757016][T21493] RSP: 002b:00007f02b8aa4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 09:12:34 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)=ANY=[@ANYBLOB="04"]) [ 393.765417][T21493] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 393.773374][T21493] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 393.781328][T21493] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 393.789284][T21493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 393.797241][T21493] R13: 0000000000000005 R14: 00000000200002b0 R15: 0000000000000002 09:12:34 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xbf030000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 393.831632][T21493] befs: Unrecognized mount option "{Ù" or missing value [ 393.845481][T21507] loop5: detected capacity change from 0 to 264192 09:12:34 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x2000000000000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 393.896732][T21493] befs: (loop2): cannot parse mount options [ 393.935329][T21512] loop3: detected capacity change from 0 to 1 [ 394.018834][T21512] tmpfs: Bad value for 'nr_inodes' 09:12:34 executing program 3: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x1, 0x1d0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000008c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x15, 0x9, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x72, 0x0, 0x0, 0x0, 0x81}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x0, 0x8, 0x4, 0x3, 0xc, 0xfffffffffffffff0}, @alu={0x7, 0x0, 0x1, 0x9, 0x4, 0xffffffffffffffe0}]}, &(0x7f0000000800)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0xb, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000840)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000880)={0x2, 0x5, 0x1f, 0x7fff}, 0x10, 0xffffffffffffffff, r2}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r3, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000009c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000a40)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000980)=0x1, r4, 0x0, 0x2, 0x4}}, 0x20) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r1, 0x1) ioctl$USBDEVFS_BULK(r1, 0xc0185502, &(0x7f0000000500)={{{0xe}}, 0xe8, 0x80000000, &(0x7f0000000680)="3cf74dcb8f3587ebf6567d45de2460ada5acbd4a8ca10ff4f106e49e0e60eddbfd743d9ffc038d3fe727937cd135fa4ba4818906f06cdb8222eff4ed08a0a4e3724025c62ea0470e2df00ee4ed293bdf0d5812b87e1ae65e5419ae814818650eac9cdde9c07064016e16ca2c61404c16a7b7395c72b28297365cef82423d753c0f5a8917efe1989ced32795d3237e7afa1e3c2552ae6f09fef9aa2b4cf869a31f9568f3fbbabda074b107daa985b17c8099762cc2714dc106978292a96b5318ecb68d62daf59f3afc1aea2a86fe758dbf23f7db3c9cd633f5369cbe974dda8c8ec1813578fc538e0"}) r5 = syz_mount_image$vxfs(&(0x7f0000000080)='vxfs\x00', &(0x7f0000000140)='./file0\x00', 0x10001, 0x4, &(0x7f0000000400)=[{&(0x7f0000000180)="978b13abef547feec4a4495813a236423c912cb2fbd5cad0b5dbe04f011ee0dfceff086cb52fe3bcf247e042b0fa7465ce1613ccc8346fa0258ec20682c197503f2140f9cb3e0463747d0b69f68ac50bd0c309162770227ec827fc2759a812925d6951f77e83066e45c8cffd3e7f01986d0c1b12438b1ce8", 0x78, 0x8001}, {&(0x7f0000000200)="5c26c0f8049c6ed6aec723037057e8424dd5c9d9f1e45bf00fa9463d60b40c0065732ff7c3d328b0955bdad317517edb7bf543cd7932e70639c9b3573d16415df9f67778a207458828dbc2182f98cb647165332bb5252323036bfcb5fb0cd0dbac11f7f950bc47c53d90a4fad4f4c399da716633cd322af48e0d8e2e47189f21b67b2495235f4d44c8e6e8f7d4e610", 0x8f, 0xfffffffffffffffb}, {&(0x7f00000002c0)="394335517c2848422e6adcf5697007d1b73560846ec2a3ebc4a395993181f76ef66fa3be5201aa5fad658e80c7bf44eb2b00b0cf1b6e2fdae27b36ba520db0957a12b227c4", 0x45, 0x8}, {&(0x7f0000000340)="b3e922692fa9dda4c8916d33c5ebbf715ca354900139cbd430f30c2d71761632b5f92c02769ec91534721745129652c9b449200c3749c46adf09a47d33a3ba4c680b497bbc07bfb6a869a7cbe5d6d88a418b2ed7c23e61f9d953cde7aedb402a3942af3e2e612972edd4808b043b5073e883e0c9746ff1a4511cd6ebd0674f9d8d09d2e362b95a655ce20e9c1a31c8c355ffa9546868ebeeac348faf56743877f9b8a0d8f2c558cf3440ea9270", 0xad}], 0x80, &(0x7f0000000480)={[{}, {'-(-{%{}\''}, {')'}, {'ocfs2_dlmfs\x00'}, {'ocfs2_dlmfs\x00'}, {}, {'.pending_reads\x00'}, {'.pending_reads\x00'}], [{@fowner_gt={'fowner>'}}]}) statx(r5, &(0x7f0000000640)='./file0\x00', 0x400, 0x80, &(0x7f0000000540)) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) 09:12:34 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xedc000000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:34 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000000)={0x56, 0x5, 0x3, "698d1012927282f3f52f3a2edc6aafc0284716f03fbe814a4e15ee8d60cc959401b8dde348043cf9599a63d531995d56db58c7010dafa1e42800d968d7c0b23bfbae0cf2bd79a6692ced594d8982ccd48e05acf328f87ba180e653ba570cd01c362e98bb7c76bd6279c7900d38c669f70335fcecc67c4ef7cd54117cf29530ac9344909abe05000000000000007861fb9e5109539c52804e6bfbf57acc392f4a5ebf697d6553dff13384ff4c01e80515f0307eadfd399f"}) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="00164a931f79da2d7d331dd26e7bf5fc43831ed2b6bd727ea4cd6235217ac1ffe4efc7aab1f98a6964914dfef195992e6480445c0f0c830df50c5bf3d419741051730f25fff627caf6465d632fa0813ea4eebc9db1e67fe098981cb60661efc071b91021d20d9e0d49445381"]) 09:12:34 executing program 2 (fault-call:1 fault-nth:24): perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 394.040293][T21525] loop1: detected capacity change from 0 to 264192 09:12:34 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x2010000000000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 394.125603][T21533] loop5: detected capacity change from 0 to 264192 [ 394.253693][T21525] omfs: Invalid superblock (0) [ 394.267905][T21541] FAULT_INJECTION: forcing a failure. [ 394.267905][T21541] name failslab, interval 1, probability 0, space 0, times 0 [ 394.268043][T21543] loop5: detected capacity change from 0 to 264192 [ 394.294374][T21541] CPU: 0 PID: 21541 Comm: syz-executor.2 Not tainted 5.12.0-rc7-syzkaller #0 [ 394.303144][T21541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 394.313199][T21541] Call Trace: [ 394.316476][T21541] dump_stack+0x141/0x1d7 [ 394.320821][T21541] should_fail.cold+0x5/0xa [ 394.323520][T21546] loop3: detected capacity change from 0 to 16383 [ 394.325325][T21541] ? __kernfs_new_node+0xd4/0x8b0 [ 394.325351][T21541] ? __kernfs_new_node+0xd4/0x8b0 [ 394.325371][T21541] should_failslab+0x5/0x10 [ 394.325395][T21541] kmem_cache_alloc+0x5e/0x370 [ 394.342367][T21546] vxfs: WRONG superblock magic 00000000 at 1 [ 394.346273][T21541] ? kernfs_add_one+0x36a/0x4c0 [ 394.346305][T21541] __kernfs_new_node+0xd4/0x8b0 [ 394.346329][T21541] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 394.346353][T21541] ? __mutex_unlock_slowpath+0xe2/0x610 [ 394.346380][T21541] ? wait_for_completion_io+0x270/0x270 [ 394.346403][T21541] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 394.365316][T21546] vxfs: WRONG superblock magic 00000000 at 8 [ 394.366855][T21541] ? kernfs_next_descendant_post+0x1a3/0x290 [ 394.366890][T21541] kernfs_new_node+0x93/0x120 [ 394.366918][T21541] __kernfs_create_file+0x51/0x350 [ 394.366944][T21541] sysfs_add_file_mode_ns+0x226/0x540 [ 394.375648][T21546] vxfs: can't find superblock. [ 394.377896][T21541] internal_create_group+0x328/0xb20 [ 394.377932][T21541] ? sysfs_remove_group+0x170/0x170 [ 394.377955][T21541] ? __disk_unblock_events+0x2d0/0x2d0 [ 394.437256][T21541] ? __sanitizer_cov_trace_cmp1+0x22/0x80 [ 394.442964][T21541] ? __loop_update_dio+0x2d2/0x690 [ 394.448069][T21541] loop_configure+0xac5/0x13a0 09:12:34 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x3f00000000000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:34 executing program 4: getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x30, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x4}}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x25}}]}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000000c0)={r0, 0xb11746c6}, 0x8) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="9040273d9b29dffc40e78ab8e01f570d73b7801146dfc1922e79639d09280118db0dba3a62fd0bc04853ab317cda1547c8593f5fa17536b40ae805e41caa93e9d47cfc42bc33d3b735b2e969f72e0e324bbb53af06f62678954f75200eb34133ac8c"]) [ 394.452825][T21541] lo_ioctl+0x3f7/0x1620 [ 394.457258][T21541] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 394.463056][T21541] ? loop_set_status_old+0x250/0x250 [ 394.468330][T21541] ? find_held_lock+0x2d/0x110 [ 394.473107][T21541] ? tomoyo_path_number_perm+0x204/0x590 [ 394.478754][T21541] ? lock_downgrade+0x6e0/0x6e0 [ 394.483615][T21541] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 394.489865][T21541] ? tomoyo_path_number_perm+0x441/0x590 [ 394.495515][T21541] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 09:12:34 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) syz_mount_image$sysv(&(0x7f0000000000)='sysv\x00', &(0x7f0000000040)='./file1\x00', 0x572, 0xa, &(0x7f0000001700)=[{&(0x7f0000000240)="90d97bb23ea01700ccbda0d12ae03fc5d916c9f9810249a75ba43f9c3ba83b29430100aee09225886f9328955f26efde2eb0d180f4f89dce4b384dd273b270f4b540ea52fe086ad4385baa0fed3fc4d52c0752bfb37301c5cbc6cc28f49974bcc878eebb4998641b6b87f8461557325394cfc040c801e903ab443c1a3863fe59265a078595e11b28dd9ba2a058d52fb64990349f5fdce80764d9afad736989654cb0bdd923522cec99fd7976f86c0526861b35004f1514e5a62b80e8d50ac295936ea900359f32703be5d64f2e9735d5640158ac64516432eb8842d767", 0xdd, 0x7fffffff}, {&(0x7f0000000080)="ffc0324a34a919e63ae007aa2243c074a5dfcc09350f961a2929b2f91bdc5f054ae4fbcf762cae3708a20b0d0c9885ad1b0dfc1041bfa4e19db1447ee32b2ea27c0ba740930647eda1c593a7934eacd127beb6d3146df16e3273ec24bc2c74c91212", 0x62, 0x18000000000000}, {&(0x7f0000000340)="ab8748b52d89a879271748c0d4bea46dc52309c61462c23784d6eefb013881060ccc6fce3f9574500cb7e407161b3264ed7ca3ed578ea10530a100fecc4ba9ae779f310c20153ad992ee7e8efc69d8b32debe19f16f80cef64cd6fb9587150180c4b4a4b81440e7cb324785bc17e081338de8af62ac8dd80407d902bd6244b80e2d5f161e10610b062751b71ad195d13002b37a9a439eeeacca899e4dbc24de76e7d6cac45dc625e3c7236c1f4f4f41a69a72e0408c8501048e34a575f7469", 0xbf, 0x8000}, {&(0x7f0000000400)="17790e1582b405e5c841e04fbb5f0576f33e50f1f09cf1604b7509a4c3f1f22bb6f3d539f37a5b7dd84511380e2c19a26ff4f8d834c345861c68e31de3a3c472c0b7c3ebc05039713a5dc6e8cc2e566519f84128009997ba36bea40c0fbbbe6676211296372b7b8207bbac01f3c7050879a1170af7f54ae2356d719c8b25d9da530215b36fc100ea98c99d3976f44e9584a1dbbd52d295e006ec9e54a1dbc3d3bc8cc1092d1539c906c795e3b09db09675f939cf8d1413d7d478a78ce02d7422bc5bb5f42a2f4aa687", 0xc9, 0x3}, {&(0x7f0000000500)="5303cef1a06463ed48a08a1491ab9dc79a791b036e410ffea548a0bed932765fd7b26aa3c71b7a0f4f6af64319ee6e7c9131b85419f507d83154a5f1c3da29359f67a8a54b5818073d74a532b3ed4b8eb8cba65bbec6c58f0b658b6ca384243c605f0cbb73d481059f1c0585ddeef923d77e8b12025e753ea2f8c8e868c89f93e8ed65fbf4635b477ed3e37304da2a66a6d99d23c6b1de169d62ed47881a63fefa7d68ff38fcbe23165567", 0xab, 0x6}, {&(0x7f00000005c0)="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", 0x1000, 0x9}, {&(0x7f0000000100)="24426a47551e1664d9c139354ac28429db607955cda8e43490d8508f11", 0x1d, 0x1}, {&(0x7f00000015c0)="75e64078de36e0132d0d29a5a0e69bbde56bcc116295a05bcee292bcc4bea55ff9d8a890a2de94faeeef", 0x2a, 0x101}, {&(0x7f0000001600)="736964f7e5d8f2a4612bab7d68dfdd10e3574959d9dab481bc43735a42933681a6b5946fb82389f17d8d99c3f5c9a239a7c25af9453c714fac10f8f4f12307880259379d9a5a2ec8ef8229ea8d695436c63549883e2bb411d534cdcace6856528989f8847be089bc01549bdf4f243aeb3beaa27f8826a0475390d6a0ec2dadc170598f0d83d8bea21f7d39dc691be73445abbaa2629ef849ba113721271323ae1eba6f695d8de22e0807a9d3f345a54baa", 0xb1, 0x4}, {&(0x7f00000016c0)="2641ef90071a02519d0c87d171063f027b5cfb84879df2b44920a682233b39accad558257c917c3911e1737408b4381744f52423ccaa96ba73158c37ae", 0x3d, 0x3}], 0x0, &(0x7f0000001800)={[{'omfs\x00'}, {'\xb6'}], [{@fsname={'fsname', 0x3d, '%'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@obj_user={'obj_user'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-$\'{'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_appraise='dont_appraise'}, {@smackfstransmute={'smackfstransmute'}}]}) [ 394.501765][T21541] ? tomoyo_path_number_perm+0x24e/0x590 [ 394.507437][T21541] ? generic_block_fiemap+0x60/0x60 [ 394.512638][T21541] ? lock_downgrade+0x6e0/0x6e0 [ 394.517502][T21541] ? loop_set_status_old+0x250/0x250 [ 394.522803][T21541] blkdev_ioctl+0x2a1/0x6d0 [ 394.527296][T21541] ? blkdev_common_ioctl+0x17e0/0x17e0 [ 394.532744][T21541] ? __fget_files+0x288/0x3d0 [ 394.537410][T21541] block_ioctl+0xf9/0x140 [ 394.541728][T21541] ? blkdev_read_iter+0x180/0x180 [ 394.546739][T21541] __x64_sys_ioctl+0x193/0x200 [ 394.551498][T21541] do_syscall_64+0x2d/0x70 [ 394.555929][T21541] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 394.561823][T21541] RIP: 0033:0x466217 [ 394.565700][T21541] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 394.585293][T21541] RSP: 002b:00007f02b8aa4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 394.593691][T21541] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 394.601662][T21541] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 394.609614][T21541] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 394.617570][T21541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 394.625541][T21541] R13: 0000000000000005 R14: 00000000200002b0 R15: 0000000000000002 09:12:35 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xc0030000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:35 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x1000000000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:35 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x79a1236, 0x210101) write$midi(r0, &(0x7f0000000040)="5a4c2a21406924f1ffbdebcd0aa8cdd43af4bae6450ffc7b22988e37c5f16814a6909eaa47eb14f5f4da017b447d1500ca3d0b395177f7b81d791f9c3e2b5a3561e763c22ae13ac9d60d9a037027f5d0c51b098609ce9d35b557e9960d03637b5c5f6b1203ce0b07f6315278a4c57f45e7bfdf0b59a57421a18ecea4bcb105e8adbdc9b3254ec4f35e8fc9c1318b27c7e220f24035a988b711d9be605a90308f9d1e", 0xa2) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000019c0)={{{@in=@broadcast, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000001ac0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], r3, 0x23, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xfffffffffffffefd) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r2, 0x1) r4 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f0000000940)={0x0, 0x70, 0x7, 0x1, 0x1, 0x3, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000900), 0xa}, 0x20, 0xffffffff, 0x6, 0x1, 0x1ff, 0x1, 0x5}, r6, 0x3, r4, 0x2) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x6}, [{0x2, 0x4, r7}], {0x4, 0x1}, [], {}, {0x20, 0x4}}, 0x2c, 0x0) ioprio_get$uid(0x0, r7) fchown(r4, r7, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={&(0x7f0000000240)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000800)=[{&(0x7f00000002c0)="81fbc4a43eee65d2f31ec9f35a904e099cd1cdb4920506980c9658b852006ebe697b317d50ff43dfb4008af615d95e158c245fae9492d461c975cb415e48ad034e598addac36f75fec179375ffdf93410ec2da38d08be5611b91b145b267173673eec2eb6e07e17933784b43d9bc09f68aabe47cdc904c2b55b2ed1305bff6d873d727ca3733ac4569444c44d9825dcfccba1568c471a4144aeb10e4628d5d", 0x9f}, {&(0x7f0000000380)="a44d57beb19b6cf897885fad8c8ba148035c3ad27f1df0e18699a58dae4b0a3c0d204fddc260f0f4e50ac2643a57efede2ff8882d15c3a48476d0a702d3f8c77f1a33b41c73de41a3e89cc2ba0cf9f7ddcb078f88d95a84afefb7ef14d67004d1874927ab359d2c1e8389f673f56d9e1c9a563665a9e974e8a5eb9a7a07db0422ec18d36f78b97b406a4c14f195bbed560c32b2f2b5a14dc9c35a8b4d7afe70ca29a9aebe0c03d7884fbcdac825e1095500de2e355b57ab5b467116f0922", 0xbe}, {&(0x7f0000000440)="92e56d29bb436be9f861ac618a2a5ae5fa61edaf6722320cffae92990f1e854c6d7c2d52b6bd00721529b256c02a92b0977261556b07c0e7f39ed5ba01ef46ac7af0a1dd5be3604b1233ac4201fb699443c09e7946a6fabc3d752954047290b0733eef40dc9bd4ada5880178ebecb9c7a51fd853fd0b41fc8b9891289390000ce03c9f09b5346159a67bbcd35cff475ece40", 0x92}, {&(0x7f0000000500)="48ac07845db9e5e3597616273eb54f6e25332a33808c23d22f528b10c5b695e6795db07671f11bb11f1b21d56ee46b1b96b637bdcbf71be8dd77111cce0112c743ba572f7234329fd91e627892654e4654fbfb0d26808bb95a23372d17abbe3cfe9d4f86969c4b045ad4398efb48b548d343a90ef85f79a5f4359a2498eb0536529c233bf9d06aca055bd736f9a4cc6368ad2822d90ca826337e33e100518f1c2b8941d05ed6b6a519b5705dcd69c041829b35e7", 0xb4}, {&(0x7f00000005c0)="c8c3ca7e7c05d602f9ed95a6fd794ae3b6f0bd54034aa1", 0x17}, {&(0x7f0000000600)="f13e95fa7f1fdeaf570c8d038b1b958f88e8b3647fdaebc21383ffd9cc1ebd415786d60ef660f44da668d051e0b454a14446bb33d8f7431aa495b58cf2beb2addf356631e944862c5dd351fabed33f50accccfc12fd82e0e3c72dbee871686da5f6872daac480b9e021aa9583f40a664de24412ef837a85fce1b4c5d953ef6e18144235b1204d11db5cfda7120fbf69152f77aff74e88b067297c9a7ca0491fee7d5efeed6f225e5237a9df456e74d975da262b698dd29e822f7285b8f77", 0xbe}, {&(0x7f00000006c0)="41e48a122b29a0661e026624ffe13f04e2d1d7b0bc9032d618cecce011cc94b0840f7de035c63a6ac35341231e3bf637034656db557fae565c63ea2f914665d68d07aadad50d10d6b7b6f1f90939decaf1ec28938e3e63fc", 0x58}, {&(0x7f0000000740)="5641d895029e1166ba40047e73abf5612e38257d294a25acc8f7503bfa2059712f3c97b4ec56796876daf3adafe75553053865ac691cab9086edb616ddd011413a9b6f14fd5155d1391bc4e7d6e292b4428422c8d7eb00040340d90babe3564962f57407bd849ffd015437efbe9d5c6fa44a87a3e806a1dc40f65d4834dc0e90c08e2029bb867707224617de92835d7f3cb07eefae5d47e00a88124106f9e88160717d04cf1b6d5ad181baa1f93ec5296d56ba574188b319bcb204", 0xbb}], 0x8, &(0x7f0000000880)=[@cred={{0x1c, 0x1, 0x2, {0x0, r7, 0xee01}}}], 0x20, 0x15}, 0x408c0c0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x3, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00253326563b80dd0ef270f4abaa6a1f4ca3bc96"]) [ 394.744199][T21554] loop3: detected capacity change from 0 to 16383 [ 394.764415][T21541] befs: Unrecognized mount option "{Ù" or missing value [ 394.771534][T21541] befs: (loop2): cannot parse mount options [ 394.774577][T21554] vxfs: WRONG superblock magic 00000000 at 1 09:12:35 executing program 2 (fault-call:1 fault-nth:25): perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 394.871781][T21554] vxfs: WRONG superblock magic 00000000 at 8 [ 394.921312][T21554] vxfs: can't find superblock. 09:12:35 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x20) 09:12:35 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x4150489000000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 395.050413][T21582] FAULT_INJECTION: forcing a failure. [ 395.050413][T21582] name failslab, interval 1, probability 0, space 0, times 0 [ 395.077662][T21583] loop1: detected capacity change from 0 to 264192 [ 395.090045][T21586] loop5: detected capacity change from 0 to 264192 09:12:35 executing program 4: syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="85af5c7731804e9b416fab5aa3b1662bbdf44b05c2cf21bfc0d7d33efa7682c6bdb57d87290348c284e1ceef60e6547dcb65b136f0d65558608aeb7564a7ab1755ce11ed255ff7b5d0374f7306134c3a153d7dae5e2b3ab59842afa09dbf06620eb2000614a6c41f173198a9c31568c3b5713c0c81c7d743cc069fd8dbfb68d9e92eb1c9a8a709caa16cde394eb39d00000000"]) r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x6}, [{0x2, 0x4, r2}], {0x4, 0x1}, [], {}, {0x20, 0x4}}, 0x2c, 0x0) ioprio_get$uid(0x0, r2) fchown(r0, r2, 0x0) r3 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x6}, [{0x2, 0x4, r5}], {0x4, 0x1}, [], {}, {0x20, 0x4}}, 0x2c, 0x0) ioprio_get$uid(0x0, r5) fchown(r3, r5, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x6}, [{0x2, 0x4, r8}], {0x4, 0x1}, [], {}, {0x20, 0x4}}, 0x2c, 0x0) ioprio_get$uid(0x0, r8) fchown(r6, r8, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file1\x00', 0x3, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="eae150b81b74046b6c83879ea339e164b40ed3b84b31a6e3c44122908fcbe711d444c5de4659", 0x26, 0xffffffff}], 0x0, &(0x7f0000000300)={[{@huge_advise='huge=advise'}, {@gid={'gid'}}, {@uid={'uid', 0x3d, r2}}, {@size={'size', 0x3d, [0x74]}}, {@size={'size', 0x3d, [0x37, 0x2d, 0x78]}}], [{@fsname={'fsname', 0x3d, 'omfs\x00'}}, {@subj_user={'subj_user', 0x3d, 'omfs\x00'}}, {@euid_eq={'euid', 0x3d, r5}}, {@smackfstransmute={'smackfstransmute'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'omfs\x00'}}, {@appraise_type='appraise_type=imasig'}, {@smackfsdef={'smackfsdef'}}, {@euid_lt={'euid<', r8}}]}) [ 395.153973][T21583] omfs: Invalid superblock (0) [ 395.167964][T21582] CPU: 1 PID: 21582 Comm: syz-executor.2 Not tainted 5.12.0-rc7-syzkaller #0 [ 395.176833][T21582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.186974][T21582] Call Trace: [ 395.190252][T21582] dump_stack+0x141/0x1d7 [ 395.194594][T21582] should_fail.cold+0x5/0xa [ 395.199094][T21582] ? __kernfs_new_node+0xd4/0x8b0 [ 395.204108][T21582] ? __kernfs_new_node+0xd4/0x8b0 [ 395.209119][T21582] should_failslab+0x5/0x10 [ 395.213613][T21582] kmem_cache_alloc+0x5e/0x370 [ 395.218364][T21582] ? kernfs_add_one+0x36a/0x4c0 [ 395.223208][T21582] __kernfs_new_node+0xd4/0x8b0 [ 395.228054][T21582] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 395.233509][T21582] ? __mutex_unlock_slowpath+0xe2/0x610 [ 395.239046][T21582] ? wait_for_completion_io+0x270/0x270 [ 395.244582][T21582] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 395.250820][T21582] ? kernfs_next_descendant_post+0x1a3/0x290 [ 395.256795][T21582] kernfs_new_node+0x93/0x120 [ 395.261466][T21582] __kernfs_create_file+0x51/0x350 [ 395.266573][T21582] sysfs_add_file_mode_ns+0x226/0x540 [ 395.271945][T21582] internal_create_group+0x328/0xb20 [ 395.277227][T21582] ? sysfs_remove_group+0x170/0x170 [ 395.282416][T21582] ? __disk_unblock_events+0x2d0/0x2d0 [ 395.287870][T21582] ? __sanitizer_cov_trace_cmp1+0x22/0x80 [ 395.293583][T21582] ? __loop_update_dio+0x2d2/0x690 [ 395.298685][T21582] loop_configure+0xac5/0x13a0 [ 395.303450][T21582] lo_ioctl+0x3f7/0x1620 [ 395.307687][T21582] ? lock_is_held_type+0xfd/0x140 [ 395.312700][T21582] ? loop_set_status_old+0x250/0x250 [ 395.317978][T21582] ? find_held_lock+0x2d/0x110 [ 395.322736][T21582] ? tomoyo_path_number_perm+0x204/0x590 [ 395.328361][T21582] ? lock_downgrade+0x6e0/0x6e0 [ 395.333203][T21582] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 395.339436][T21582] ? tomoyo_path_number_perm+0x441/0x590 [ 395.345065][T21582] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 395.351298][T21582] ? tomoyo_path_number_perm+0x24e/0x590 [ 395.356949][T21582] ? generic_block_fiemap+0x60/0x60 [ 395.362138][T21582] ? lock_downgrade+0x6e0/0x6e0 [ 395.366981][T21582] ? loop_set_status_old+0x250/0x250 [ 395.372256][T21582] blkdev_ioctl+0x2a1/0x6d0 [ 395.376755][T21582] ? blkdev_common_ioctl+0x17e0/0x17e0 [ 395.382206][T21582] ? __fget_files+0x288/0x3d0 [ 395.386874][T21582] block_ioctl+0xf9/0x140 [ 395.391196][T21582] ? blkdev_read_iter+0x180/0x180 [ 395.396210][T21582] __x64_sys_ioctl+0x193/0x200 [ 395.400968][T21582] do_syscall_64+0x2d/0x70 [ 395.405374][T21582] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 395.411256][T21582] RIP: 0033:0x466217 [ 395.415138][T21582] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 395.434734][T21582] RSP: 002b:00007f02b8aa4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 395.443165][T21582] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 09:12:35 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='v7\x00', 0x0, 0x0) umount2(0x0, 0x0) [ 395.451125][T21582] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 395.459085][T21582] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 395.467042][T21582] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 395.475001][T21582] R13: 0000000000000005 R14: 00000000200002b0 R15: 0000000000000002 09:12:35 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x4800000000000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:35 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xc0ed0000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 395.560638][T21603] loop5: detected capacity change from 0 to 264192 09:12:35 executing program 4: fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000780)='trusted.overlay.redirect\x00', &(0x7f00000007c0)='\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0xc40, &(0x7f0000003800), 0x0, &(0x7f0000003900)) r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb10000000e3bd6efb440009000e000a000d000000ba8000001201", 0x27}], 0x1}, 0x50252) recvmsg(r2, &(0x7f0000000ac0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/54, 0x36}, {&(0x7f0000000c00)=""/84, 0x54}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000003040)=""/77, 0x4d}], 0x4, &(0x7f0000000980)=""/22, 0x16}, 0x100) fcntl$setpipe(r2, 0x407, 0x3) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="020000000100060000000000020104006aa4851c17ff16512ecb8b457d6bc2128b713789290e9651ebcd6f45dd5f2aa2a476f4f8cdc7a443b7d2a9dc10ced8da847adb520b3ca9b2708d160337f9cb823b50ef412a1bda3363dd39501e7520c944b5b2d532989ebcd5a319f15949c3a80b722de561be2d69edd72639402a7f9b8c0faab502f561c21eee357f3430e806f11f6ffb842d", @ANYRES32=r3, @ANYBLOB="040001000000000010000000000000002000040000000000"], 0x2c, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0xf55bb000) ioprio_get$uid(0x0, r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000740)='B-\x00') fchown(r0, r3, 0x0) syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file1\x00', 0xfffffffffffff0b8, 0x6, &(0x7f0000000580)=[{&(0x7f0000000240)="75f5ad1c15e7f5e7bf5a7e601ff90307d788e0fc6bdb38e521ebe34fdf128a7d5b91d6a6b743a823fdb3a1dcfb1503ff9e39b611524726f76109b5291f0121ff164adfb58819baa9f79bd09e469a5abba04c1926642b5785763ac335d2b191f1aaf98ed0d3599f80a8ff9c5c2b33efc7295337bc98c9bce12bfd0e52ae574b3db9b527e8b4dbc090c1a3ad5290435242941e1abe0908b9f51e9e32ea5725e66924f9ddcc1aa6978096626934f6f9494143d3b7505f0932ba637ee4ae716d0686ee6f057beb1c0a40d9fec75ccfcc01731b39", 0xd2, 0x4}, {&(0x7f0000000340)="a6f8870ff5302ac3638d5dbe7a5d26b3102b80b4b22691dbf6b583c127863b52016c5bb17d3aa7d3133a66244132097d03b89db97b3ce99abf53dabbfe61b4ef377d7b3558849bb89c179c3dd7e091f4f4f9ccb5aaa63f795a6a5d41e0ad70371b3977b6511f615babf2e2c83f54b5039a40cd2513b56d2c587db960894f95f5900e1caed60a51222d062da417a008a0c3ee852c78c08a385bd59281369d2d181b54674223560bd2ce25bd66d28697d3270fa3d37b30e76693081e5b4caabedd9cd63bacd18be84a6cfee8c726855ed965473eabdfa843cc62a10cf80775335f10ffd659196b", 0xe6, 0x2}, {&(0x7f0000000080)="a4c104bef85fede1fe0dd43c691de922fbe8151051dad22364bbf57bb8d169f7985505553ca1a390b7737f6426a397ca3f95241a", 0x34, 0x5}, {&(0x7f00000000c0)="caece1c663d2458b01cc6a1344e1808239a1a7ed7b5bd39162e47bebd818bb1bfcaecd5ed659df6e5b07268a073aeb79710f66dd4ae547fd917168c133e3e9b084f3f7cb2eec9f8ece638fd2da0dfdb1e79dcdbe1fcfd0ebccaf69eed6e62a63d975", 0x62, 0x8}, {&(0x7f0000000440)="f02e15b1dde2d902297208ddfdc2f48312cd98b7f51c1c0f018dd52a599be1b9f8507c4623f54588df77048cc9e7a188512fa4f47b46314648903816f5a25aad3b1cd5068d2b34639263131facfc999c9b1af03dd1533c5b33756697871d33fb6d2b0949e1941f7d8714c04d16d0bf1211a7b639", 0x74, 0x84}, {&(0x7f00000004c0)="bc8cc362e21e2465f8d90f39c1d923edb7f4374094c68af9db6c5d31414a2f4ad6f88d4fcf976d7a95231a1a4bebf81d36c46faf3dd819cbd0f087b48cc3f8bb34d158beb348ed4c34f5cd18d495819e3f8667e3161cba31fd4f06cecde13a7098572812261be7c4bee06508b51e52693fa0fb29140c0d81e011eb4ec20ef0284dd4a46968e42bbf80eab6b43092020a60456ef025869a4d967ef19f674ae96ef1b7ed4fc8783ef66f76866c426d829a90b6", 0xb2, 0x2}], 0x44cb2, &(0x7f0000000640)=ANY=[@ANYBLOB='%,omfs\x00,omfs\x00,seclabel,euid<', @ANYRESDEC=r3, @ANYBLOB="2c6673757569643d65326f30636631332d353307612d573365342d633430622d36316165353134332c736d61636b66736465663d6f6d6673002c736d61636b6673666c6f6f723d6f6d6673002c736d61636b66736465663d2b7b2c6d6561737572652c64576e745f61707072616973652c646f6e745f6d6561737572652c726f6f77636f6e746578743dbb6e636f6e66696e65645f752c00"]) 09:12:36 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x2000000000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 395.779113][T21582] befs: Unrecognized mount option "{Ù" or missing value [ 395.864107][T21582] befs: (loop2): cannot parse mount options [ 395.878643][T21624] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 395.884777][T21622] loop1: detected capacity change from 0 to 264192 [ 395.887670][T21624] device team0 left promiscuous mode [ 395.900503][T21626] loop5: detected capacity change from 0 to 264192 09:12:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r0, 0x1) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f0000000680)={{}, {0x100}, 0x10, 0x0, 0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)="9a170f2bdfa922bfddd58f705b6d649eb1c725308a9f9680f8ca18055a0283fcb585d441f4f3865bc2b3a9ad2c7d563a48380e7e2f6579d61d7a47f04d4d94ae8ed400cc0bf539c1022d61ff0ebbf25a51ff95a6517924fd3ed8c3ff4b18b6d30fd704d1e36a3dcdfec91537e2b82b7f5b19b4c93baccce54c4210e49b0dcfd5c5a4acedb7edeb2bf5fa5ae381c10415ed", 0x91, 0x0, &(0x7f0000000540)={0x2, 0xb6, {0x1, 0xc, 0x95, "f991d75fd95ff5f7bbda8c241f508e5b2a96980b7afce6d6435b03ca6d8ed29e997f83ffdaa0a00949b6d244b3c7582c9bcec3d183912bde72c7453f3da94c3f78164c4d7b02223199993a5c326e6637f69dcf7dcde76c2123f22e867e883295d725200e0d52b9314cda67eae05f905303595cd3b2b771c27551f11d7adf9f9b9a633414c7fc0e5777c392285b1c5b58f6d0377b98", 0x14, "9b64ca05c3c00ff3420278b5e924a7ec8ee7b720"}, 0x53, "a20d82b60b5dad5522bebcae621fbe87b01f3ed7f6225dee599bea7e793bbfafedb3a0b32250c6f0c37089b0f45940eae1c4a10213dc94e1ed163aacb5a792647efbc36ed4d2aecf2326b5f92e6fc649287488"}, 0x115}) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000800)={0x0, &(0x7f0000000700)=""/251}) umount2(0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x8001, 0x4, &(0x7f0000000300)=[{&(0x7f0000000140)="752a97e7e37d8433cdcdad183c418008f9e97bd213488530020002d2c9d7cd0e7a8ab58b82221293659083a6a2abfa5549cb63bb7ededa4764f8242a43716c863ad87291eb490087ff3351a78e3cdb5ba8d4cffd5fece40df7f64caff436066643309fcb66edd96490bbc91a3f9e1370fe391839e9c536167652f2a5fd8f423fb9c501454c65e7eba422b934", 0x8c, 0x115}, {&(0x7f0000000200)="afaf8e2ffc498aaa008a", 0xa, 0x6}, {&(0x7f0000000240)="eb2a59dd9e2281217cffc587177dcc275d133c3e8a258ee7a8a8e950cda76919fb1f981d88b45ca05e47664dad6ed4937d553c2d4186b9c1c0139b", 0x3b, 0x7}, {&(0x7f0000000280)="26f37ed54a8225187e2fcd7f60042536b491a8be1de6312336138853192e6f3f81d37ea57f8f17794f529d34cb868bd008c7dbd79bc95f96e9a9136fd36e20a94562cf32e6bd25", 0x47}], 0x1256012, &(0x7f0000000380)={[], [{@permit_directio='permit_directio'}, {@hash='hash'}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, ']&-'}}, {@dont_appraise='dont_appraise'}, {@dont_measure='dont_measure'}]}) [ 395.910459][T21624] device team_slave_0 left promiscuous mode [ 395.924525][T21624] device team_slave_1 left promiscuous mode [ 395.933071][T21624] bridge0: port 3(team0) entered disabled state 09:12:36 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 395.997613][T21624] team0: Cannot enslave team device to itself 09:12:36 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x4c00000000000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 396.150449][T21622] omfs: Invalid superblock (0) [ 396.159287][T21635] loop3: detected capacity change from 0 to 64 [ 396.196361][T21639] loop5: detected capacity change from 0 to 264192 09:12:36 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xc1030000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:36 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x41) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r0, 0x1) openat(r0, &(0x7f0000000040)='./file0\x00', 0x408002, 0x160) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) 09:12:36 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x40000000000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 396.489769][T21648] befs: Unrecognized mount option "{Ù" or missing value [ 396.498657][T21648] befs: (loop2): cannot parse mount options 09:12:36 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]) [ 396.531242][T21660] loop5: detected capacity change from 0 to 264192 [ 396.566512][T21624] syz-executor.4 (21624) used greatest stack depth: 22808 bytes left 09:12:36 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x2, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:36 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x6800000000000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 396.603114][T21667] loop5: detected capacity change from 0 to 264192 09:12:36 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x6}, [{0x2, 0x4, r4}], {0x4, 0x1}, [], {}, {0x20, 0x4}}, 0x2c, 0x0) ioprio_get$uid(0x0, r4) fchown(r1, r4, 0x0) stat(&(0x7f0000000700)='./file1\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file1\x00', 0x7, 0x8, &(0x7f0000000640)=[{&(0x7f0000000240)="cfd768edb26a179338f58699422d759837af6f11e68afe1e49d92e36bb1e222010c36afa4fb6ea6914edb62ceae93e93a1004ac9e50cce295db8f0a6fad873e47effe72792288cbb1cf9f131f380161bd66640bf3657ca80e69b6ba2297ac0d880a6def0df7d6d6f232a0160fbec7bdb43c68c772b9af0b6ed56ea06c42433d643cc87bc1a95b763b09516dae1df9b750775e740414a629c44a44a1df15c00ae743f2b6b10902187ee54e6531fb788a337aa22f041b401fa61b568490acacb9e34dba9746c134f0d9b123bdfc75ee8f1e4d1cb2d", 0xda}, {&(0x7f0000000080)="2bb9883d4e3488971417883f331a276f22185facc62ca63f53c713b5b99c646a03b50f545ad779a642bf7da093dfbfc36a90a5a3bfe9dadbf7e904d231d0f5343875957f00e4518871e39971146d46ded7d00381d18d78e0fdd203d165f28bc44d03ed731f13539a327d8638ef770d681e6d", 0x72, 0x5}, {&(0x7f0000000340)="67ff27421737a09297e203c396878aaccf1f226e7f345098a5d98eff1580923a353ea544435ccd681be80c7d16fcdc262d53f6087a92b9f5b8e8bcec6e64f8ac4d6d0cf0d78ed652c3f8cf6e98fe44d0b2d5d33082f8b057e82be210f7618de03308d1b1", 0x64, 0x3}, {&(0x7f00000003c0)="1798bb916250b75216345025ae5a0591e94d207e56c27f7184c378a57a798a42bbb9e780d97f266a42badf4ffc3da476e11bf9b26367edcc2aa85f0cfe650dbc91b921bff64c1761b83ab71f4e9344b75451082a8c59fb12caac648aaee123e50512c78a233eb7ff17", 0x69, 0x100000001}, {&(0x7f0000000100), 0x0, 0xbd8}, {&(0x7f0000000440)="0e67babb3b25ab17bb2ff589ef3dfff024642a90a2d1322ba5f1eed54057690e82c157a77592c0f62bfbcf7f9360389dd0e3c00d7a3b7305987036cd3e6b47ae6b0bb6c8f99ec37f7be2f01fa7b932f989b7525a7bae7d61c5c133fb7c53c16a39b3ce2bcd3bec568b8bd5d92829e9c9bfcad3d914a6d4d8bd7a277d56baccee9ad9d1a90462b6d5516c5ea077f5db49b105df2a0cadde2533bcfd416e3f6c1f57e9d38edbd5b6d5dd99eb79e3211ada53875a14004a31", 0xb7, 0x80}, {&(0x7f0000000500)="fc40583e", 0x4, 0x3}, {&(0x7f0000000540)="8875bb7e8eb22bb6eeb0f43cdb1101aa4e11c36da30129185fe3ec30fa7c979fa809aedce744510dc914cad7ddf4493a51d9ad60ce0645d5ab1bf7ac2c802b9c22767d83d2d927c7678167cbea6a8243aa438ca26af3d9747eea794bd96e656e8f6920162d781266fa665f6d9cee14ffa2b063566cd64678400d5f8cfc767c0aa7e2acb126863b0f37998716a37d4de5c2859945f6468ca5c5798e02189343486cebf3612a88a75591145c7934baf28afc1b3f608a5c56acd69daa2d5e848c9a49ebd6ef1c8640b360a919e2481087ab03e5ba51a9b1cdedeca723a9bb4c600ff34ae8d226150fd2907b4a39af812a06f869baaf", 0xf4, 0x9}], 0x2002050, &(0x7f00000007c0)={[{@data_journal='data=journal'}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x9}}], [{@fowner_lt={'fowner<', r4}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x38}}, {@euid_eq={'euid', 0x3d, r5}}, {@smackfshat={'smackfshat', 0x3d, '!'}}, {@seclabel='seclabel'}, {@subj_role={'subj_role', 0x3d, '{'}}, {@measure='measure'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@permit_directio='permit_directio'}]}) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)=ANY=[@ANYBLOB="10"]) perf_event_open(&(0x7f00000008c0)={0x0, 0x70, 0x2, 0x9, 0x1, 0x0, 0x0, 0x7, 0x10000, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x0, 0x1, 0xbf22, 0x4, 0x3, 0x1}, r3, 0xe, r0, 0x0) [ 396.653708][T21672] loop1: detected capacity change from 0 to 264192 09:12:36 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x100000000000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 396.738624][T21672] omfs: Invalid superblock (0) 09:12:37 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x204020, &(0x7f00000001c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@index_on='index=on'}, {@default_permissions='default_permissions'}], [{@measure='measure'}, {@obj_user={'obj_user'}}, {@uid_lt={'uid<', r1}}, {@smackfsroot={'smackfsroot', 0x3d, '-'}}, {@pcr={'pcr', 0x3d, 0xf}}]}) umount2(0x0, 0x0) 09:12:37 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xc2030000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 396.877063][T21684] befs: Unrecognized mount option "{Ù" or missing value [ 396.932632][T21684] befs: (loop2): cannot parse mount options [ 396.940531][T21698] loop5: detected capacity change from 0 to 264192 09:12:37 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x6c00000000000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:37 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x40, 0x0, 0x808000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x100) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)=""/183) 09:12:37 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xc2993d87, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:37 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) mount$overlay(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='overlay\x00', 0x8000, &(0x7f0000000080)={[{@xino_auto='xino=auto'}, {@nfs_export_off='nfs_export=off'}, {@metacopy_on='metacopy=on'}, {@xino_auto='xino=auto'}, {@index_off='index=off'}, {@xino_off='xino=off'}, {@default_permissions='default_permissions'}, {@nfs_export_on='nfs_export=on'}, {@redirect_dir={'redirect_dir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './file1'}}], [{@pcr={'pcr', 0x3d, 0x5}}]}) 09:12:37 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x3, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 397.113501][T21708] loop5: detected capacity change from 0 to 264192 [ 397.150876][T21713] loop1: detected capacity change from 0 to 264192 09:12:37 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x7400000000000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:37 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x200000000000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:37 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x6}, [{0x2, 0x4, r2}], {0x4, 0x1}, [], {}, {0x20, 0x4}}, 0x2c, 0x0) r3 = syz_mount_image$qnx6(&(0x7f0000000600)='qnx6\x00', &(0x7f0000000640)='./file1\x00', 0x7, 0x1, &(0x7f0000001680)=[{&(0x7f0000000680)="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", 0x1000, 0x12d}], 0x80000, &(0x7f00000016c0)={[{'pcr'}, {'^)'}, {'.*.\x97#,-'}], [{@fowner_gt={'fowner>', r2}}, {@uid_lt={'uid<', r2}}, {@fsmagic={'fsmagic', 0x3d, 0x3f}}, {@seclabel='seclabel'}, {@fowner_eq={'fowner', 0x3d, r2}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) utimensat(r3, &(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)={{0x77359400}}, 0x100) ioprio_get$uid(0x0, r2) fchown(r0, r2, 0x0) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000140)="e2e4884272034c1feca65056453833d77f6f96ac777fc28af604f008ef51afe9c9e10e00112a7a9967fac42a588037ae7ddd449335fed9e845b7b64f5681a9f8c49c45415c9acabcddad21ce78405b0ac003bae31630d64da63267897f1bff678e706bc956f49f1c6f7b1da3692568f7cbbd36fa9cd1a7cc874b21218a6062883d10b0fc2ea99e5288945b3ed58e024c3f90b94543e90e29d16fc8f81302adb88db0580464b87efd851299747364a261d2ebc5b45bbd1d1a30a8d91afe4c2bb8613878614420acdc4ca57533a11974f7a48618bf8fe55cd218f82c9e2a7aa4ae7e954e9f0b592b385628413aa55cd8eaf8693a2ac8d1ff5171", 0xf9, 0x6}, {&(0x7f0000000240)="1127e618d13f8d76f430bf67b8da5f68571020985569157866d557843a9a18faeea0a4d95a73cba82364b670881da1124716ba58596f024a786bda0b3d6b2159571b184378524e3c3a50e5c3c58c5e21f4", 0x51, 0x8}, {&(0x7f00000002c0)="fc19c36d19d0af46a04a5a9629d7acd9f30247a90218abac8c74a88fab21a499e1b6698f43d7fedc26c5a9", 0x2b}, {&(0x7f0000000300)="c5b3cfa764afb2832e3a41275e1ee1f5ab79752a53959c882e445f4892db29729c3512cccb91dc12830200c457e5d0ea194d2a223890c6f09d0093c336bc6e54c37213dbb3181b6f030ed1e48d023f3248355594841f032f5dc3ad6fae87477a009c5fe362e7fbc25ff6ce19960df3574e09dd5dbeffd1ee3dc049f6fbd070b6ef345affaa74f883750e31fe0cb1e2b5190c8481fbfdd958cadcf72c6476ea5790d062c43026bc9b91106312c2936b14be4d7dea57072316fcc5422e286a4e", 0xbf, 0x80000000}, {&(0x7f00000003c0)="daefeb38303949fe12fb6ea18541067c8d2973cc73efd14d7009a64da72eb637f6d115ec61a2dde30b36fab101748e9b75baba25bb0c93a6e0c10f7a867bba6a59df578fc5c4bd030e1b3478a0294bf7c58ad40be33ccb03c323bad1351499576b44753696390e90fb1b501233590248dcdaf69fe0c661ee8e8373931a044efdeb3ad13b8fbe078f764dd27663f128cb6b31b8703615979a711ec457e1c4b0bd75a1acbc987ff70f73149f0d9cf09853c6c4ae4c161b208dccc16d80bf90ea96a3997d67112c784ad1ed8186", 0xcc, 0x40}], 0x10010, &(0x7f0000000540)={[{}, {'-[/'}, {'ocfs2_dlmfs\x00'}, {'@])'}], [{@subj_role={'subj_role', 0x3d, 'ocfs2_dlmfs\x00'}}, {@uid_eq={'uid', 0x3d, r2}}, {@obj_role={'obj_role'}}, {@smackfshat={'smackfshat', 0x3d, 'ocfs2_dlmfs\x00'}}, {@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x14}}, {@obj_role={'obj_role', 0x3d, 'ocfs2_dlmfs\x00'}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) 09:12:37 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 397.370975][T21726] befs: Unrecognized mount option "{Ù" or missing value [ 397.385605][T21726] befs: (loop2): cannot parse mount options [ 397.447672][T21731] loop5: detected capacity change from 0 to 264192 09:12:37 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) r0 = getuid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpu.stat\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file1\x00', 0x620, 0x2, &(0x7f0000000440)=[{&(0x7f0000000240)="bae1631ba0ba8be04401248c3201129b88da0d58dd75db281db8626e3b94c84cc06f7bdbe3c636cf0d9912622a1f42573096ccfa1026cd28ced63032790db48f8002e7dd0138f953c0231063723ad04dcd3bd665fc1659f8971b36d49d88b62c9a2ad6100ab5f731c3b57f18402e9232b985027d24a6b9efdabba705e7d9ccc29f200c702e1af19764133a892684ab1f894aa5be655072e3f619ed699e2b3d71467ca779387801624e1a18ec83057c4e6bf32cc9f80e2e6279fef6cef4590c1c66fb76e34985754439a9fc4ddf977b7643222876924574b6ea5ecbd5f4f3a75b0f97fd1062be5240", 0xe8, 0x9}, {&(0x7f0000000340)="3c02dd89ffacf2003266ab7185f8cc75067d2421890910d772df79fd33e89c5c10e74182a9b6998db9ea2fd6a4fa1c875710d4d493bafa5581bf6de35944617df922d42e6e3cfb2dd8210560cd578f518f4f8c41ff8813914869236a73cb52b2d221c058f4c7d979b05821c789cfd010c5aab02e9949e1d849005e3cac77c6169ffbd746c346367cae0e4ee90a6b6bfaf2649e98a1dbf3b6af3c966884fc22ab454fdd6ffd89a5e30640f9e7714151b70f4493472f736df45aa8db4d5fb4aa84117aaa93", 0xc4, 0x8}], 0xa40000, &(0x7f0000000480)={[{@nr_blocks={'nr_blocks', 0x3d, [0x37, 0x38, 0x31, 0x34, 0x67]}}, {@mpol={'mpol', 0x3d, {'bind', '=static', @val={0x3a, [0x2c, 0x35, 0x37, 0x30]}}}}, {@huge_within_size='huge=within_size'}, {@nr_blocks={'nr_blocks', 0x3d, [0x2d, 0x74, 0x33, 0x65, 0x67, 0x0]}}, {@mode={'mode', 0x3d, 0x6}}, {@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x2f, 0x31, 0x3a, 0x38, 0x2d, 0x38, 0x35, 0x37, 0x36]}}}}, {@mode={'mode', 0x3d, 0x1f}}], [{@uid_gt={'uid>', r0}}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040)={0xc00c3, 0x80, 0xa}, 0x18) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 397.490798][T21713] omfs: Invalid superblock (0) [ 397.531317][T21736] loop3: detected capacity change from 0 to 8 09:12:37 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xf5ffffff, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 397.593473][T21743] loop5: detected capacity change from 0 to 264192 09:12:38 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x7a00000000000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 397.694098][T21749] loop3: detected capacity change from 0 to 264192 [ 397.717980][T21748] befs: Unrecognized mount option "{Ù" or missing value [ 397.732262][T21759] loop1: detected capacity change from 0 to 264192 09:12:38 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x300000000000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 397.789024][T21748] befs: (loop2): cannot parse mount options [ 397.799367][T21749] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=6dc319fc) 09:12:38 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x8cffffff00000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 397.926803][T21736] loop3: detected capacity change from 0 to 8 [ 397.980553][ T37] kauditd_printk_skb: 57 callbacks suppressed [ 397.980570][ T37] audit: type=1804 audit(1618737158.225:84): pid=21754 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir025815273/syzkaller.CjDwU2/554/file1" dev="sda1" ino=15296 res=1 errno=0 09:12:38 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x5, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 398.026274][T21770] loop5: detected capacity change from 0 to 264192 [ 398.038891][T21759] omfs: Invalid superblock (0) 09:12:38 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x14004, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r1, 0x1) renameat(r0, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00') 09:12:38 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0xb5, 0x80, 0x0, 0x2, 0x0, 0x9, 0x400, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x19}, 0xa000, 0xffffffffffffbb84, 0x7, 0x0, 0x8, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10001}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000500)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8916, &(0x7f0000000140)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xbb\xbb\xb0]\t\x0f\x89d:\xfc%\xb4\x8f8b6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00\x00\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x82{)\xde\t\xbb\x8a\x16\xa4L\xa6\xba\xd9\xd7\xd6\x18\x82b\x87\xc0^\xfd\xac\x8e\xfd\xdf\xb8\xe2\xd4\xd8%\xb1\x8e\x80\xaa\xbfM\xb3\xe0K\xf6U\a\x00\x00\x00>\x80\x00\x00\x00\x00\x00\x00\x00') perf_event_open(&(0x7f0000000580)={0x2, 0x1, 0xfe, 0x5, 0x0, 0xe7, 0x0, 0x5, 0x10, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7ff, 0x0, @perf_config_ext={0x1ff, 0x7d}, 0x4202, 0x20000000003, 0x2, 0x8, 0x9, 0x1, 0x7}, 0x0, 0x1000000000e, r4, 0x2) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r0, 0x0) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x0) io_setup(0xc9, &(0x7f0000000080)=0x0) io_submit(r6, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xe, 0x0, 0x3, 0x1, 0x0, r5, &(0x7f0000000000), 0x100f0}]) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) sendto$inet(r1, &(0x7f00000001c0)="d7670470f2d9a7e5f30b84d2580c5a64bde385ddee11977a6bb6ad92f1dd24eec1a5133a4c1f799075698ba1af27a4fa3431a46f271631d1fede316b6c80933be66f0c6eea9a1887ee5c1af4ed20b109230eb4f37888c2e518d7fc3e8f4da7ec8553494cca8dba7411c5e77c42bd97e4cd9820e4707d3861e19ae613adfe0bbaf7de3a6b42966d54455b34f8129c21e28d9fd5101fd612f67937c7057f3979751ed297e62a5268bea689cabeb31a027cf287c7b3", 0xb4, 0x4000000, &(0x7f0000000440)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f00000002c0)) open(&(0x7f0000000180)='./file0\x00', 0x200000, 0x197) 09:12:38 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x97ffffff00000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:38 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x400000000000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:38 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xf6ffffff, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 398.389713][T21787] befs: Unrecognized mount option "{Ù" or missing value [ 398.439076][T21787] befs: (loop2): cannot parse mount options 09:12:38 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x6, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:38 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xf6ffffff00000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 398.497924][T21803] loop1: detected capacity change from 0 to 264192 [ 398.513805][T21807] loop5: detected capacity change from 0 to 264192 09:12:38 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r0, 0xf501, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x12b001) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@gettaction={0x24, 0x32, 0x400, 0x70bd28, 0x25dfdbff, {}, [@action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x40004}, 0x20000004) 09:12:38 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'osx.', '/.+\x00'}, &(0x7f0000000140)='\x00', 0x1, 0x2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) 09:12:39 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:39 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x4, 0xd4, 0x6, 0x2, 0x0, 0x6, 0x2488, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4601, 0xd0, 0x7f, 0x4, 0x0, 0x8, 0xfff8}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 398.831005][T21803] omfs: Invalid superblock (0) [ 398.874099][T21828] loop5: detected capacity change from 0 to 264192 09:12:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000840)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x24, r1, 0x701, 0x0, 0x0, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}}, 0x20000000) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x14, r1, 0x4, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x804) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) 09:12:39 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xf9fdffff, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:39 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x802, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x3a, &(0x7f0000000280)={0x0, 0x7, 0x4}) sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x8f, 0x6, 0x0, 0x3f, 0x0, 0xaa78, 0x2844, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x4, @perf_config_ext, 0x40000, 0x100000001, 0xaa4, 0x6, 0x2, 0xffffffff, 0x6}, r0, 0x7, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:39 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xf9fdffff00000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:39 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x500000000000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 399.177843][T21837] befs: Unrecognized mount option "{Ù" or missing value [ 399.204435][T21837] befs: (loop2): cannot parse mount options [ 399.215116][T21846] loop1: detected capacity change from 0 to 264192 09:12:39 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r0, 0x1) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x8000, 0x8) umount2(0x0, 0x0) 09:12:39 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xfcfdffff00000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:39 executing program 4: prctl$PR_CAP_AMBIENT(0x2f, 0x1, 0x20) r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0xaaaab15, &(0x7f0000000040), 0x3844004, &(0x7f0000000000)=ANY=[@ANYRES64=r0]) 09:12:39 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 399.484008][T21860] loop5: detected capacity change from 0 to 264192 [ 399.503937][T21846] omfs: Invalid superblock (0) 09:12:39 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x10000, 0x1, 0x0, 0x24, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) r0 = syz_mount_image$exfat(&(0x7f0000000080)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x80000000, 0x4, &(0x7f0000000440)=[{&(0x7f0000000140)="bacd3e64748d7d2c66c8fb8f513114dac0d7f6770833c32a7b428704d3ce8e6f3baa15eac03174b2a1a91aaaa7d97a5f77cebffc0522480eec1e04d651c72fb1", 0x40, 0xe7}, {&(0x7f0000000180)="e668af4aa9e3a82f25b0d2e220d94ddae3976a8d07d343020ba8e152aaa31f5b322f8dd6724381c615fe7a493d4c55406d3ab3749775a1a975461a38fccc151c07e5c33cb9db4afc49c0d7698a2f34ab13d04948916c72646df01f2d131802857e2072affd9815f41aac328d32107b9cb13868bb4c5fbd66d8fdb926cf11605c79fa7634b3c7787c2106f07362f6787bdf68e8b7abe83ade44c123e402384161c593f451fadd13a83b44a1516f235c03a0aa872bd1f5f5535ea81b0e2b9fd20482088f050a6b354451eed5a8567c599449ce29b55d53cb396c2b7dd9a25b054e11", 0xe1}, {&(0x7f0000000280)="d29d7e79106130ad6e13a17c40c1d62546d240e6dee1622b8df9e73722d7e68a102afcb76a89b26211708cfc9e1cc502ccf8572bc598c87b596b17b597a188379cc39883c4d39b5cb3c9f3e324f7a2ce36cadecca47752b70d2398c5ed9980beb771cc6cb3cd107ff5fc724406bb0375e2fe5fecff0141f10a881c6d8e04734f21e9b8b27ef44088d1aa4acb093d4f34dc6e72bc6a423d26ec1e683ae3c96ff85d7f0fdfebf91971de71318384e56ada9c02d37c30c984334572961bcb10c5a0a45031d9", 0xc4, 0x8}, {&(0x7f0000000380)="bd2eda61791f45504381e510556af1d3a4a304be77ce06dbfc27f5e57a318383607adb272488554b8a6726c18ebc2a34b957889f9ffdffc69a9adcfb70c084f0d05bad78559d023e339ad822afb7273a3e4906c3c9b3f7a4836db7fd8bc438b04bd06291b4c8749e893596f07a5ea1c2bd1179dc9cf943008aeeef140a025e3fe64407dc334c8783caf8777444765d70cc5d836f708d32d00015b36470bbe3755ff49e9284068ef74c52acaff6e7a4461b28afeb", 0xb4, 0x5}], 0x204010, &(0x7f00000004c0)={[{@umask={'umask', 0x3d, 0x8}}, {@discard='discard'}, {@gid={'gid', 0x3d, 0xee01}}, {@namecase='namecase=1'}, {@umask={'umask', 0x3d, 0x6}}, {@fmask={'fmask', 0x3d, 0x10000}}, {@discard='discard'}, {@errors_continue='errors=continue'}, {@namecase='namecase=1'}], [{@smackfsroot={'smackfsroot'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ','}}, {@appraise='appraise'}]}) openat(r0, &(0x7f00000005c0)='./file0\x00', 0x420800, 0x31) 09:12:39 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfbffffff, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 399.712263][T21869] befs: Unrecognized mount option "{Ù" or missing value [ 399.759013][T21880] loop5: detected capacity change from 0 to 264192 [ 399.801913][T21869] befs: (loop2): cannot parse mount options [ 399.936842][T21886] loop3: detected capacity change from 0 to 264192 09:12:40 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xfdfdffff00000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:40 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x600000000000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 399.979751][T21886] exfat: Deprecated parameter 'namecase' [ 399.989079][T21886] exfat: Deprecated parameter 'namecase' [ 399.996204][T21886] exfat: Unknown parameter 'smackfsroot' [ 400.006145][T21888] loop1: detected capacity change from 0 to 264192 09:12:40 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x10, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:40 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2000, &(0x7f00000001c0)={[{@mode={'mode', 0x3d, 0x8}}], [{@appraise='appraise'}, {@permit_directio='permit_directio'}, {@pcr={'pcr', 0x3d, 0x40}}]}) r2 = perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x87, 0x1f, 0x16, 0xa8, 0x0, 0x3, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x400, 0x2, @perf_bp={&(0x7f0000000240), 0x5}, 0x85e0, 0x0, 0x9, 0x4, 0x200, 0x9, 0x6e9}, 0x0, 0x3, r0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r1, 0xc4009420, &(0x7f0000000380)={0x10, 0x5, {0x3f, @usage=0x80000001, 0x0, 0x8001, 0x1, 0x8, 0xfffffffffffffff7, 0x3, 0x9e, @usage=0x2, 0x7, 0xe9e1, [0x8, 0xffffffff, 0x66, 0x9, 0x916]}, {0x2, @usage=0x4, 0x0, 0x3, 0x3, 0x1, 0x1, 0x5, 0x18, @struct={0xac, 0x1}, 0xe51, 0x6, [0x9, 0x2, 0x6b, 0x0, 0xffffffffffffff80, 0xcaa]}, {0x7, @struct={0x3ffc0, 0x80000000}, 0x0, 0xfffffffffffffffb, 0x4, 0x100000001, 0x3, 0x30c3, 0x10, @struct={0xffffffff, 0x46e}, 0x9, 0x1, [0x7, 0x400, 0x0, 0x3f, 0x7fffffff, 0x3]}, {0x0, 0x8}}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000780)={{r2}, 0x0, 0x18, @inherit={0x58, &(0x7f0000000300)={0x1, 0x2, 0x889, 0x6, {0x12, 0x3, 0x8d, 0x9, 0x5}, [0x280000000000000, 0x9]}}, @devid=r3}) perf_event_open(&(0x7f0000003100)={0x0, 0x93, 0x7, 0x2, 0x1, 0x0, 0x0, 0x3ff, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0x7, r0, 0x1) write$P9_RREADLINK(r0, &(0x7f0000000040)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) 09:12:40 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfcfdffff, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 400.290188][T21888] omfs: Invalid superblock (0) 09:12:40 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xfdffffff00000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:40 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x700000000000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:40 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfdfdffff, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 400.460301][T21905] befs: Unrecognized mount option "{Ù" or missing value [ 400.530710][T21905] befs: (loop2): cannot parse mount options 09:12:40 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) execveat(r0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)=[&(0x7f0000000040)='#\\:&\x00'], &(0x7f0000000240)=[&(0x7f00000000c0)='\x00', &(0x7f0000000100)='omfs\x00'], 0x100) 09:12:40 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x6}, [{0x2, 0x4, r2}], {0x4, 0x1}, [], {}, {0x20, 0x4}}, 0x2c, 0x0) ioprio_get$uid(0x0, r2) fchown(r0, r2, 0x0) syz_mount_image$vxfs(&(0x7f0000000040)='vxfs\x00', &(0x7f0000000080)='./file0\x00', 0x8000, 0x8, &(0x7f0000000680)=[{&(0x7f0000000140)="b6e268ff088a02ed8a3d3d20a44cd492db08b72c24eaffe4829c24642b779e33e147b4ab1fc0d468f76464b2e07ded24813a22d2032e016030b18a0cabef99875755a38035d34b031fd5f7056ec0360ac636a2cdfae43cb373bf1115097cbd772d0067958aadce03a33feb1856fffbfbc21bdbebe9483aa1943a32a1ecf836afd993ab88d087b884412c2a46374d9da946ed23e88702ab7c2922e3155e31c7214761890a06e0f50e7258c7583c52339e1850e6aff8d4f0821dc4", 0xba}, {&(0x7f0000000200)="d91c070983", 0x5, 0x4}, {&(0x7f0000000240)="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", 0xfc, 0x7fffffff}, {&(0x7f0000000340)="1eb817b40844246781448e6884c5c6fc9ea0e11fd7c612bb6a5500ce80624b8cea7a0a3fd9a63c7779e9024748d519e32e7d8ae42ee56c757b53dc22b3516e2d8cfe24707f782a6da1228326344711acc9f8afba97aa35c31f9f2c084002b4b0da7e5b181d16a757b4e2229a4cd8219491f8129608f14216139be18cdff8c021fa4c69a6d38081bdec4b7e08e341adacec53da2db24de3ffeb11baecff43151a78c37c0b21d6bba34d2a8a0d9f", 0xad, 0x2}, {&(0x7f0000000400)="ed8aafba329606ef6738e77c873fc74bcf", 0x11, 0x9}, {&(0x7f0000000440)="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", 0xfe, 0xbf}, {&(0x7f0000000540)="1ca56bc4d23dd2b63ec9ed9f570061a907271a248316fea51d75413fa0b4af2a85267755f9b5d746570effe7cc30d8b19ddcfc31e07367afb26cdd70438164699f80220b9d", 0x45, 0x80000001}, {&(0x7f00000005c0)="6c427a11ea2b3b44e08cbef6919fa537b06c9cc72c53ba112967818f77cc6532599369eb4d9914ff933e3621f38f363fe213f4fbc8be1ef457d62487766649444d4a8a934519aa368e06390015c1583513b2a5f24d11c99347000a62f94b58315ceac22d96eb8388a1fd1c1dc531a3172c28abad9917cecb721e1f1c9f76712d92dc809d5a1222290d04c60c4dba1590030c", 0x92, 0x7fffffff}], 0x0, &(0x7f0000000740)={[{'ocfs2_dlmfs\x00'}, {'}'}, {}, {}, {'ocfs2_dlmfs\x00'}, {'--'}, {'-%%*&\''}], [{@appraise_type='appraise_type=imasig'}, {@uid_lt={'uid<', 0xee01}}, {@fowner_gt={'fowner>', r2}}, {@permit_directio='permit_directio'}, {@smackfsdef={'smackfsdef', 0x3d, '!%'}}]}) [ 400.576159][T21920] loop1: detected capacity change from 0 to 264192 09:12:40 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xfeffffff00000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:41 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x48, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 400.697150][T21923] loop5: detected capacity change from 0 to 264192 [ 400.707362][T21920] omfs: Invalid superblock (0) 09:12:41 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfeffffff, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:41 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xff000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:41 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x800000000000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 400.851248][T21935] loop3: detected capacity change from 0 to 264192 09:12:41 executing program 4: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x3a, &(0x7f0000000280)={0x0, 0x7, 0x4}) sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 400.922530][T21952] loop5: detected capacity change from 0 to 264192 09:12:41 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x3a, &(0x7f0000000280)={0x0, 0x7, 0x4}) sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3, 0x7f, 0x3, 0xf7, 0x0, 0x2, 0x10, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000000), 0x7}, 0x11813, 0x7b46, 0x8, 0x4, 0x9, 0x81, 0x2}, r0, 0x2, r1, 0x3) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)='overlay\x00', 0x0, &(0x7f0000000300)={[{@workdir={'workdir', 0x3d, './file1'}}, {@index_off='index=off'}, {@lowerdir={'lowerdir', 0x3d, './file1'}}, {@metacopy_on='metacopy=on'}], [{@dont_appraise='dont_appraise'}]}) 09:12:41 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xfeffffffffffffff, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 401.021899][T21935] vxfs: WRONG superblock magic 00000000 at 1 [ 401.057738][T21964] loop5: detected capacity change from 0 to 264192 [ 401.077167][T21946] befs: Unrecognized mount option "{Ù" or missing value [ 401.087569][T21945] loop1: detected capacity change from 0 to 264192 [ 401.096969][T21935] vxfs: WRONG superblock magic 00000000 at 8 09:12:41 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xff00000000000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:41 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x4c, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 401.134142][T21946] befs: (loop2): cannot parse mount options [ 401.141798][T21945] omfs: Invalid superblock (0) [ 401.143992][T21935] vxfs: can't find superblock. 09:12:41 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x1000000000000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 401.394021][T21982] befs: Unrecognized mount option "{Ù" or missing value [ 401.401317][T21982] befs: (loop2): cannot parse mount options 09:12:41 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x400000, 0x161) mount(&(0x7f0000000180)=@sg0='/dev/sg0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000240)='[.{%/\x00') mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) setxattr$incfs_size(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='user.incfs.size\x00', &(0x7f0000000140)=0xef8d, 0x8, 0x2) umount2(0x0, 0x0) 09:12:41 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xff0f000000000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:41 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x2000000000000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:41 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xff0f0000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:41 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x60, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 401.638958][T22006] loop1: detected capacity change from 0 to 264192 [ 401.659040][T22003] loop5: detected capacity change from 0 to 264192 [ 401.712036][T22011] 9pnet_virtio: no channels available for device /dev/sg0 09:12:42 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x6, 0x0, 0x0, 0x80, 0x0, 0x227b, 0x5203, 0x7, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000000), 0xa}, 0x100, 0x0, 0x5, 0x2, 0xffff, 0x4, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 401.752792][T22006] omfs: Invalid superblock (0) [ 401.768090][T22012] befs: Unrecognized mount option "{Ù" or missing value 09:12:42 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xffffff7f00000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 401.806229][T22016] 9pnet_virtio: no channels available for device /dev/sg0 [ 401.843156][T22012] befs: (loop2): cannot parse mount options 09:12:42 executing program 4: r0 = semget(0x0, 0x0, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x1, 0x401, 0x1800}, {0x0, 0x1, 0x1800}, {0x1, 0x0, 0x1000}, {0x3, 0x2}], 0x4, &(0x7f0000000080)={0x77359400}) semtimedop(r0, &(0x7f0000000040)=[{}], 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) semtimedop(r0, &(0x7f00000000c0)=[{0x1, 0x1}, {0x2, 0x1, 0x3000}, {0x3, 0x0, 0x800}, {0x3, 0xd0c, 0x2000}, {0x2, 0x5, 0x800}], 0x5, &(0x7f0000000240)={r1, r2+10000000}) semctl$IPC_RMID(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) r3 = semget$private(0x0, 0x1, 0x690) semop(r3, &(0x7f0000000280), 0x0) 09:12:42 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfffdffff, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:42 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file1\x00', 0xa4902, 0x182) open(&(0x7f0000000280)='./file2\x00', 0x2180, 0x8) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000040)='squashfs\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x1, &(0x7f0000000240)=[{&(0x7f0000000140)="f6cb1900cd8d36036c426491fd003063b0b4f29fbc141a4362400e857c83f96cd6ab2982d468f377affe57cf389050d8c9c66c279b1d15ea9144074a4422b28a65beaf23c2f7c9b69a913849032baf2aad79bab9bbad494a5a8936c6e0352784939af0542e74577ff74f709d3a03589bd76cda0b65c5ca2c96baf460e332def22b6e1d45756aba2a7e131b99a1bb3e6b7c8a36e96c554e6c1c659cc8384f05b3d10f7896ee3a446b8d54dd14b66a188572dba5d93e990d21681c239863585aa61dc2018770ee043f5c998fba35285e78a2d626807276cccd0b96e07afa7a334d0d50553cddeffa02cb3802c18115", 0xee, 0x1000}], 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="736d61636b6673666c6f6f723d6f636673325f646c6d6673002c00c0c5dd946f9640e4d62a8ad009946c1d6a2b576a746e387b78c3ca10ab5e8aa13cca96ef1d3d902909839be99ae60fbdc3ec40e576a6a3f141f7015e71aff887ba23"]) lsetxattr$trusted_overlay_opaque(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) umount2(0x0, 0x0) [ 401.962943][T22023] loop5: detected capacity change from 0 to 264192 09:12:42 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x68, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:42 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00e61300800000d9e4c95f00"/25]) [ 402.032958][T22030] loop1: detected capacity change from 0 to 264192 [ 402.052558][T22038] befs: Unrecognized mount option "{Ù" or missing value 09:12:42 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xffffffff00000000, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:42 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x2010000000000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 402.108000][T22030] omfs: Invalid superblock (0) [ 402.137833][T22038] befs: (loop2): cannot parse mount options [ 402.147279][T22045] loop3: detected capacity change from 0 to 16 [ 402.181591][T22045] squashfs: Unknown parameter 'smackfsfloor' 09:12:42 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x6c, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 402.240394][T22054] loop5: detected capacity change from 0 to 264192 09:12:42 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20402, 0xa0) umount2(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x111820, 0x80) creat(&(0x7f0000000140)='./file1\x00', 0x3c) 09:12:42 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfffffdf9, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:42 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) creat(&(0x7f0000000000)='\x00', 0x20) 09:12:42 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xfffffffffffffffe, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 402.390191][T22061] befs: Unrecognized mount option "{Ù" or missing value [ 402.402246][T22062] loop5: detected capacity change from 0 to 264192 [ 402.425593][T22074] loop1: detected capacity change from 0 to 264192 [ 402.429964][T22061] befs: (loop2): cannot parse mount options [ 402.532479][T22074] omfs: Invalid superblock (0) 09:12:42 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x3389000000000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:42 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x74, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:42 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x80000, 0x0) umount2(0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x14b) socket(0x1d, 0x4, 0x6d) 09:12:42 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) creat(&(0x7f0000000000)='./file1\x00', 0x1b) [ 402.720888][T22094] befs: Unrecognized mount option "{Ù" or missing value [ 402.735389][T22093] loop5: detected capacity change from 0 to 264192 09:12:43 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfffffdfc, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 402.773289][T22094] befs: (loop2): cannot parse mount options 09:12:43 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x7a, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:43 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xffffffffffffffff, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:43 executing program 3: close(0xffffffffffffffff) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) [ 402.984324][T22111] loop1: detected capacity change from 0 to 264192 09:12:43 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x3f00000000000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:43 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0043ff61df0d76d1cc03db790d87e292eb4218b95785914378c9d3f7eaf6d084545916da36c905fb46b4b6343b56499023504fa2c19b367a"]) mkdir(&(0x7f0000000000)='./file1\x00', 0x179) [ 403.035353][T22111] omfs: Invalid superblock (0) 09:12:43 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0xfe, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:43 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfffffdfd, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:43 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x402}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:43 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x6}, [{0x2, 0x4, r4}], {0x4, 0x1}, [], {}, {0x20, 0x4}}, 0x2c, 0x0) ioprio_get$uid(0x0, r4) fchown(r2, r4, 0x0) quotactl(0xfffffffffffffdef, &(0x7f00000022c0)='./file0\x00', r4, &(0x7f0000002300)="5b248037642af396e1519bc3d6887c0fd8d129718e305c840426484ceee3b5ddb9d7a8e9d46091d2b9e3d9243f0edb440379b6f0569aeaab9c2d1af42e1fed2efc1ceb3286371a7fb7ec3b3ce86746d060be2f87f5fbb48bdd6e18c051ae7d54df2d89587828cf8f186d58e4ed159d8e81838a0b208450f686aae9325a080e7bd3d209f7b139ef3d33b2c57b7ce8") getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYRES32=0x0, @ANYRES64=r5, @ANYRES32=0x0, @ANYRESOCT, @ANYRES32=0x0, @ANYBLOB="040000004a00000000000000030000000000000005000000000000000b00000014000000636c8805000000656673dc4e62a737d2", @ANYBLOB="050000000200000000000000050000000000000000000000080000000100000001000000400000000000000004000000000000000000000000000000ff000000000000000800000000000000d8000000b5ffffff050000", @ANYRES32=0xee01], 0x350) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x90, &(0x7f0000002180)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x217}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x4}}, {@blksize={'blksize'}}, {@allow_other='allow_other'}], [{@subj_user={'subj_user', 0x3d, 'ocfs2_dlmfs\x00'}}]}}) 09:12:43 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x3a, &(0x7f0000000280)={0x0, 0x7, 0x4}) sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfb, 0x6, 0xbf, 0xff, 0x0, 0x1000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x3ff, 0x1}, 0x84, 0x1000, 0x404, 0x2, 0x4, 0x6, 0x1}, r0, 0x5, 0xffffffffffffffff, 0x2) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 403.250450][T22131] loop5: detected capacity change from 0 to 264192 [ 403.307793][T22141] fuse: Bad value for 'fd' [ 403.318506][T22144] fuse: Bad value for 'fd' [ 403.340934][T22135] loop1: detected capacity change from 0 to 264192 [ 403.352734][T22133] befs: Unrecognized mount option "{Ù" or missing value 09:12:43 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x2) [ 403.391366][T22145] loop0: detected capacity change from 0 to 4 [ 403.397788][T22133] befs: (loop2): cannot parse mount options [ 403.408563][T22149] loop5: detected capacity change from 0 to 264192 [ 403.424419][T22135] omfs: Invalid superblock (0) 09:12:43 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x403}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:43 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x4150489000000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:43 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x300, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:43 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfffffdff, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:43 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r0, 0x1) openat(r0, &(0x7f0000000040)='./file0\x00', 0x800, 0x10) umount2(0x0, 0x0) [ 403.601544][T22164] loop0: detected capacity change from 0 to 4 09:12:43 executing program 4: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getchain={0x34, 0x66, 0x200, 0x70bd25, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x1, 0x10}, {0x8, 0xfff2}, {0x8, 0x5}}, [{0x8, 0xb, 0x1}, {0x8, 0xb, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:43 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x404}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 403.665205][T22171] loop5: detected capacity change from 0 to 264192 [ 403.793077][T22185] loop0: detected capacity change from 0 to 4 [ 403.802695][T22177] loop2: detected capacity change from 0 to 1 09:12:44 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pvfs2\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x1, 0x101000) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x400000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) open(&(0x7f0000000280)='./file0\x00', 0x8040, 0x1e6) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x5, 0x0, 0x0, 0x40, 0x2040, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xff, 0x97ce}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x8fdb}, 0x0, 0xb, r1, 0x1) mount(&(0x7f00000002c0)=@md0='/dev/md0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='ecryptfs\x00', 0x220812, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r2, 0x1) r3 = openat$incfs(r0, &(0x7f00000001c0)='.log\x00', 0x8080, 0x1) r4 = openat$cgroup_ro(r3, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r4, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x42002, 0x7, 0x0, 0x0, 0x10001, 0x4, 0x2}, 0xffffffffffffffff, 0xb, r4, 0x1) write$P9_RREADDIR(r4, &(0x7f0000000200)=ANY=[@ANYBLOB="2a000000290100090000004002000092080005001400000000001e07bc2c2f66696c653057a4d072cb32034d60586f022d260e4d625fb912fc814c232b59f38b87e023985f119a339e1eb0beae126c0c35eb70505816b726c7681080"], 0x2a) umount2(0x0, 0x0) 09:12:44 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x405}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 403.863083][T22176] loop1: detected capacity change from 0 to 264192 [ 403.899566][T22177] befs: Unrecognized mount option "{Ù" or missing value [ 403.906685][T22176] omfs: Invalid superblock (0) 09:12:44 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x3a, &(0x7f0000000280)={0x0, 0x7, 0x4}) sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r1, 0x1) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0xbb, 0x5, 0x2, 0x5a, 0x0, 0x0, 0x1202, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000100), 0xc}, 0x4400, 0x8, 0x0, 0x1, 0x2, 0x8, 0x7}, r0, 0x5, r1, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x7, 0x4f, 0x3f, 0x4, 0x0, 0x5, 0x8001, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000000, 0x2, @perf_config_ext={0x918b, 0x5}, 0x10, 0x4a0e0cdf, 0x8, 0x5, 0x1, 0x3, 0x9567}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:44 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xffffff7f, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:44 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x4800000000000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 404.034078][T22177] befs: (loop2): cannot parse mount options [ 404.042874][T22197] ERROR: device name not specified. 09:12:44 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x500, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 404.090125][T22198] loop0: detected capacity change from 0 to 4 [ 404.124536][T22197] ERROR: device name not specified. [ 404.133054][T22204] loop1: detected capacity change from 0 to 264192 09:12:44 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x2000, &(0x7f0000000300)=ANY=[@ANYBLOB="68a7733c09c5f1139ba7723d2c7569643e0000004374e3b0b9a8000000000000", @ANYRESDEC=0x0, @ANYBLOB="2c7375626a5f747970653d6f6379da1fac8e240225aee02c6673636f6e746578743d73797374656d5f752c736d61636b66737472616e736d7574653d6f636673325f646c6d6673002c657569643e", @ANYRESDEC=0x0, @ANYBLOB=',smackfsroot=,smackfshat=,obj_role=ocfs2_dlmfs\x00,\x00']) umount2(0x0, 0x0) 09:12:44 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x407}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 404.211333][T22210] loop5: detected capacity change from 0 to 264192 [ 404.218472][T22214] loop2: detected capacity change from 0 to 2 [ 404.231342][T22214] befs: Unrecognized mount option "{Ù" or missing value [ 404.240462][T22214] befs: (loop2): cannot parse mount options [ 404.246934][T22204] omfs: Invalid superblock (0) 09:12:44 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x600, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:44 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xffffff8c, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:44 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x6, 0x1, 0x0, 0x0, 0x40, 0x40, 0xa, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0x2}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r0, 0x1) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, 0xffffffffffffffff, 0x1) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_GET(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x2c, r2, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0x2c}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0x438, r2, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x13c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x52, 0x5, "7eb4b4efc41b1bb46f7bf2ef9cb64629c6af878b65e4f901a8bc009b97f69cad09b73780ec90854d36f1dfbb48dca5037569ba2fae5afdadcebb9c8609ba0f2bcc6346590fdc0db81e6f744f6761"}, @ETHTOOL_A_BITSET_MASK={0x9d, 0x5, "a81faeab317a8df3e8947d7c8b56f7676cdb359719f3d17a7e5af880f0c7165d5f73bee454b53ea55b4a40afab2b6ae32c7ad0b18be356a4c060106612030ea7f2c0b70723420429c4e455778dbebfcc762b8edf07e3bde1eefe8e6eb0771d200b6ab5b3639f8ac7012e906079a95ba4d70303447d2993a29402c15ba13f10d9872c11281118e60bcd51c458b9ce518e3df4ed644d071ef0d5"}, @ETHTOOL_A_BITSET_MASK={0x42, 0x5, "c8a1128d4264d956391edf280497fb6f32fd298b83a65f14e1fbdc92206732a5533b6e9d94143b56f1a990e8d328bf36131a110e1d4a7e6e0eb1f03fc9c6"}]}, @ETHTOOL_A_WOL_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_WOL_MODES={0x2dc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xf7, 0x4, "af60439c880fcc66903d2f443027e1263dce616585fceff4cf8ce646c39ec292f15a7629198fbdefe374a6a829484d4983ef4e1901fdac88d85b707acc420d87b958f0cc35f1edf24db66729383fc1ff2f34bb9691771db5743cab0cc8eddb8b538fb1527ff48cb12c1c6a85ac2c6c4b699d3d91b338977c19000519940e2b59b3ab4660891a10808fc9a0fa05a7f8819f94bf6ef6e0269393c667254a8948d9d173e37b2dea2cdd24bf28bb257ea212185106177692a76ff02f302a3512170100ae6584f86a099327cd184874e907f4a44b5511ac78f741eaf8e04ab8b497adc79df56679d13fa5bc1d6d82af920a9db10ee5"}, @ETHTOOL_A_BITSET_MASK={0x83, 0x5, "56ad6d71ff4ecb08dc72a8163ff750a7b9427d0bebfeb77164143261a42b81d50c2f1fe0e76e0aecec55eccb69f6f19d8c8c81deb93a6f9ca992f715a9150a25d55462f005ed50beeca97ec85cfa5a5693f8f684865139541c9f49db12fea610bd2ab69199003d78366c553fb125c9e7eeca9ff45d6b5816a98718be5b2923"}, @ETHTOOL_A_BITSET_BITS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}]}]}, @ETHTOOL_A_BITSET_BITS={0x14c, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, 'system.posix_acl_access\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'blksize'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'pcr'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x81}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'group_id'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10000}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'user_id'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fff}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'blksize'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xd}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'fowner'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'euid<'}]}]}]}]}, 0x438}, 0x1, 0x0, 0x0, 0x8041}, 0x80) r4 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x6}, [{0x2, 0x4, r6}], {0x4, 0x1}, [], {}, {0x20, 0x4}}, 0x2c, 0x0) ioprio_get$uid(0x0, r6) fchown(r4, r6, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x82, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '+&+({\xf6&{'}}, {@euid_lt={'euid<', 0xee01}}, {@subj_user={'subj_user', 0x3d, '][[#'}}, {@pcr={'pcr', 0x3d, 0x7}}, {@hash='hash'}, {@fowner_eq={'fowner', 0x3d, r6}}, {@permit_directio='permit_directio'}]}}) 09:12:44 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) chdir(&(0x7f0000000000)='./file1\x00') [ 404.358783][T22226] loop5: detected capacity change from 0 to 264192 [ 404.372933][T22228] loop0: detected capacity change from 0 to 4 09:12:44 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00878b6dc55999006d89c8e4b4421154f4067aa1fecaed2cf183bb5a095b159522482c67d2e2b300e792e77d904791d82807edc315d607847e06898d24fd0e885cec08358403e956f632eea221d50b6cc5aaa3d229a974b7ba"]) 09:12:44 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x408}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:44 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x4c00000000000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 404.544151][T22240] fuse: Bad value for 'fd' [ 404.586660][T22243] loop1: detected capacity change from 0 to 264192 09:12:44 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)=ANY=[@ANYBLOB="18"]) [ 404.636510][T22242] loop2: detected capacity change from 0 to 3 09:12:44 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r0, 0x1) ioctl$sock_proto_private(r0, 0x89ec, &(0x7f0000000240)="9baa9c219af5093a0157e38b8906eb2f577c21e3f97d2963dbb82f59d1d58b37a3dcffcf29246cbb8cda9f901da459b61f5164082e3046d76de06d216abac47b5b34946ce6f4e75b91e1d739f700b724ae1378199f78dd2ae44eae657741832d0f5396eb618ebc74ebc2c2eea5c358f9c381c77a239abd") ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)=')+}--&-]\x00') syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) r1 = getpid() perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xca, 0x4, 0xed, 0x6b, 0x0, 0xa4, 0xc5622, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x43af, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x2, 0x76, 0x7, 0x0, 0x3, 0x8, 0x6}, r1, 0x2, r0, 0x3) [ 404.705148][T22254] loop0: detected capacity change from 0 to 4 [ 404.718838][T22243] omfs: Invalid superblock (0) 09:12:45 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x6800000000000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 404.756641][T22242] befs: Unrecognized mount option "{Ù" or missing value [ 404.765186][T22242] befs: (loop2): cannot parse mount options 09:12:45 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfffffff5, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:45 executing program 3: mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x2) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x9b) umount2(0x0, 0xb) creat(&(0x7f0000000080)='./file0\x00', 0x110) 09:12:45 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x700, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:45 executing program 4: ioctl$SIOCX25SDTEFACILITIES(0xffffffffffffffff, 0x89eb, &(0x7f00000000c0)={0x380, 0x40, 0x401, 0x9, 0x2, 0x21, 0x22, "390cdba9bae5049b7203840953f02a86a1032c9a", "f52d868b037439336ad37e8e1388d360a0d0a4cf"}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0xd}, 0x8000}, r0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) 09:12:45 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x409}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 404.901923][T22268] loop5: detected capacity change from 0 to 264192 [ 404.967970][T22271] loop1: detected capacity change from 0 to 264192 [ 405.029270][T22271] omfs: Invalid superblock (0) [ 405.049277][T22283] loop5: detected capacity change from 0 to 264192 [ 405.056379][T22284] loop0: detected capacity change from 0 to 4 [ 405.065887][T22285] loop2: detected capacity change from 0 to 3 [ 405.174226][T22285] befs: Unrecognized mount option "{Ù" or missing value 09:12:45 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x6c00000000000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:45 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfffffff6, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:45 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x40a}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:45 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"]) r1 = fsmount(0xffffffffffffffff, 0x0, 0x78) perf_event_open(&(0x7f0000000600)={0x5, 0x70, 0x0, 0x3, 0x7, 0x4, 0x0, 0x7, 0x205, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xf90d, 0x2, @perf_config_ext={0xce, 0x7ff}, 0xa0, 0x80000001, 0x3, 0x0, 0x16, 0x2, 0x5}, 0x0, 0x7, r0, 0x8) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x4, 0x350, 0xffffffff, 0x1c0, 0x1c0, 0x128, 0xffffffff, 0xffffffff, 0x2b8, 0x2b8, 0x2b8, 0xffffffff, 0x4, &(0x7f0000000000), {[{{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x100]}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x4}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@mcast2, [0x0, 0xff000000, 0xff000000, 0xff000000], 0x4e21, 0x4e23, 0x4e21, 0x4e24, 0x0, 0x5, 0x0, 0x2, 0x227}}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x2, 0x5], 0x1f}}, @common=@ah={{0x30, 'ah\x00'}, {[0x7, 0x9]}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x5}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b0) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="300000001735f50029bd7000fbdbdf2500000000000000000800010002000000080001000100000008000100010000000d76ff108398de78913be826cb7d03f0f34ba666146ffc103aa9a7a4c8c514c802092f80321fb0"], 0x30}, 0x1, 0x0, 0x0, 0x81}, 0x44080) perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x9, 0x9, 0xff, 0x2, 0x0, 0x7fffffff, 0x4050, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f00000007c0), 0x8}, 0x4010, 0xb55, 0xdd7, 0x4, 0x9, 0x1, 0xf9f}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x2) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x623040, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000b40)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b00)={&(0x7f0000000940)=@delqdisc={0x19c, 0x25, 0x800, 0x70bd27, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0xa, 0x1}, {0xfff3, 0xffe0}, {0xffff, 0x7}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x6ff5}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x8}, @qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{0x80000000, 0x3, 0x9b37, 0x1534, 0x9}, 0x401, 0x1, 0x3, 0x7, 0x10000, 0x1f, 0x20, 0x19, 0x8, 0x2, {0x0, 0xc7, 0xffff0194, 0x5, 0x3, 0x9}}}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x1}, @TCA_STAB={0x10c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0xc0, 0x9, 0x4, 0x80, 0x1, 0x2, 0x8, 0x3}}, {0xa, 0x2, [0x9, 0x7, 0x1f]}}, {{0x1c, 0x1, {0x7, 0xa3, 0xfff, 0x6, 0x2, 0xfffffffc, 0x8, 0x7}}, {0x12, 0x2, [0x4, 0x8001, 0xef22, 0xf565, 0x3, 0x7, 0x7ff]}}, {{0x1c, 0x1, {0x7, 0x2, 0x3, 0x1, 0x0, 0x8, 0x52f3e74d, 0x8}}, {0x14, 0x2, [0x1, 0x6, 0x3f, 0x3, 0x84a, 0x7f, 0x8, 0x80]}}, {{0x1c, 0x1, {0x3f, 0x0, 0xfffa, 0x3, 0x1, 0x2, 0x20, 0x3}}, {0xa, 0x2, [0xffff, 0x401, 0x8000]}}, {{0x1c, 0x1, {0x8, 0x6, 0xfff, 0x0, 0x0, 0x2, 0x4, 0x4}}, {0xc, 0x2, [0x40, 0x0, 0x80, 0x8]}}, {{0x1c, 0x1, {0x4, 0x70, 0x7, 0x20, 0x2, 0x2, 0x0, 0x7}}, {0x12, 0x2, [0x1b11, 0x3, 0x3, 0x101, 0x1, 0x99, 0x7]}}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x40090}, 0x44000) [ 405.245017][T22285] befs: (loop2): cannot parse mount options 09:12:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r0, 0x1) ioctl$FIOCLEX(r0, 0x5451) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00', 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x90, r1, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'wg1\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x3c}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_to_bridge\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast1}]}, 0x90}, 0x1, 0x0, 0x0, 0x1}, 0x4) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) 09:12:45 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x1020, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 405.372401][T22304] loop1: detected capacity change from 0 to 264192 [ 405.411614][T22307] loop5: detected capacity change from 0 to 264192 [ 405.421680][T22317] loop2: detected capacity change from 0 to 8 [ 405.433516][T22317] befs: Unrecognized mount option "{Ù" or missing value [ 405.442910][T22317] befs: (loop2): cannot parse mount options 09:12:45 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = signalfd(r0, &(0x7f0000000040)={[0x7]}, 0x8) mknodat(r1, &(0x7f0000000080)='./file0\x00', 0x10, 0x1f) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) [ 405.472884][T22310] loop0: detected capacity change from 0 to 4 [ 405.522904][T22304] omfs: Invalid superblock (0) 09:12:45 executing program 4: setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000000)={0x7, 0x0, 0x2, 0x570, 0x8}, 0xc) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000000040)={[{'omfs\x00'}, {'-%)+\xa0'}]}) 09:12:45 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x1f00, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:45 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfffffffb, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:45 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x40b}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 405.655154][T22330] loop5: detected capacity change from 0 to 264192 09:12:45 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7400000000000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:46 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) fcntl$setlease(r0, 0x400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r0, 0x1) execveat(r0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000001c0)=[&(0x7f0000000080)='!\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', &(0x7f0000000180)='ocfs2_dlmfs\x00'], &(0x7f0000000280)=[&(0x7f0000000200)='ocfs2_dlmfs\x00', &(0x7f0000000240)='ocfs2_dlmfs\x00'], 0x800) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) 09:12:46 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0xfffffffffffffe6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) [ 405.782068][T22341] loop2: detected capacity change from 0 to 15 [ 405.846501][T22345] loop0: detected capacity change from 0 to 4 [ 405.882194][T22348] loop1: detected capacity change from 0 to 264192 [ 405.900817][T22352] loop5: detected capacity change from 0 to 264192 [ 405.950839][T22348] omfs: Invalid superblock (0) [ 405.953916][T22341] befs: Unrecognized mount option "{Ù" or missing value [ 405.962687][T22341] befs: (loop2): cannot parse mount options 09:12:46 executing program 4: perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:46 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfffffffe, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:46 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x6e) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) 09:12:46 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7a00000000000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:46 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x2000, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:46 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:46 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x410}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 406.260236][T22375] loop2: detected capacity change from 0 to 16 [ 406.307379][T22369] loop5: detected capacity change from 0 to 264192 [ 406.313561][T22375] befs: Unrecognized mount option "{Ù" or missing value [ 406.321297][T22375] befs: (loop2): cannot parse mount options [ 406.346850][T22384] loop0: detected capacity change from 0 to 4 09:12:46 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x38}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="e117120f2cb35d3017c2573c3d9361704c9c10adda1bbdb2a65cc8fbcb8f90a90b8591cb798d9fca97bc9b114326579b6b096e12f5328264806d8eead6179334c3b6a15fe4ae0100dec6bdc3faea73f960c161f9a6115ba6fd661cf04765ddb96ebf31f0db78ad6191e1eb232d89f7fc"]) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r1, 0x1) fcntl$setown(r1, 0x8, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r0, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x2, 0x5, 0x3f, 0x7, 0x0, 0x1ff, 0x20440, 0xb, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xffffff7f, 0x2, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x7, 0x7, 0x6, 0x100000001, 0x3f, 0x74d4}, 0xffffffffffffffff, 0x0, r0, 0x4) [ 406.348580][T22382] loop1: detected capacity change from 0 to 264192 09:12:46 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x2010, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:46 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x414}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 406.430627][T22391] loop5: detected capacity change from 0 to 264192 [ 406.456975][T22382] omfs: Invalid superblock (0) 09:12:46 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@can, 0x80, &(0x7f0000000080)=[{&(0x7f0000000240)="9685cc5a399208b0e73e366bd2e66cd68978c91673feaf1830a0d2f83a0824600aa447a8a52dd7aa8eed6e5a86bed6ca1ef6eecca56e672983dd2d6f27a7c06a898f696d15c361afe99c3f5f04cd383b86874df7697b5eac07e89c007820ed37e9ef666358fa8871fa582b714679ccea63276a286f7f6ee68e508a845bc91ab0159f9ab088a5a20914c9ca16c25402144da4f5156b64b1c0d905f2c6c53446d1413dcade124aa953c61049fa35cc0d968de68722412da82909b9304d6ed59c2555f07c76", 0xc4}], 0x1, &(0x7f0000000340)=[{0x70, 0x105, 0x7, "46d777c44fd7d78a8955e85135bf0eb4574a00ea92f09cd32ffb073a32f591b2f77e387c9f22f7f89bcb2850f30230ddadc183585950de59b749a159a6c3fabb77d0adc1e9a0bc8031c584d2ba68d68018794b6aef74534a90"}, {0x50, 0x100, 0x4, "0f985b85a2b79b181b9c8705fc4a9c4db34989ab5aaa0b7b223c8a140a514e1d63d71d373d5d88a09133b19ac8ce0f410f748b4b85c15a630be6833d954f"}, {0xd8, 0xa, 0x4, "7fa0be7bb577262361518d8ce007d306bf15c1d2d3f7ae6e4f22c7293f7925de3f150ca5ec5d6694110071378bc7dca0f03db5357989c221b774b220c8dd7926e967a341e48cd6dc49f392bd2550e28312ced36ab1fcf9b54c0bbe9c6a66d363531c6153770422164d152f99d0f892f4f0289a2127bba6c95301af47a172729cb7bdd8a0a3e2544bb03d6b41a35ab361b34539bd46ad8a847d53afbf501548bfa3cb46a072cce87ece607c90982c80d133eb4192d4a07a29180e4bdcb87491778eca6817"}], 0x198}, 0x80) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:46 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) 09:12:46 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x8100000000000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:46 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x141322e80, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 406.573499][T22403] loop0: detected capacity change from 0 to 4 [ 406.633685][T22411] loop5: detected capacity change from 0 to 264192 [ 406.677127][T22415] loop1: detected capacity change from 0 to 264192 [ 406.689796][T22417] loop2: detected capacity change from 0 to 16 09:12:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x43c}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 406.741564][T22426] loop5: detected capacity change from 0 to 264192 09:12:47 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x5}, 0x0, 0x800, 0x4, 0x8, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f0000000080)='./file1\x00', 0x1, 0x4, &(0x7f0000002340)=[{&(0x7f0000000240)="2381bd94edcd53efff65c50173d6a8916b52f34602948a205f6f74b7420449383da674e1ed93feed7f0a2b04e34f59e7112873dd6060a4bdad6e3bf07c349b737573c6c5c3cc0f5fc0b1b80bc978be801314500915dd134a766b11365cd203734474eeccf0c389cdbddd2f59f9bff8eb80caad9c84991e130766f84a2fd763956c40a2ef6bf3027350aeaa5c2036671a1d78fc553d6720953c9e4c84cad21d7d322fa7cf76315340416d6b6c0fb00b698b0feed985dd3035bbcf265f0433b0d67fe95d9a3dfcdbadbcd3bd976a846d714f2807363cf89b15efd48b548bdd4f72b412d74c05d7aaceb66b98d0881a075054ff05ebd6f1ce0052bcb575923e456e98d1ffe360cfb5c6836301bbe559d7acf65bbf1b1d8e5e87a0992d9410b5e51c1cb6d7b5a166a070a49d04c4c90da603de8a11ccbffa73edfb7e0df083840dd59c894e963fb2ee319db44141af91f66e476d223415e693389e39d7964ade85636c707be41b164e4bd63e47b2269a8839eccd3710846476a9969a57564260623acf0da089e6772cdc3958487b5dfeabcd46683a583b76b29fdeb7820eaf3c98bb92219a12a35397ba6535314175f26c3ea4eed5712277e09be2b4df0723cc89ab0d6e633a89c34871d815828713496c6d1c2c74e21891ab9bfed21c7c3b36ca0ee31b1086059d742bad1c545d87761ee146548c0064142386862bfc105f53831f4692b9b9ca18aa6d4803ff65cd106d4f727bc45b6567c78fc8a3fdd8676e084333fcd132e478155c92dbacbe7892f5a4a8d8a12f6f36d2d1b7337fe1bd8106206612c5e97f23c52aa62774fe82a993337ad5dea229c8ab3c28074a7db5846a19f00502100169d5939d643b4b6cf26ff0b660b77d79a537aeba4bf58ab670d2c5df61af25a38252f5b4c29e3ba59c47746243ea01ea8b35d94a7448c5b0f97221410c2efe244bd5725096c24b866dbcacd0e32bb0efb79e0d25776b8e137966b0b392bac635ac459d78120dd9c61cb80975ba0ae7d4a8d750d8d05fb25f76dfd8aebf1cdfd61a05fb49a92e3db3a250e786df714eed2632b1cafaa11f2fa4f45111ee230332b85464f4f2970bc16abc0e2e346b3e97fb4e653c6e6203987de6ec39cf16025741158363853a685dd5df586b3a330e2b7f8e05301d2f389cc804a9b67f24a7061a04883c500408fcc4d25a206cfd9bdb4e2317e65c9d063cc7172b0479b83f71df8f2e9f2ac230d68d306174af201f9e60f0762dcaf84b00520f8ca68d1558e31a15db4bbe0fbf985d73b150f02e6f1f176f4e73c1b322bfb371e4feb1d929b4d9bcd28d8bb6f856a667b98e634043e4b88374ac272d0c290bd1291c4bc846c63e02744c6d2992289bb2537eeba33e2bab55db38d0685039295687171644f05f008410a8214cbdb10a442540e917575688b9e3b3cbb7dd794c5ee30920f215a184e098e6fb3b16119be3983fe65f457a12533718d3f9bbd84a16c97c916ff501df6d267abff6754d04eb0219adb22e9303dc13568002769e27e3c3737cc138ab9fab3c22857bb7afbbaa4bfd438089bb29a08bb33961635b7fe418ecd926c8b485bb6b1be6c16a17aa1789a6c9d51ea6396e57d19d032a9edfd0645d46e20498b4bd8352d98971def5f6b76448bd858eb6ebcc0fcba0cc419e7edac315daae92e4411675e7bf35cb52e6ebb9dc5303f26015e5dad8096c7cc1c057bf917342acba4c21d8e8729aff99fb8889d4c941ebfeecbcc041f7df02fb6191b42e1046c07da00a9dd60b0eec819eb9cb01182f7b94d9cf85f1e6fdb6232b85326ee83ca22bfb0a7a75173d4b36f82ec634d1e1cc40920610528a4f8f774c972bf9ac95f1bfb0cc4926acc0d790548b848779439dd93045f7da7256ec2cdc9ac1358d884898fe26bc84bdb618ef0f69a3e5caae5fde517636c3a4aa5ca30cbb392046b242108e957d4b4522cd178e124c5818bdc402eaf8da7ee959e8fd965059bdcb2c60bcbdd2dd0c0560ff7e373b9f90550d8426baeda18212263ae39ead3789efc49f933f271d13d39c9113f99e46c1b1b6fcb5fc287212eefcfce37eea65721cc5e2828eb5109c08dff9ad223507e0b012a29d3079ebd13373ed0e25a2159f2cad5b01d9377bcf01903d76acb182e29d305e30cc14cb51f9cac15d659c6aa52bcc083867675b3ce93ca41dddbae972b1cdf426a0a832a88140491d5f157a8e7a981fcfb5de7339e4b2eb41caca82cf38d841479be89cb276e6ea2e186ba2c978d94322e9d8664497236131511d84d98de311027cb1f27462360277d2188a95fb6c333f76387271dab6463f3c4ba29966c1c59648a76877061e6de4e10ba4bb4d1a9d312865b7d1f4365dd400b0fd0beb5f2f3dd01352df82a487e342abb860c900ad3063dc731c39c1e1e42e9bf0b813abed401ff3617e772e1c752be6786c8a653bb721170e347d05a6146c25b33a90c3fe51da605213c7a7bfc9127f7ce9e549c65f20835375431268e3c58aead325bb6347cee9031b9c422ebb5070c75d903015a04641fc8b86c51da7491f79bda81e2c1e1e413f64a866fe64759c4c5cb55e8741477990a44381d945a5e9e943d066960b8c75206b19e6ae4cd37ff99215f956e25139bfa8c1626888e7e46dbaf9f46e1df26fca4c414d468db7848b6c15300e0c0df62709b1ae6cfaa5994c5c76c8adc545868afcc1692e92d668454f2f5881756292cd1537deaec16f66921effebf3cd76203f2a27e0633a6fc2e58b9434f82e638d980f959b93964de691830f28defea7999f17c79564ed9f68bc376b55bc7cd59c3ea6a04445aa88783e90294f6726b0fb96f88d65033c64c6e27f67f07fbb24b76d5874c726f705b110d1f76a70804dc205659b7df50790fd13da97c44fa36febfcd6b82e552859963279138de511c8b953ea8783a89b92af9195828ba1bbd42ede4844a21420997c7dfc6f57fbb8ba334ac417308fffe7bb8816f02c677043074521fb565d5bfe566196c3742a22f61d8ab87383c0ce2451899987022cd5844dabb489e56a2448a0f63d390a56afb53f9ea94afbcccc102028c7f4969762a4b9c06eafacabf95d59377e27709f1c5dff4543fc210cc72d11300bf7420edda6dc64d74d8811b557f39b736ea53774e05601fa46981266afd87b8cef42675537190b79ce0dd5a138410222f830eb04233e1445c40e2827b62d348caac680908c67cd8a2feb3a03ed62d1cddf972d4fcf7697effcfcaa69a3bd12d9d2a49ad35cc1df3e267c6124a381b5278684046e96d0697304d5a4800ed202bdde4f450729d7edd0f02d9715c046ea225881dd7b1b2742a6f0036b26a01665624635b71c3b0da98ed680135589d28eadd2547336594623e2632a12adcbc6b3f2c6d8147063f2a8117e902a0aed9d0f31b8b3214b17c4b1541b8749e0c194fdac9cc14b9e2846e4e12a234171b5fa63f82d8aa123d8c524da555df97f7856ec4d787d52f1561da706a665a9f4ab9acc29ff6660004c7029a5249415c839e35fb1a37db2446b085fb2a8b393b800fb34f2559d08addcc116cce3fca0ac097e90317a79a64e97f1534b2373cf988e494b33789d93f6b1cc92f46b9226a9c5d2ed6602d7c691dc67862d8b9093f74f34412101b1a3426cfcd9a7d48b6a018c5fb8207c4201da0bd5760ab84a7f2cf94c622c0c4676f503bfcf7a36f36afcdba2c65212d83d0133887fb66d17fb71d8b0e75dccb6b605df4173450bcb87a4529dac257221f7e221561ddc10b9526b43fe3fc77face9dd29b6dd2f94272bbdb97f3292bd596ff579f60df5f630a8e35c3e916c04977a05d1720afc12b923282d3d10542495fbe52b1de62031b2b8f7d5daedafc1a29f480ee0d61a896733ce453534532c2b3ce54df825b28b8fb95d69302199bbfa2c688409b1aaae757fa3d828c22988ecffac669d2fc5798ef5fd0540fcb7a11a96044ddc35506d2f3bfcaabe544375867a39d315a3df7c7d477e9c61465b0b394ba7e8dd61cdc59df742d0cac131636906da5b7876a7b4a92ca3428f81b151684724181f1a3b18e17236592dd90df38cd7025dd04aff6670f6575ead70a5e940270c78ca787cb317809e2fea8ab901678912c6be8099c26df02b2608c432aa77908eb28bca21b1b53a613d46bb1d17c5b313b51687cd5c2c3cec04a4a18b139ad48a1cbc9cfef9625648f9c2a0d7a1bbb4b5137b00e07c250eacfabbebe3a897cc542c4f004a4a436084bd89cdb487d612023bb6f254abb471216b5566ec074d7654a9ff4c4039d56f7af166dcbd5a079854ae68ebdbceefe7349d3c20f0b42a10d8718b778522720e6e54f18d7434f40bec21f5e2dbb51723e79777e853a9d687c7aafdbbc77492458161fc12e9d9be7eb6af48900a815956f73d04bd16ce6c17e39b714559a355553621d3c0fc2bf7b6de166c6b3dafe87a007fa56051aa878388ceefc4b5918c1abc2a4c13727cafd20473fff8030c460fcfd2700b8c6aa5a9f60fa06554252c6e7d8ade294075ab519c632995836c31e233ada073c7648dbab6d28591bdc1c728188ecaf6b363509c08139c720915f4d42ff9e11f6d8d58c193f786c00cac04ca6049a7e15e05a079edab492c11049dafa482fd504d6071b43cb918e5867bd6722ba09ee823457642f04ab7f44371e1b8ccb882d3e055d50d6ac7b864fd94f1181472ae904486af0f3cf558aba838db6ae34841a14f16d43c19cdf70f6c43e9e5691ccbca147fe5bbd4bfcfaf46572df0afb18396cde3052602c060f23f8000fc2f1f002d4503ce197e80cb37bee899525b771e8a6116c1fb04bb4bbcd86deae525bed3e8d6d825c1579d71ce4132d90ab71d70a81fabc857bae1d5ccbda10388df9a94a16ff6717f056e85471afe52cfb10c0c8f7aa9bcd06abb7d65ae65de673c6087ad67543b8f17871c84f82eb71e87c6ff6fdff48b5d14d28c18262195920319849b21d4166a8852772082799d2ff0690ed98bd5952e2c79756bddc63efeedeb3e1a68121484695340e542b2b8c376cf412afbbe1a015face7b5eea6c82ab28e5959759c098a20e5c899e123a39e13d05e9239dc52043c8bf6a3f6ec985f286c16f5282529d678cfbf4bbb20b40a51bf83b7d261f63964d30c10e91bc6a7e1168d40f1d47c59d46aac3cc02e67359a6b40f1e27013a68a09f7515a31f608a74d0492bf5521ae1cf99e2772f091d27d9ca62792ac5fed6b54593943d4785a6cb42f5a81dd297f060272e04e16f7fbc6e458aa6fdb0e541b77b4deeb6f5488f184cc08bb72609be6d627bb1497dfdee7e1c0d858eed7c35e064cd11685487449d4da71ec8fc78fd114ca8f256c31656574251005c67e0c7928b7cc46aee81abacf924f4e37273292560ff8d70fa871ac8d5e057ff5cccb57efe5fea609dbd15240c5f58d4c5a2214fb1ff1cae37af72494aec7e7cd5d9c82a7a5d446e5ee04e7bab2bc97d95640af85b707a7949b3ce225bd63569ada669090b546c79193dfabefa7a6fd48a4e6841cc85081cbd4926064e96e96c6e1e6218ccfaad1b1467ba849fb857891804f9ce3b5a089359cd950e9ee54a993923b7c14090a6a5cd5fbee4867bba6786733ac3b03a09070c4270bef4afd3d86042c3f67f5b1614e13261ac7129ead3ef48cd4e7ae73c785c2afff0f0f2e1f7c6d645632930029ff7d049dbbca96b07eaf2e61d0d58d04ef8fff91b97cfa1db5e68271a7e1883129f51100f91694077746837bff70d2ca987e9926c65f0cf80b0891ed10bbbd5db676e4d2333b", 0x1000, 0x6}, {&(0x7f0000001240)="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", 0x1000, 0x7fff}, {&(0x7f0000002240)="4ef45d3b3ddeaf63b7e14cd8d9fc8380b764ea5c36bd32b4e9857e2ea402c5b7fc4e9e709f255457c7ffabd74e4604a6c3eac8d41d87fbff0d01f8c7b2f40d593d63ba5764755241650869df905bf1b0d15803b64a6cbff0e90a8fb007c39f868da1df8d7239e9f3dd80cd6403fe4ce19c92fd165998d196ec13f9cdad63be83c13bd0ee07d88364aa282dcc4f2678fb2b944ddcaefbf37cd2bcee667d119d00b835d3359cd777274447002a3e5c21e2739741ea3ef6e0225fb6542a959f921c759dd8ef8dc3dac0c382d0c628ecf414026f24fb119ed95c8917bdd52613497dd1154cc67d62d1921f8ceb6f55e6ccc03259979873f6de0e", 0xf8, 0x7}, {&(0x7f00000000c0)="22304003967994c15c9a7e31bc9122952ab52caa0852c18918aad8defe47ff7da2b446ecd4cd98e97e4d3cf4a6bc1a1112662e26db13c9f6c33ca698eab92f9d45", 0x41, 0x1f}], 0x1, &(0x7f00000023c0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x30, 0x78, 0x65, 0x31, 0x38, 0x33, 0x25, 0x67, 0x6d]}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'omfs\x00'}}, {@permit_directio='permit_directio'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@subj_type={'subj_type', 0x3d, 'omfs\x00'}}, {@measure='measure'}]}) [ 406.788837][T22417] befs: Unrecognized mount option "{Ù" or missing value [ 406.813471][T22417] befs: (loop2): cannot parse mount options 09:12:47 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x8cffffff00000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:47 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) [ 406.839506][T22415] omfs: Invalid superblock (0) 09:12:47 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000240)="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", 0x1000, 0x1}], 0x0, &(0x7f0000003900)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6, 0x1, 0x35, 0x3, 0x0, 0x8, 0xc258, 0xb, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, @perf_config_ext={0x8, 0x80}, 0x0, 0x8, 0x80, 0x2, 0xfff, 0x6, 0xff7f}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x7, 0x501000) r1 = perf_event_open(&(0x7f0000001240)={0x5, 0x70, 0x6, 0xff, 0x1, 0x81, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x1, 0x5}, 0x480, 0x5, 0x4, 0x4, 0x3, 0x8ba0, 0x60a2}, 0xffffffffffffffff, 0x5, r0, 0x1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000012c0)={0x4, 0x70, 0x4, 0x1, 0x4, 0x4, 0x0, 0x0, 0x22000, 0xd, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x10000, 0x101}, 0x10020, 0x24, 0x7, 0x3, 0x0, 0x3}) signalfd4(r0, &(0x7f0000000100)={[0x100]}, 0x8, 0x0) 09:12:47 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xedc000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 406.934788][T22437] loop0: detected capacity change from 0 to 4 09:12:47 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x3f00, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:47 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x28202, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) [ 407.007295][T22444] loop5: detected capacity change from 0 to 264192 [ 407.024941][T22448] loop1: detected capacity change from 0 to 264192 09:12:47 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) recvmsg(r0, &(0x7f0000000ac0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/48, 0x30}, {&(0x7f0000000c00)=""/84, 0x54}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000040)=""/81, 0x51}], 0x4, &(0x7f0000000980)=""/22, 0x16}, 0x100) signalfd4(r0, &(0x7f0000000000)={[0xfffffffffffffff9]}, 0x8, 0x80800) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)=ANY=[@ANYBLOB]) 09:12:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x463}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 407.131242][T22448] omfs: Invalid superblock (0) 09:12:47 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x1000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 407.204558][T22461] loop5: detected capacity change from 0 to 264192 [ 407.211118][T22460] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 407.211425][T22460] team0: Cannot enslave team device to itself 09:12:47 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) recvmsg(r0, &(0x7f0000000ac0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/54, 0x36}, {&(0x7f0000000c00)=""/84, 0x54}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000003040)=""/77, 0x4d}], 0x4, &(0x7f0000000980)=""/22, 0x16}, 0x100) accept(r0, &(0x7f0000000040)=@ieee802154={0x24, @long}, &(0x7f0000000140)=0x80) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) [ 407.254524][T22469] loop0: detected capacity change from 0 to 4 [ 407.265651][T22467] loop2: detected capacity change from 0 to 31 [ 407.316778][T22467] befs: Unrecognized mount option "{Ù" or missing value [ 407.323987][T22473] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 407.332282][T22473] bridge0: port 3(team0) entered blocking state [ 407.338712][T22467] befs: (loop2): cannot parse mount options 09:12:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x2}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 407.367834][T22473] bridge0: port 3(team0) entered disabled state [ 407.375895][T22480] loop1: detected capacity change from 0 to 264192 09:12:47 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x4800, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:47 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x97ffffff00000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 407.480169][T22473] device team0 entered promiscuous mode [ 407.483649][T22480] omfs: Invalid superblock (0) [ 407.518891][T22489] loop2: detected capacity change from 0 to 36 09:12:47 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7ffffffffffff, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 407.527398][T22473] device team_slave_0 entered promiscuous mode [ 407.570213][T22473] device team_slave_1 entered promiscuous mode [ 407.584288][T22496] loop0: detected capacity change from 0 to 4 [ 407.585672][T22473] bridge0: port 3(team0) entered blocking state [ 407.596798][T22473] bridge0: port 3(team0) entered forwarding state [ 407.608421][T22489] befs: Unrecognized mount option "{Ù" or missing value [ 407.608521][T22498] loop5: detected capacity change from 0 to 264192 [ 407.621319][T22501] loop1: detected capacity change from 0 to 264192 [ 407.691993][T22489] befs: (loop2): cannot parse mount options [ 407.692093][T22486] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 407.712093][T22501] omfs: Invalid superblock (0) [ 407.734553][T22486] device team0 left promiscuous mode [ 407.740182][T22486] device team_slave_0 left promiscuous mode [ 407.753100][T22486] device team_slave_1 left promiscuous mode [ 407.762098][T22486] bridge0: port 3(team0) entered disabled state [ 407.773374][T22512] loop5: detected capacity change from 0 to 264192 09:12:48 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x3}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:48 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x4c00, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 407.807609][T22486] team0: Cannot enslave team device to itself [ 407.832022][T22490] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 09:12:48 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xe000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 407.860817][T22490] bridge0: port 3(team0) entered blocking state [ 407.868183][T22490] bridge0: port 3(team0) entered disabled state [ 407.876389][T22490] device team0 entered promiscuous mode [ 407.882079][T22490] device team_slave_0 entered promiscuous mode [ 407.889869][T22490] device team_slave_1 entered promiscuous mode [ 407.897179][T22490] bridge0: port 3(team0) entered blocking state [ 407.903492][T22490] bridge0: port 3(team0) entered forwarding state 09:12:48 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xf6ffffff00000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 407.919036][T22460] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 407.932276][T22523] loop0: detected capacity change from 0 to 4 [ 407.941670][T22460] device team0 left promiscuous mode [ 407.948734][T22460] device team_slave_0 left promiscuous mode [ 407.955462][T22460] device team_slave_1 left promiscuous mode [ 407.961625][T22460] bridge0: port 3(team0) entered disabled state [ 407.971803][T22460] team0: Cannot enslave team device to itself [ 407.978808][T22473] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 407.989143][T22526] loop2: detected capacity change from 0 to 38 [ 408.016751][T22473] bridge0: port 3(team0) entered blocking state [ 408.042481][T22530] loop5: detected capacity change from 0 to 264192 [ 408.070175][T22473] bridge0: port 3(team0) entered disabled state [ 408.078296][T22526] befs: Unrecognized mount option "{Ù" or missing value [ 408.079890][T22473] device team0 entered promiscuous mode [ 408.086466][T22536] loop1: detected capacity change from 0 to 264192 [ 408.099552][T22526] befs: (loop2): cannot parse mount options [ 408.100159][T22473] device team_slave_0 entered promiscuous mode [ 408.135116][T22540] loop5: detected capacity change from 0 to 264192 [ 408.168659][T22473] device team_slave_1 entered promiscuous mode [ 408.175961][T22536] omfs: Invalid superblock (0) 09:12:48 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x4}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 408.185386][T22473] bridge0: port 3(team0) entered blocking state [ 408.191794][T22473] bridge0: port 3(team0) entered forwarding state [ 408.199132][T22486] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 09:12:48 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x6000, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:48 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x110aa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x3a, &(0x7f0000000280)={0x0, 0x7, 0x4}) sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000100), 0x10) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x1, 0xfc, 0x1, 0xf0, 0x0, 0x54, 0x8405, 0xb, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80, 0x1, @perf_config_ext={0x80000001, 0x7}, 0x800, 0x3, 0x101, 0x7, 0x1, 0x9, 0x8}, r0, 0x8, r1, 0xc) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)=ANY=[@ANYBLOB='\b']) lremovexattr(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=@known='system.posix_acl_default\x00') [ 408.259579][T22486] device team0 left promiscuous mode [ 408.280680][T22486] device team_slave_0 left promiscuous mode [ 408.308650][T22548] loop0: detected capacity change from 0 to 4 [ 408.321719][T22486] device team_slave_1 left promiscuous mode [ 408.353143][T22486] bridge0: port 3(team0) entered disabled state [ 408.409091][T22552] loop2: detected capacity change from 0 to 48 [ 408.421980][T22486] team0: Cannot enslave team device to itself [ 408.450200][T22552] befs: Unrecognized mount option "{Ù" or missing value [ 408.457438][T22490] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 408.472689][T22552] befs: (loop2): cannot parse mount options [ 408.481557][T22490] bridge0: port 3(team0) entered blocking state [ 408.488308][T22490] bridge0: port 3(team0) entered disabled state [ 408.516596][T22490] device team0 entered promiscuous mode [ 408.536205][T22490] device team_slave_0 entered promiscuous mode [ 408.560556][T22490] device team_slave_1 entered promiscuous mode 09:12:48 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x10050, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x400, 0x10) umount2(0x0, 0x0) 09:12:48 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xf9fdffff00000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:48 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x40000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:48 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x70, 0xef, 0x81, 0x8, 0x0, 0x0, 0x0, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f0000000000), 0xe}, 0x8, 0x4, 0x7fff, 0x4, 0xfffffffffffffff8, 0x4f, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x0) mmap$perf(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x7, 0x20010, 0xffffffffffffffff, 0x800) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:48 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x6800, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:48 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x5}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 408.576247][T22490] bridge0: port 3(team0) entered blocking state [ 408.582646][T22490] bridge0: port 3(team0) entered forwarding state [ 408.664340][T22568] loop5: detected capacity change from 0 to 264192 [ 408.673715][T22566] loop1: detected capacity change from 0 to 264192 09:12:49 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x400000, 0x0) close(r0) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x8, 0x0, 0x0, 0x107021, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)=@gettaction={0x164, 0x32, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@action_gd=@TCA_ACT_TAB={0x6c, 0x1, [{0xc, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x10, 0xe, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}, {0xc, 0xc, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0xc, 0x4, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0xc, 0x1f, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffe00}}, {0x10, 0xa, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1000}}]}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x80000000}}]}, @action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1}}, @action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1b, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x0, 0xac1fd005872172c7}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1}}, @action_gd=@TCA_ACT_TAB={0x70, 0x1, [{0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x20}}, {0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xe1}}, {0xc, 0xd, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x2ec}}, {0xc, 0x1a, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x55}}, {0x10, 0xc, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40010}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x213cdddd35d77cd4) mkdir(&(0x7f0000000180)='./file0\x00', 0x100) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0xc0, &(0x7f0000000140)={[{@xino_on='xino=on'}, {@xino_on='xino=on'}], [{@smackfstransmute={'smackfstransmute', 0x3d, '@'}}]}) mount(&(0x7f00000001c0)=@sg0='/dev/sg0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='omfs\x00', 0x8000, &(0x7f0000000280)='overlay\x00') [ 408.711692][T22572] loop0: detected capacity change from 0 to 4 09:12:49 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3, 0x9, 0xca, 0x0, 0x0, 0x5, 0x0, 0xd, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp, 0x40000, 0x7ff, 0x4, 0x7, 0x6e2e, 0x9, 0x101}, 0xffffffffffffffff, 0x8, r1, 0x1) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x4, 0x80, 0x2, 0x4c, 0x0, 0x330, 0x610e0, 0x7, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000240), 0x4}, 0x100, 0xffffffffffff0001, 0x3, 0x1, 0x8, 0x5, 0x8001}, 0x0, 0x7, r0, 0xd) openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0048375906d3ccde187236c30321b7edff6cf6ed14e7620064af"]) 09:12:49 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfcfdffff00000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 408.824230][T22582] loop5: detected capacity change from 0 to 264192 [ 408.832188][T22575] loop2: detected capacity change from 0 to 52 [ 408.861292][T22566] omfs: Invalid superblock (0) 09:12:49 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x100000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 408.896348][T22575] befs: Unrecognized mount option "{Ù" or missing value 09:12:49 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x200000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:49 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x6}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 408.977558][T22575] befs: (loop2): cannot parse mount options [ 409.008385][T22592] loop5: detected capacity change from 0 to 264192 [ 409.019349][T22596] overlayfs: unrecognized mount option "smackfstransmute=@" or missing value 09:12:49 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfdfdffff00000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 409.093116][T22606] loop0: detected capacity change from 0 to 4 [ 409.145727][T22596] overlayfs: unrecognized mount option "smackfstransmute=@" or missing value 09:12:49 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x6c00, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:49 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x4) umount2(0x0, 0x0) 09:12:49 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xaa) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="cff8"]) [ 409.263694][T22613] loop1: detected capacity change from 0 to 264192 [ 409.378808][T22623] loop2: detected capacity change from 0 to 54 09:12:49 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x7}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:49 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfdffffff00000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:49 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x141322e80, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 409.438574][T22623] befs: Unrecognized mount option "{Ù" or missing value [ 409.470219][T22623] befs: (loop2): cannot parse mount options [ 409.485922][T22613] omfs: Invalid superblock (0) 09:12:49 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) 09:12:49 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x300000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:49 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x7400, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 409.593620][T22638] loop0: detected capacity change from 0 to 4 [ 409.596358][T22634] loop5: detected capacity change from 0 to 264192 [ 409.623362][T22637] loop3: detected capacity change from 0 to 264192 [ 409.707028][T22637] omfs: Invalid superblock (0) 09:12:50 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x8}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:50 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfffffffe, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 409.830878][T22653] loop1: detected capacity change from 0 to 264192 [ 409.866148][T22655] loop5: detected capacity change from 0 to 264192 09:12:50 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 409.899662][T22653] omfs: Invalid superblock (0) [ 409.924673][T22660] loop2: detected capacity change from 0 to 58 [ 409.992871][T22662] loop0: detected capacity change from 0 to 4 [ 409.998016][T22660] befs: Unrecognized mount option "{Ù" or missing value [ 410.006365][T22660] befs: (loop2): cannot parse mount options 09:12:50 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfeffffff00000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:50 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x400000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:50 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x7a00, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:50 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r1, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x7f, 0x1f, 0x8, 0x89, 0x0, 0x400, 0x40000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8, 0x19e8}, 0x4809, 0x7, 0x8, 0x2, 0x1000, 0x1, 0x2}, r0, 0x8, r1, 0x8) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 410.192960][T22676] loop5: detected capacity change from 0 to 264192 09:12:50 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0xa}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:50 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfffffffb, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 410.240751][T22680] loop2: detected capacity change from 0 to 61 [ 410.253646][T22680] befs: Unrecognized mount option "{Ù" or missing value [ 410.260936][T22680] befs: (loop2): cannot parse mount options [ 410.269095][T22683] loop1: detected capacity change from 0 to 264192 [ 410.296517][T22689] loop5: detected capacity change from 0 to 264192 [ 410.320459][T22683] omfs: Invalid superblock (0) 09:12:50 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0xedc0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:50 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfeffffffffffffff, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:50 executing program 4: ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000100)={0x9, 0x8}) r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$getown(r0, 0x9) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000002300)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) sendmsg$NL80211_CMD_SET_PMK(r2, &(0x7f0000002440)={&(0x7f0000002340)={0x10, 0x0, 0x0, 0x80400}, 0xc, &(0x7f0000002400)={&(0x7f0000002380)={0x7c, 0x0, 0x8, 0x70bd2d, 0x25dfdbff, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PMK={0x14, 0xfe, "04a0f7470b5f3dc4f20a6c4d5b4c30cf"}, @NL80211_ATTR_PMK={0x14, 0xfe, "ee71ca8583903ac35f0b21cd8e1b8f65"}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_PMK={0x14, 0xfe, "f4455487a890eb32b5f425ff0e74c036"}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x7c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000004) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6b, 0x6, 0x6, 0xff, 0x0, 0x7, 0x40001, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000000), 0x5}, 0x520, 0x30f, 0x0, 0x7, 0x9, 0x10000, 0x20}, r1, 0x10, 0xffffffffffffffff, 0x8) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) read$FUSE(0xffffffffffffffff, &(0x7f00000002c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x20, 0x8, 0x80, 0x3f, 0x0, 0x1, 0x4a80, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000000c0), 0x4}, 0x1080, 0x2, 0x91, 0x4, 0x2, 0x800, 0x7}, r4, 0xf, r3, 0x1) 09:12:50 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x500000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 410.448778][T22702] loop0: detected capacity change from 0 to 4 [ 410.463616][T22703] loop3: detected capacity change from 0 to 264192 [ 410.537450][T22703] omfs: Invalid superblock (0) [ 410.550096][T22708] loop2: detected capacity change from 0 to 118 09:12:50 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x10}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:50 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x400000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 410.599022][T22712] loop5: detected capacity change from 0 to 264192 [ 410.621703][T22708] befs: Unrecognized mount option "{Ù" or missing value [ 410.629800][T22708] befs: (loop2): cannot parse mount options [ 410.671252][T22722] loop0: detected capacity change from 0 to 4 09:12:51 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7f, 0x242000) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x3c40, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, r0, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)=ANY=[@ANYBLOB="01"]) [ 410.728630][T22725] loop1: detected capacity change from 0 to 264192 [ 410.745576][T22729] loop5: detected capacity change from 0 to 264192 09:12:51 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0xfeff, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:51 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000080)={0x320, 0x2, 0x4, 0x0, 0x5, {r0, r1/1000+60000}, {0x4, 0x2, 0x3f, 0x5, 0x0, 0x3, "68f3402a"}, 0x6, 0x0, @fd, 0x2, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x200000c, 0x13, r2, 0xa3432000) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) chdir(&(0x7f0000000000)='./file1\x00') 09:12:51 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xff00000000000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 410.916086][T22741] loop3: detected capacity change from 0 to 264192 09:12:51 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x48}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 410.956789][T22741] omfs: Invalid superblock (0) [ 411.011400][T22725] omfs: Invalid superblock (0) [ 411.013662][T22745] loop2: detected capacity change from 0 to 127 [ 411.029056][T22745] befs: Unrecognized mount option "{Ù" or missing value [ 411.034757][T22748] loop5: detected capacity change from 0 to 264192 [ 411.036861][T22745] befs: (loop2): cannot parse mount options 09:12:51 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x6, 0x1, 0x0, 0x0, 0x40, 0x40, 0xa, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0x2}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r0, 0x1) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, 0xffffffffffffffff, 0x1) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_GET(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x2c, r2, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0x2c}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0x438, r2, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x13c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x52, 0x5, "7eb4b4efc41b1bb46f7bf2ef9cb64629c6af878b65e4f901a8bc009b97f69cad09b73780ec90854d36f1dfbb48dca5037569ba2fae5afdadcebb9c8609ba0f2bcc6346590fdc0db81e6f744f6761"}, @ETHTOOL_A_BITSET_MASK={0x9d, 0x5, "a81faeab317a8df3e8947d7c8b56f7676cdb359719f3d17a7e5af880f0c7165d5f73bee454b53ea55b4a40afab2b6ae32c7ad0b18be356a4c060106612030ea7f2c0b70723420429c4e455778dbebfcc762b8edf07e3bde1eefe8e6eb0771d200b6ab5b3639f8ac7012e906079a95ba4d70303447d2993a29402c15ba13f10d9872c11281118e60bcd51c458b9ce518e3df4ed644d071ef0d5"}, @ETHTOOL_A_BITSET_MASK={0x42, 0x5, "c8a1128d4264d956391edf280497fb6f32fd298b83a65f14e1fbdc92206732a5533b6e9d94143b56f1a990e8d328bf36131a110e1d4a7e6e0eb1f03fc9c6"}]}, @ETHTOOL_A_WOL_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_WOL_MODES={0x2dc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xf7, 0x4, "af60439c880fcc66903d2f443027e1263dce616585fceff4cf8ce646c39ec292f15a7629198fbdefe374a6a829484d4983ef4e1901fdac88d85b707acc420d87b958f0cc35f1edf24db66729383fc1ff2f34bb9691771db5743cab0cc8eddb8b538fb1527ff48cb12c1c6a85ac2c6c4b699d3d91b338977c19000519940e2b59b3ab4660891a10808fc9a0fa05a7f8819f94bf6ef6e0269393c667254a8948d9d173e37b2dea2cdd24bf28bb257ea212185106177692a76ff02f302a3512170100ae6584f86a099327cd184874e907f4a44b5511ac78f741eaf8e04ab8b497adc79df56679d13fa5bc1d6d82af920a9db10ee5"}, @ETHTOOL_A_BITSET_MASK={0x83, 0x5, "56ad6d71ff4ecb08dc72a8163ff750a7b9427d0bebfeb77164143261a42b81d50c2f1fe0e76e0aecec55eccb69f6f19d8c8c81deb93a6f9ca992f715a9150a25d55462f005ed50beeca97ec85cfa5a5693f8f684865139541c9f49db12fea610bd2ab69199003d78366c553fb125c9e7eeca9ff45d6b5816a98718be5b2923"}, @ETHTOOL_A_BITSET_BITS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}]}]}, @ETHTOOL_A_BITSET_BITS={0x14c, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, 'system.posix_acl_access\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'blksize'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'pcr'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x81}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'group_id'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10000}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'user_id'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fff}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'blksize'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xd}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'fowner'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'euid<'}]}]}]}]}, 0x438}, 0x1, 0x0, 0x0, 0x8041}, 0x80) r4 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x6}, [{0x2, 0x4, r6}], {0x4, 0x1}, [], {}, {0x20, 0x4}}, 0x2c, 0x0) ioprio_get$uid(0x0, r6) fchown(r4, r6, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x82, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '+&+({\xf6&{'}}, {@euid_lt={'euid<', 0xee01}}, {@subj_user={'subj_user', 0x3d, '][[#'}}, {@pcr={'pcr', 0x3d, 0x7}}, {@hash='hash'}, {@fowner_eq={'fowner', 0x3d, r6}}, {@permit_directio='permit_directio'}]}}) [ 411.116611][T22758] loop0: detected capacity change from 0 to 4 09:12:51 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0xff00, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:51 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x600000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:51 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r4, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r4, 0x1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000080)={0x4, 0x70, 0xfc, 0x6, 0x9, 0x1, 0x0, 0x2, 0x8000, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000040), 0x4}, 0x40000, 0x6, 0x3, 0x2, 0x7f, 0x8, 0x20}) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0xd8, 0x5002004a, 0x0, 0x0, 0x0, 0x1e8, 0x3c8, 0x3c8, 0x1e8, 0x3c8, 0x3, 0x0, {[{{@ip={@private, @empty, 0x0, 0x0, 'vlan0\x00', 'gretap0\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x1, 0x0, 0x0, 0x0, 'syz1\x00', 'syz0\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x60], 0x0, 0xc8, 0x110, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'vxcan1\x00', {0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x6}}}]}, @unspec=@CT0={0x48, 'CT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)=ANY=[@ANYBLOB='y']) [ 411.244398][T22765] loop1: detected capacity change from 0 to 264192 [ 411.286074][T22748] loop5: detected capacity change from 0 to 264192 [ 411.325191][T22770] fuse: Bad value for 'fd' 09:12:51 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x4c}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 411.366291][T22775] loop2: detected capacity change from 0 to 127 [ 411.378492][T22775] befs: Unrecognized mount option "{Ù" or missing value [ 411.385965][T22775] befs: (loop2): cannot parse mount options 09:12:51 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xffffff7f00000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:51 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x6c, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:51 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0xfffe, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 411.555679][T22765] omfs: Invalid superblock (0) [ 411.599039][T22787] loop0: detected capacity change from 0 to 4 09:12:51 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x700000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 411.681091][T22791] loop5: detected capacity change from 0 to 264192 [ 411.705433][T22796] befs: Unrecognized mount option "{Ù" or missing value [ 411.713050][T22796] befs: (loop3): cannot parse mount options 09:12:52 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x600000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 411.755986][T22804] loop5: detected capacity change from 0 to 264192 09:12:52 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x68}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:52 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="10e3e7a748c435c3d544b2a879f636900daa4a6642849ec9040c7df878243f4de6248b2e46b356c7d29c6b16dc8520a6effb38c135eca6557ef68665a04ef9"]) [ 411.801352][T22806] loop1: detected capacity change from 0 to 264192 [ 411.885922][T22810] loop2: detected capacity change from 0 to 127 09:12:52 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xffffffff00000000, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 411.943016][T22806] omfs: Invalid superblock (0) [ 411.990113][T22817] loop0: detected capacity change from 0 to 4 09:12:52 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x3a, &(0x7f0000000280)={0x0, 0x7, 0x4}) sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = fork() ptrace$setsig(0x4203, r2, 0x101, &(0x7f0000000300)={0x31, 0x7fffffff, 0x7}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r1, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x81, 0x4, 0x1a, 0x9, 0x0, 0xe9c9, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x8000, 0xfd}, 0x8, 0x0, 0x7fff, 0x8, 0xc87, 0x3, 0x7}, r0, 0x3, r1, 0x3) 09:12:52 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x800000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 412.090427][T22821] loop3: detected capacity change from 0 to 264192 [ 412.130485][T22821] omfs: Invalid superblock (0) [ 412.139014][T22825] loop5: detected capacity change from 0 to 264192 [ 412.164798][T22810] befs: Unrecognized mount option "{Ù" or missing value 09:12:52 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r4, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r4, 0x1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000080)={0x4, 0x70, 0xfc, 0x6, 0x9, 0x1, 0x0, 0x2, 0x8000, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000040), 0x4}, 0x40000, 0x6, 0x3, 0x2, 0x7f, 0x8, 0x20}) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0xd8, 0x5002004a, 0x0, 0x0, 0x0, 0x1e8, 0x3c8, 0x3c8, 0x1e8, 0x3c8, 0x3, 0x0, {[{{@ip={@private, @empty, 0x0, 0x0, 'vlan0\x00', 'gretap0\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x1, 0x0, 0x0, 0x0, 'syz1\x00', 'syz0\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x60], 0x0, 0xc8, 0x110, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'vxcan1\x00', {0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x6}}}]}, @unspec=@CT0={0x48, 'CT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)=ANY=[@ANYBLOB='y']) [ 412.216038][T22832] loop5: detected capacity change from 0 to 264192 [ 412.228069][T22810] befs: (loop2): cannot parse mount options 09:12:52 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x6c}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 412.298214][T22839] loop1: detected capacity change from 0 to 264192 09:12:52 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfffffffffffffffe, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:52 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) execveat(r0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)=[&(0x7f0000000040)='#\\:&\x00'], &(0x7f0000000240)=[&(0x7f00000000c0)='\x00', &(0x7f0000000100)='omfs\x00'], 0x100) 09:12:52 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x20000, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 412.595585][T22853] loop0: detected capacity change from 0 to 4 [ 412.636959][T22839] omfs: Invalid superblock (0) 09:12:52 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x900000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 412.707303][T22861] loop2: detected capacity change from 0 to 256 [ 412.723348][T22858] loop5: detected capacity change from 0 to 264192 [ 412.780315][T22861] befs: Unrecognized mount option "{Ù" or missing value [ 412.800951][T22861] befs: (loop2): cannot parse mount options [ 412.957763][T22870] omfs: Invalid superblock (0) 09:12:53 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02b6a74651ec919df564d4df295b8a7e6859d523"]) ioctl$BTRFS_IOC_SCRUB_CANCEL(r0, 0x941c, 0x0) 09:12:53 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:53 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x5, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:53 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:53 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x74}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 413.085932][T22878] loop1: detected capacity change from 0 to 264192 [ 413.168650][T22888] befs: Unrecognized mount option "{Ù" or missing value [ 413.192496][T22888] befs: (loop3): cannot parse mount options [ 413.224018][T22891] loop2: detected capacity change from 0 to 32768 [ 413.277095][T22897] loop5: detected capacity change from 0 to 264192 [ 413.291866][T22899] loop0: detected capacity change from 0 to 4 09:12:53 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x6}, [{0x2, 0x4, r2}], {0x4, 0x1}, [], {}, {0x20, 0x4}}, 0x2c, 0x0) r3 = syz_mount_image$qnx6(&(0x7f0000000600)='qnx6\x00', &(0x7f0000000640)='./file1\x00', 0x7, 0x1, &(0x7f0000001680)=[{&(0x7f0000000680)="4e524ebb88c5c4825ce98725e060c1071af6a122555ff715a1c4a2aa65e192e15ce0f3782cb2ebde9e7ec9402ccb60acce462d18f32c6a83464fddb09dc83e3246c19ff94ac01ce2ea88fa81e336e0903133c9e261b23f0c29b538949066a87e5070c381ee739e0265edd5734cb435808819628d9294b782c5b82d6771a72b69b0fc10b7f360d16c52474ef7110dbe2eeddb75d659c1ed9bdf17baa4ed95dec53b1e96adc38a15d871fa0672af70e9f5dd7f9487c46c1c796d770cd22e19c8e949694c79d692020cadaddfb75a75c3fc443e6a72389049f6c3af3e2b6a5193b2bee04876ab2acb1e28249e590af67b5d2c1904992f3f0bc07c95fe5fb381afb00388d676c7931689e386a3cb2a39888649e4abe0e283e3c1ff3a53d64fc37f4b2e42d9d51ec08352dbf94c4296cbb95455bfcb36648809a67b763f045932c098b443bad13467cc76a7f5eeaa420403cc8e911ee7b1479e3603f53fc7df9c02e87c5619dc9e97438afff9b59ead7bd50373a375fc780607a909e1b4aadfc151d063216d4b976b64d2571c85b664126c9435f2b682c424819c60ebc27616a042d94a118033c8b4ffbd854eba8144096c5744fe08b98117def604e9082aa52ae26664fced5b3be1e07ae71e81bcdfe2d67bef380edca0b725f146e7a2e22d13db37681ad592ab7cd80c4e1831ae47aaee21e58bcd58d2ca8d527cb59fbf68c9f232a84d6f4717665ba9223678499816feca85d93e3c8d74e72cfdb05765dc7d548af9f0bbe5b6acea53ab73c706839c87c37c6616680c7f7bb28df3773e756718f8c3708cf753fe98f494403f9b9e920d1eb1f4632301d9e4563ea3ee85222250521fdd4da6ad76c9fa1f8a1a1f28a0a41cdf1e796e3b95ade54fa2a41b7f405d32e4671ca2af64e5a528d321e0753f6d1f179139607702eeaa2234cc237ea345b255d4eb0042e1066c255b6ca6adf630740d13f4e2e508c02872bde24be8ed88bdc8087ff72d201944e3d95c54dedaab6b7fc68980eff263a6331486f2640a4b8778fff0023c7123783895dfb3efeb42c813def02f539818b82408bd1f432670293f7c3990e3e7a3ff4d83284f2f51bed0b13cd433b333dfc8212f09a66360ff4833d15215ce908195dadc68b2daa07a98c86363f37600a2ae02e99f3158174e45a4c5ddc292d89ea4d72b4c8235f0c44511c70abc375ebe148992a0f31d4e4310a6886b2ab71762c7dce26e19bfaba89936cabe302a9037c935736169e3a8ebd25fb8f3982fbfe889de9be43ae63995b2f2af9d802ab90a611c67d87b1236d82163d1626ec84478969f10df0f27816fd44473bc9d47e0170a6164224c43afdfadcb26ef927a2893c022285c90c6bdf0fc603d05f8fd34ca232597833c1630ab0f8ced1221ec53c5bac3b8caea05d09e80792e81b426be0e8463fb0cf65332c48cda9411b9e353559d06df890229b07eb4274835bba8c1dda7e855adcd7912b722cd9f980f1594aec6e7a3ece88939dcee8041adf2ccf481c87d7cbf95c5b5d8e2b29ef50e6f4f0df0c63498e7dc463834d1711daf8d202b1a5a77eab44b28236c92810e21229208e14b02dc38091b18c8e9e5c5f99f9f44607833474b961436a18af1b075dc14e3e33dfc7ae4066a6c683876210017aa71757c56d959a2fe3158237fa7f07ec2ad9fa15c02760e20548a16c6f46448ac9ab73a8e96023178d48fb1911a691311da36957b844bece7ccbecb44942b28270de262c643dcd023f0d5637cdfb55ce2daf2f74778f97c8350c2a0c64d8923dafde7ef8fdc488d4a83f355642ec3952d2a34dfd0a2b9ed83a6d29fce76f6c2a47cc85be92a72efb16d46bca73f62dbc105c18044aa8ca8257d37e9561f8701783ae1db6d9550f2d4c054ed7144ea64f06cba5d5d30ae81087eebc0a3cd49a7880732f98453dc0d4c7078b00a020097301f799e82c6190509f8d4a967b5c255025b2a1055a83f9909644c9a3cfb948920341f3ce0e622eb11acff05ede426757ec2e6cddd2ed2fb54b0102d1539b4d9b54e48a0c9d80f4a6644431f2d3bdf4f3dd73731414f20c55131fb1382f1ac7bab74769aa9a756adda110b5a70c144fa4bda0faaf6e467f3d8b92b77bedcc4ea10b0ec7e4701291565d6e28501fc0a6e6743f659cfc28b2f54a4b394033516ce9c719df7ce9f04cafd1fc767110276a3ad378b99021ce568cc3171f88f61f01f55649ef0b77af030e0adcd83c2a03c97a5e42b590481c0bd53340a24fc770bdbc732fd9aa5589a20915539826f256aa87374d0b5695383e146945880d25db09cfc250e1183867c8d8b0198c0e6c5aac275d708ce4c4f402bbd2cc6744176ca5604c843cdfc3d327975f8e58e482fc7880be8b29cfb76abd8c3f35f9dfafc5476826f891a65c40a19348981814bc5c6d404d0a9c08a7d23376dd3d7c42e4f5d72571e23390e79593bdd191be1d87b904bc00becaae1f43e6ae47b9cfc0ae59e59de2e180c24daebd25f40f2a299bff36e5b852c4358a1a32846bef9612df27bcd1c06e4525c46d0ab84dfbb7989677dc26853ab2b8ed0d07c9f8dd159817b15877ee4cc061d4d09cc348bfcb68dba89172d38c76433934b1420b511496377fc1f7197db72d2fefd430d16d5d172859be6d9ae228d77eee6e5a384aa9eb132bb98d2a753a05723400787183326f6c91f5518c481f83bf5762dfad1be40ff48a06bc837584c79d8f765a9f5161c94c8784291e5a3b0624c300639cae656d23293b7f5c5460fccaaf8b456afb4036a44a3dd7db4690e6d42d25789ac3a8b834b5df7f47d6e2b86a3832d30427c3e79f1a55fcd822f78e24e1363a029b457dc6c05b080df48cd9004e04f16e38089e1315a1d1cc4fbf53af7d63f826f6e08db4d98a9bda426f51b67eb0a6d8ade279d0c41b9a4543825a27c0b21dc80f23d6b35e32937deed54d2e47eaa8eaae7411bc67561628e8ec3eb8541e1866002bb9251a49ac71ab70e655da8b1ea033a12466de6646267f1ab345d2d52e8c0aad8068854375876a6f02c7bb9e3046becbca027d668cf5d4055bd3c8b0d38f911c288e6e875bab6b538732b2556dbc85580e03cdf4650f3905dce39964b99b3191294a0a43f758e804908fd6cc15c734d557b3dda072cc57bb0624f8b3f48af2f86601be09f028cc5ec95e9cf5d58216d20512e0ed2cffc4cbb7bc7cf415af6b7bdb54448a928104f2bb514c7895c85b7fd86a4f51099327b43443cdda34376817b8536a7dd8da6de61b945100bc904f1b9cda2229c796664b0733f9e59dd444e0d77fa7e99d8c78d469ffcb8e83bf761cab8fb81a4342488cf49104e62262aa7f227ba1f538f7a9ab39dd657a02278029b7a86c00020f45d0fb00985ef6fe4656704c23a026a47ba4df10409b231a43a3340844bbc8b04a234c1fdf75871d5c56d37b6af544c9c645ea3c609c09835b09e7d12fe16ae821be9ccbe40460bec12b8f7dd5b51de2c65625bcb7da3616f858c982f877ded971bf737eee210460712fe8837d5adae7f65d2d3a35613577cd6264f7f71f964838500e20b17ca2f17616c69f29ad6092749c594732c793670134b862d86d98fccc1b277e61b015342db892f1a5cead6df4247ee3cf03353f779ecbf29132591f6b54ca48b9c99b8039075052b99171ae892eb54f66dcf9c5983c8fe1c5a4c1b073f7094b35f5812f04f3e37beac01837cf119d429606546a7b4882481d73c188b70d4aa7416da109080dee8122f7da546ea79779b13f2794e0c0274467cdf56a26d5dcafc26e53323e1a66824ad839b795975183fa885025817e034ad1711e2db5f4fe3e4a88f209af042f021acc6306591814675702b4946ff5926dd41bdb8cfd799c0891d66640c478b15ec67dff394884873f0d2e77c32c3b3265ea0a40aefd5220f5fb08f0d693f5e0d38f42bb01abcf82c0761f392849742a84938ebca9a8518fe2abfc62d5082a7ec2a6dfc680f15caafe4a87875a09857c60a2188b0518fa497797b38e3837ed907a0c916b257e24a3673e9f5bb2524e1a313fd691466a30eb22438c7c55416380c46c5835d6b32f5855b3cbcddc9edd5e22dcf4534ffc03555b1cda3dbc7223abfcc5f64e2f7ed2a1aba80dfde014a4e810bafa9e409f65db916f5f037c85b84fdf2e054a7e4e80d5982e462dd95ee9aa1eac8e2a72449a28567a2ceafa94b3e9a5401a78c7d8efd263a84ca0823366bc9b022cdbb8e75418bcc65df10afae041b60e0ab05731dc89ec93c4f0a9f3f881061a8f3e496c849456a4943bd41a0fb6ad6b2ed416e4d78e9191f48c4bd07bc710b4ea3adcc0389b76d4e6ddfa53d8f1f039a17172ffde0e37cce2035b2dd1bd773a75a9484074db992f5ee7f879f208e9cb7d00816246347ee8dd3b5b9a9ce5979992e9a3858c5564e3e190d1d928dd33eea06915d2c3881de9d6e38d8a09c659320554f1e1daadca05d90feb9531cef3e18a5247647ae7245e5219b55b4e263d3f1f15b984391b6b75438e36e774f791b22ca9277f54a5427e59249ba9059a0573ffc5ce7557dc0b9dbf6522dd326584dec4c5e993d1dcce6cce97563326fc072901933fc5239723c15955b88021f7ef82ec713a507ecdd9ebfdf2d1db1224a9840374e72d0e7c5c5af6f72eb45a8acbde4436c3d0be188edf04b9cd422d4a982e795c8a0be305d91a840e3b5fff8de1dd27f083f4d4afe279898b4dffe636d61c152e6efc9bd6a01e2322c7d3ef2073e539bee1ccc7a3e8b797121423ac67e2f41c2bfdd3934c2f87e9a3cf418b6064ea44a48563185ccb841d09ea45f3ad60c29b4a116762b6240a5cabebb808cc7d28f886565e9cc8f8419d23197101a2711c7c8f7b41bdf28ed7ec8a41a2fbb832ce9a4483ee27a049fad0f5e07501b62778436313685a76e8ceeaae660f29da066da9c678edcdad9fd75b9c03f02b6532892204b1fcf92cf998aa7b0989df13b1fd7731120266cf3f21cf397a6d7842a2da213d10903c102d28ff6a789a1ae152bece71c37802a6aa9278d046186e792759f8b68b6e091482bbc9ff5e812bd28aa297412579ee46be25cb0641920c9a800ea8d0e7e80d8176407a94762e31ac44e0dc6c604b86886a651edd26c054f53b0313831b76512e587cf37b3c13ea59c301c82300d56224de240425744b189c255f152164ce0e8f31b252176db347f3e702341e49ef75aa73061db7d9bd657006e2d230c6cb3a25f84729859d0b79fb6dfe1cfdf1c1763cdb5c034824de888351d5a84dca10338c842b8ba2cf09424594c7e15945d6e07860cfb278386fd5830c1bc2aba8439b97b368d7472135cf2f56bceb79793cd41d8b4ba25fd647b01c52d10320b54b1dc23472bff620ef5519f4cf7348ac65458e8e865d9b138e34206542748ce71b440e346a07abad887df357ec1fe25a5d3ac77141432032758d32fb8c45c70649110208177b83967389ec1d7c7fe33156a5d77d64335c6f8852eb205855b3996ec7d2e3615c3d91814b20c37f49e753d98eeffd5d36c0bd595e72784c6e523ee3eb3b4f62323f8573c8fa794d5fa916496df108cb3da00743fa1e100c30a30ae5b615b8a638e58bc8ede96540a1c40d8e7f12ed8f693db949635cef7a1a1ac1850d95b4b4ffd289a04eed7da67a2da0d27d0f00913565f8c2a6a3082011f2b0a88d0472cd7bae20313c42bc049218fa350c93d9408bf0b832e8404bc34c56cb272f52f577d5e3f2c20fe2daed15971eeceb67cd1578907b32958c82383296a106ec3e5d7924c39a3d5", 0x1000, 0x12d}], 0x80000, &(0x7f00000016c0)={[{'pcr'}, {'^)'}, {'.*.\x97#,-'}], [{@fowner_gt={'fowner>', r2}}, {@uid_lt={'uid<', r2}}, {@fsmagic={'fsmagic', 0x3d, 0x3f}}, {@seclabel='seclabel'}, {@fowner_eq={'fowner', 0x3d, r2}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) utimensat(r3, &(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)={{0x77359400}}, 0x100) ioprio_get$uid(0x0, r2) fchown(r0, r2, 0x0) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000140)="e2e4884272034c1feca65056453833d77f6f96ac777fc28af604f008ef51afe9c9e10e00112a7a9967fac42a588037ae7ddd449335fed9e845b7b64f5681a9f8c49c45415c9acabcddad21ce78405b0ac003bae31630d64da63267897f1bff678e706bc956f49f1c6f7b1da3692568f7cbbd36fa9cd1a7cc874b21218a6062883d10b0fc2ea99e5288945b3ed58e024c3f90b94543e90e29d16fc8f81302adb88db0580464b87efd851299747364a261d2ebc5b45bbd1d1a30a8d91afe4c2bb8613878614420acdc4ca57533a11974f7a48618bf8fe55cd218f82c9e2a7aa4ae7e954e9f0b592b385628413aa55cd8eaf8693a2ac8d1ff5171", 0xf9, 0x6}, {&(0x7f0000000240)="1127e618d13f8d76f430bf67b8da5f68571020985569157866d557843a9a18faeea0a4d95a73cba82364b670881da1124716ba58596f024a786bda0b3d6b2159571b184378524e3c3a50e5c3c58c5e21f4", 0x51, 0x8}, {&(0x7f00000002c0)="fc19c36d19d0af46a04a5a9629d7acd9f30247a90218abac8c74a88fab21a499e1b6698f43d7fedc26c5a9", 0x2b}, {&(0x7f0000000300)="c5b3cfa764afb2832e3a41275e1ee1f5ab79752a53959c882e445f4892db29729c3512cccb91dc12830200c457e5d0ea194d2a223890c6f09d0093c336bc6e54c37213dbb3181b6f030ed1e48d023f3248355594841f032f5dc3ad6fae87477a009c5fe362e7fbc25ff6ce19960df3574e09dd5dbeffd1ee3dc049f6fbd070b6ef345affaa74f883750e31fe0cb1e2b5190c8481fbfdd958cadcf72c6476ea5790d062c43026bc9b91106312c2936b14be4d7dea57072316fcc5422e286a4e", 0xbf, 0x80000000}, {&(0x7f00000003c0)="daefeb38303949fe12fb6ea18541067c8d2973cc73efd14d7009a64da72eb637f6d115ec61a2dde30b36fab101748e9b75baba25bb0c93a6e0c10f7a867bba6a59df578fc5c4bd030e1b3478a0294bf7c58ad40be33ccb03c323bad1351499576b44753696390e90fb1b501233590248dcdaf69fe0c661ee8e8373931a044efdeb3ad13b8fbe078f764dd27663f128cb6b31b8703615979a711ec457e1c4b0bd75a1acbc987ff70f73149f0d9cf09853c6c4ae4c161b208dccc16d80bf90ea96a3997d67112c784ad1ed8186", 0xcc, 0x40}], 0x10010, &(0x7f0000000540)={[{}, {'-[/'}, {'ocfs2_dlmfs\x00'}, {'@])'}], [{@subj_role={'subj_role', 0x3d, 'ocfs2_dlmfs\x00'}}, {@uid_eq={'uid', 0x3d, r2}}, {@obj_role={'obj_role'}}, {@smackfshat={'smackfshat', 0x3d, 'ocfs2_dlmfs\x00'}}, {@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x14}}, {@obj_role={'obj_role', 0x3d, 'ocfs2_dlmfs\x00'}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) umount2(0x0, 0x0) [ 413.329220][T22891] befs: Unrecognized mount option "{Ù" or missing value [ 413.340531][T22891] befs: (loop2): cannot parse mount options 09:12:53 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) recvmsg(r1, &(0x7f0000000ac0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/54, 0x36}, {&(0x7f0000000c00)=""/84, 0x54}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000003040)=""/77, 0x4d}], 0x4, &(0x7f0000000980)=""/22, 0x16}, 0x100) ioctl$BTRFS_IOC_ADD_DEV(r1, 0x5000940a, &(0x7f0000000240)={{r0}, "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"}) 09:12:53 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x7a}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 413.407031][T22878] omfs: Invalid superblock (0) [ 413.422330][T22906] loop5: detected capacity change from 0 to 264192 09:12:53 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xa00000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:53 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x2000000, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:53 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x2, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:53 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xc00000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 413.638847][T22920] loop0: detected capacity change from 0 to 4 [ 413.660060][T22917] loop3: detected capacity change from 0 to 8 [ 413.684500][T22923] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 413.708111][T22923] device team0 left promiscuous mode 09:12:54 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0xfe}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 413.768731][T22923] device team_slave_0 left promiscuous mode [ 413.769200][T22931] loop1: detected capacity change from 0 to 264192 [ 413.835914][T22923] device team_slave_1 left promiscuous mode [ 413.849227][T22923] bridge0: port 3(team0) entered disabled state [ 413.859284][T22939] loop2: detected capacity change from 0 to 65536 [ 413.880309][T22923] team0: Cannot enslave team device to itself [ 413.889329][T22936] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 413.899511][T22936] bridge0: port 3(team0) entered blocking state [ 413.916362][T22936] bridge0: port 3(team0) entered disabled state [ 413.923751][T22936] device team0 entered promiscuous mode [ 413.930009][T22936] device team_slave_0 entered promiscuous mode [ 413.938042][T22936] device team_slave_1 entered promiscuous mode [ 413.952339][T22936] bridge0: port 3(team0) entered blocking state [ 413.958949][T22936] bridge0: port 3(team0) entered forwarding state 09:12:54 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x3, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:54 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x6}, [{0x2, 0x4, r4}], {0x4, 0x1}, [], {}, {0x20, 0x4}}, 0x2c, 0x0) ioprio_get$uid(0x0, r4) fchown(r1, r4, 0x0) stat(&(0x7f0000000700)='./file1\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file1\x00', 0x7, 0x8, &(0x7f0000000640)=[{&(0x7f0000000240)="cfd768edb26a179338f58699422d759837af6f11e68afe1e49d92e36bb1e222010c36afa4fb6ea6914edb62ceae93e93a1004ac9e50cce295db8f0a6fad873e47effe72792288cbb1cf9f131f380161bd66640bf3657ca80e69b6ba2297ac0d880a6def0df7d6d6f232a0160fbec7bdb43c68c772b9af0b6ed56ea06c42433d643cc87bc1a95b763b09516dae1df9b750775e740414a629c44a44a1df15c00ae743f2b6b10902187ee54e6531fb788a337aa22f041b401fa61b568490acacb9e34dba9746c134f0d9b123bdfc75ee8f1e4d1cb2d", 0xda}, {&(0x7f0000000080)="2bb9883d4e3488971417883f331a276f22185facc62ca63f53c713b5b99c646a03b50f545ad779a642bf7da093dfbfc36a90a5a3bfe9dadbf7e904d231d0f5343875957f00e4518871e39971146d46ded7d00381d18d78e0fdd203d165f28bc44d03ed731f13539a327d8638ef770d681e6d", 0x72, 0x5}, {&(0x7f0000000340)="67ff27421737a09297e203c396878aaccf1f226e7f345098a5d98eff1580923a353ea544435ccd681be80c7d16fcdc262d53f6087a92b9f5b8e8bcec6e64f8ac4d6d0cf0d78ed652c3f8cf6e98fe44d0b2d5d33082f8b057e82be210f7618de03308d1b1", 0x64, 0x3}, {&(0x7f00000003c0)="1798bb916250b75216345025ae5a0591e94d207e56c27f7184c378a57a798a42bbb9e780d97f266a42badf4ffc3da476e11bf9b26367edcc2aa85f0cfe650dbc91b921bff64c1761b83ab71f4e9344b75451082a8c59fb12caac648aaee123e50512c78a233eb7ff17", 0x69, 0x100000001}, {&(0x7f0000000100), 0x0, 0xbd8}, {&(0x7f0000000440)="0e67babb3b25ab17bb2ff589ef3dfff024642a90a2d1322ba5f1eed54057690e82c157a77592c0f62bfbcf7f9360389dd0e3c00d7a3b7305987036cd3e6b47ae6b0bb6c8f99ec37f7be2f01fa7b932f989b7525a7bae7d61c5c133fb7c53c16a39b3ce2bcd3bec568b8bd5d92829e9c9bfcad3d914a6d4d8bd7a277d56baccee9ad9d1a90462b6d5516c5ea077f5db49b105df2a0cadde2533bcfd416e3f6c1f57e9d38edbd5b6d5dd99eb79e3211ada53875a14004a31", 0xb7, 0x80}, {&(0x7f0000000500)="fc40583e", 0x4, 0x3}, {&(0x7f0000000540)="8875bb7e8eb22bb6eeb0f43cdb1101aa4e11c36da30129185fe3ec30fa7c979fa809aedce744510dc914cad7ddf4493a51d9ad60ce0645d5ab1bf7ac2c802b9c22767d83d2d927c7678167cbea6a8243aa438ca26af3d9747eea794bd96e656e8f6920162d781266fa665f6d9cee14ffa2b063566cd64678400d5f8cfc767c0aa7e2acb126863b0f37998716a37d4de5c2859945f6468ca5c5798e02189343486cebf3612a88a75591145c7934baf28afc1b3f608a5c56acd69daa2d5e848c9a49ebd6ef1c8640b360a919e2481087ab03e5ba51a9b1cdedeca723a9bb4c600ff34ae8d226150fd2907b4a39af812a06f869baaf", 0xf4, 0x9}], 0x2002050, &(0x7f00000007c0)={[{@data_journal='data=journal'}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x9}}], [{@fowner_lt={'fowner<', r4}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x38}}, {@euid_eq={'euid', 0x3d, r5}}, {@smackfshat={'smackfshat', 0x3d, '!'}}, {@seclabel='seclabel'}, {@subj_role={'subj_role', 0x3d, '{'}}, {@measure='measure'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@permit_directio='permit_directio'}]}) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)=ANY=[@ANYBLOB="10"]) perf_event_open(&(0x7f00000008c0)={0x0, 0x70, 0x2, 0x9, 0x1, 0x0, 0x0, 0x7, 0x10000, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x0, 0x1, 0xbf22, 0x4, 0x3, 0x1}, r3, 0xe, r0, 0x0) [ 414.050161][T22939] befs: Unrecognized mount option "{Ù" or missing value [ 414.061089][T22939] befs: (loop2): cannot parse mount options [ 414.089747][T22949] loop0: detected capacity change from 0 to 4 [ 414.097447][T22923] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 414.112468][T22923] device team0 left promiscuous mode [ 414.118493][T22931] omfs: Invalid superblock (0) [ 414.128454][T22923] device team_slave_0 left promiscuous mode [ 414.136460][T22923] device team_slave_1 left promiscuous mode [ 414.145487][T22923] bridge0: port 3(team0) entered disabled state [ 414.183219][T22923] team0: Cannot enslave team device to itself [ 414.189649][T22936] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 414.201082][T22936] bridge0: port 3(team0) entered blocking state [ 414.216416][T22936] bridge0: port 3(team0) entered disabled state [ 414.221272][T22955] loop5: detected capacity change from 0 to 1 09:12:54 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xd00000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 414.223553][T22936] device team0 entered promiscuous mode [ 414.242154][T22961] loop3: detected capacity change from 0 to 264192 [ 414.263192][T22936] device team_slave_0 entered promiscuous mode [ 414.270360][T22936] device team_slave_1 entered promiscuous mode [ 414.278068][T22936] bridge0: port 3(team0) entered blocking state [ 414.284398][T22936] bridge0: port 3(team0) entered forwarding state 09:12:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r0, 0x1) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3c40, 0x400, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1a}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r1, 0x1) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23, 0x5, @empty, 0x5}, 0x1c) 09:12:54 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x300}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:54 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x3000000, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 414.379998][T22969] loop5: detected capacity change from 0 to 1 09:12:54 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) recvmsg(r1, &(0x7f0000000ac0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/54, 0x36}, {&(0x7f0000000c00)=""/84, 0x54}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000003040)=""/77, 0x4d}], 0x4, &(0x7f0000000980)=""/22, 0x16}, 0x100) ioctl$BTRFS_IOC_ADD_DEV(r1, 0x5000940a, &(0x7f0000000240)={{r0}, "2086ad64f732fd3b1268b5415e4b5981bcd81de083494112b71b3c26d4a182f2f9d5d68e801b312739894158b26ff55897462b2917f70d6845dc2e579781aaeb933d124e67a4c05288b72bbc3b37927f22a29a6adb0f93c05e5e1a2570659a41c4222c34644646f5694e24f2b70128eada16f97a6b04a7245a3c1b699e98cdbc91a4082652ba95eda3fbad6f474e24bd6b055a456d5e89c25fa3375b331358a60294ab03bd28b4f72d0e09df6a50269598369a3f40d81b416e9db3c57b052f83087f226db9beda0a1aa6cfcc0cf9ddfe58409a54794227e2a53c6d59ed7468c24ea9df8e66a8435cddf60f9ff8d76246b010f54b27a20666bb9e6aa58a2caea789e55059b98c2eec1f5bfa0ae97ebf83439c49c35a357ccc3d367e60d6591b54652fa63f836356f94305813048bbf07923951e92520b0baeca7fe44aeff88e2a3b7dfcde46e2aee428a74ccd68efce926a4f065ef267a1e491ad7ddf46c2c9db6b905ae7d8b8fb716c87be1ba9acee604e3ba4e14e018cc80bce18286d37a7792d0f8f6fb7f96e30949ae4b89d6335db51aa430d627638b3e4703f2b5619afa85207cb1e80b963cfac6bd0f83a5f956b57f70f5e3609f25bee4ce5724d701c9d7ba8aac06422bc3b56e9624c36068b17b8a053e3414e131da7b7cf6dbfe85ff2cb5292c3b658209ef7b6ea0ebc1e207f354075ce4f379e47896f2e0c946d41621c3174ccbb589a787d6bc94068b97fd2704ca5145209111c171f4d7aeb115f47c0981dff38e2484383a9250bfbce7d7767bce0e9ab037e57a36ca3bcadec74173e0c32133335a2fd55c98535df569c238c7abdd9cf9f745ad7056b271137c6ee1818b3fe90f0a3b44d46efdc2ba04386b48971de311acab28da9ad92bd2c9fe83524ca24fd7f29c5524d27ca97628f3fc05939a767c462b30dc3f17b39474ec81864f9aab123c9c06b0f2c7b63e998d24bec72a72e137ac12dc691415dd5a0598e832b73a47cfe5ba9133f9c73765af7b3752216c40b471677715200e404c21cbcc0c7a59ed63cb618552617bbe4a5caf8269800223f1a7f422e121d2214c52214e14332f6042ecc56934f985cba03d998b770b5a4d799081631314446983c885293b95ed32d142cc2e7ec5974c910b8875aed964260c4ed80f10213806391cb20474b4691ee5f5c4eb20b9c9310332427335759b5399c5d9cbf6f10628dfd2609dcd47665fd8b93b6d10f54a5d1bb098b62db0e330dbce0eacca7c63646f4a8b65ac8f44188140eb80ed9f64daea5c27d53b71c30092ef445369816c3268dcabcbc377f8915a98a5b5991596a08d9b9181ec3ec1253085a6ee9ef733d2dc40363a6d44b5f2984e649ece23bed4c35ef9533657a7531450a2ac23cacd31bef880643e4da0f323cdbb15c2af0641adf14c700cd291cd78a202758807d306b8cf8d2c34518ba850ec7eb13274c7db7801c19233f793be95f1c193c059d0979587f824378d4d86112eff1787e674bd1b0f428a576fbade64abce39254ab41d3bcdc0b1a1ea3ef62ffbca36a00bf32a0e3c70c95159b7d3036e9cc7cbfa00ad5724f559cff12b14fb119c96500d7c9e2606e72aef12780771aa3b3034bfb6605187ba2a86113f07c50408910d7a295b3bd5c64964374f8c0dfb87a5cca87e2c1c5e3ceb066eb52d20683bdca6c776d5f4a19457995071ffe70818fc680a29130f7f1d1cc1c53dcb50755a15dc51a1380b3788cd48405652adb128ff77e9f678d356a145f5862f99ff69757518dd30f635aafe23fea4c9e71e6499ea2d76437b3e3f779c0aa7f4de698f63053d3e466c83dd8e4446b732c34473c8e7c5484211d110fa04497e4f63944093058d8791363710cf4a55a3ce01f788a614479626c0eee6cb5ef4a15d2e99d621109a9108fe79db402a31a41e309e141ebb68822d3f7c2f7a84fc70c9fabfc8d7c1b141c5b0daf0b07c651a4e94b58c84bfaaa4670056ab2012c0dc55494a3dd8a9f5dbfc577bea0d68f3fa473b569d0328c235806267edda3b0ddd563581c2d6b86f85e9816e6ec17260a1c24ee30a2432cdace046b8553f61af0fb05aa9127529f1b26744c3a8254adda50609995f2214824fc6108296ad355c9c58e7a38942069edcc4d0c4fb2becb7c886b28933ccdef6850fa9c2e166c1abf746248fc41a22ffc426c116cfb163cacbdd3554106df1fc610112bcba07eb890ca9cb11a912870b742d1570da64205bf0c153b436fcb6c05ac9403ec774fd97f696f1dfa29e68c34dd7d4b23b56c821967ec5d0ac4bb9287d97b1cdf707847bcd4c7f2d1cd55120305da5414dc1be8c903f5fec815c982b91d95b38c314e7f9b2905fc3b4940c962f61820fa92577827bbac9e51866fde4b9e938153c9baf5332e0673710d3b324b55f8e9ee8a73b84b5b059941e8a92a2603340a653c881639bb6bd608f9084304a3b065d9f802e8427073204d452a9e9a812c8dc8dc2bb6c1cbccb1da1f02f9ebb9af1e648e0017c9c1856d32b2f0ebf1d08d13f01e6325b6ce5a72ab50063a66d5b044b6748f0221de72d2c98b0823d28d7363033ec833908972dbaae364a53ada91c5a3587502bef5f578c3a988a7101ecf06c121069a67b8ab0cd29bc058401410eeb3ceb73a251edb556698ccbef06c9060439d761702664e85533a188e76eda1b8f4c4b5e3bbe8080f2e5f49a9972523ec63b421b3ccbf3c3a07f96ea2fbcd8106bf81d6a8bc7c487e869c8eb92ccf04068daf82a28efaa54a01629018efdb863136566dd5361738e8b45cc3c4551f4dbbe196da3ac5eb070226be04be468111e3166d03dabb2307c39e54f4b28a74a91a17db2410ae960516fdd8e5885e5ff8eb2d9e6c6a5a358036820cab2651f1e02efc073edeec2c1aa19b9d39e94a89e674ff07456d41dbbd8a14ee7de0086b403698ad8e7ffe278904fa1c2a234a46daade657eba384f12307cdcc2b88a19be2ba2f77ad3ec84c702d0de41376735e2b1fb97fed8222d3e03e48a08b29a93bb13e0520e977ae8766d89709c8c8005d7dfc5c5ada23d5d5bc8f8b3359df9e88186d59737c45ae589923a057d001ec687c3093a5b9e0bfe1fa80a9d366734e8fd06e7e0f5a56122b9943a76d29c296a91a28bcfa319b0a7b57af0fbcf417f16af766a1ae9e29aafe0909b50a6ec7c930736197fd7fa43dbbe9cf18f040bedcdc359e1565ec9e03c11f420ddf1d57a8a395a3ad6f544ccb5b35569c6cb73027f1e04cb4e894a09961a8f243be3ff77b49daceb96fc08a39f2c65b8a45c85fec7e944cb0881e7e29adb2c6841c328184b9d11a2e9a95d1f07147d74a25bac5a477d3a28a110dac6e51a2fe26d0c5174250ba4748308e77004dbaa3e0fdd0044700711c3e1ca5a3517d458c8f4edaf2ff598067b295220b55215a30649f2d9a5673c0803b258e6aad47b16772f0d894b9304dbcc6ce763b3ba3d15dcd29fee020bc6e3e52994021986bedcd1c6a2ca6875e7e843d36498074ee8100dc732b192e260a5ec5331234025800abe9274b6a059323ec2a56925912b30d3868ffb305eced1dd715b8b04b637af5f1c986923b8b5ee3f51fec0ea81b4c3fa6df9b984926adaa22522f12e24770a537b82d84a60cad2216a221becbb7d1495d4e07829517c805bc6593aa867540f4ed1a8e030ee1fd62aab9b363daa13071501a78cfbdf62dd4e9f653aa4467f58745af2fad19249d620141f77c68e2ef87250bd2f61708227eb74f860e7ba41aef564019e61a8d2d757124848ae67f0e08597b0d2fe35d3f8f181441152132de25544c8fc278e13021a7d727c8125bd14f7f349e79792f9cea7d34740d3e88abd1de41e0a0723f4bdb28be3f1c62f479aa356da793d5e2389d84a426adf808dbc6190aa43c2c76ac2367b9a057e70abee78cde4207eaf31d017c5fa69b40b1acd6ae903800a06e691eb07ccf98702d5efb9fc52ff9e1cb5ccc61047a4221d4b58fe713085e2ff340d5671d84ca1c5d9f1fb4f4ad4476100313c4c5404b68c9c1dbff67bdce4cc58b299cb9e437e8415e100ddd5a4ce0eb179b7810a652679bc1737f3038d077608bd082584aa0769f9c4c24b16660d40b05ea17ead59716c98ae1cae34aca7261e3f137260f10486d6b767a9b0979d399227a26fa4202b39431d58c76ad8eb39d2f5abdb3aa1205927ab66f79075467f0b5d2abb8e5d43764fecf764ff9b5bbcaeae332aec2eb0d8c424eb1db11e5e773b1681a4463e36de039063a844899922f62a05019c6310219620b2bb8383f929f372c5f8c470a042ebb26597cb7d7c01a40dac74bd6e2d6e48209a4d88f19205cdda7704abdf031db1b2c1809f1d680404ae009974efab70f56b56b5a3f228d56fe9f9b9a2fb8cd745d4b09dc3f18490a33f03d1a579a5e1bd7fa43fe1bc3bb39e2623f5569309b633750d9937096d83ece0cbb641e4f6eb3db67521bc881f6240aae22b16b2ce7e644d40452360c6c812e1b8d39a8a04fe712e730d165e0e13a669f56cbd1958588625990089f185bd1fccd34da5d1ca4e40582ef05456a85e1711850115eee7afb1abf659f2620780552b714a2354db627eb23da494611bede49a133b9bc3d90287b998fcbc22c7314e8228c9ece49627ce8938147b32cf7d2be7bb5922ee764e13fb757ba7ab021c2c1df0486555a65d57e3b5af8f631065d04bd0e3b58146a81b5604a857801596c380565af661fe5ab85519abf9dc7b8b9ddce842f44460292d66fc010966b99397a65583bf117c38c5ce9294be3290b670bb050e4b5984c0af2858a7cfebb31245893df0eeed95ef95fd615098c5161340b2f1135a73f232343c27b5b79f87537fa71cca67c87898606f9c8b297ad1d7095f2e1ce85106910c2124eeea0b1a66c6403593b03b9d7e4986f36ea558003736d74ddda2cc4b8665784b227d5bccb10b1f3719bb1d48e17473f71cbfffa2c7def6aa1e93a4b164009b6062513b872a1cf81c842c905abfb9ef634984595c6958f0e1dcea182dd9451750a2fd667c9262d7c2e60a5347ade97af315f0ee2a0d7956c98e95a8dbe64a5f48a54adb2fbf141376bd12766a0acd0673c5c6a5f740ad4524ac892d3001eb2bfd5e25930f61a5a2ee84a614760659d0227f850280bd166d9f2a046f6467eb2b666e122a4434b42d2fb26c68c7cce13965d19961f180fcbc8dd9cfe20b5792677e007df0d91ab1414c75f305e4f7ad9af1cba7d074e74d6950cfc5f4afce7d10fd607cae0b75060d30d3968e32c410b061069b25beb89cfa359c36c9e1d0e357202a7812dbed17f28d8fb2a9b7893ceaa9f7ba9cbe1d5bfd4a5dcc799bbd2eb4c91a8d86b7c5b997ca34a89893329273a886c05f5f3d941264d99d84f8d0d542ffed4b0a166c262c3e87aeb4666e316407b4f995b483a3f7e8d8c4f1f2f959efd4e588087e7f38ea90fcd3610b4aa87803dd1656b90459274f0280eb78e1c456033fe89dd745c2d60f11912f54fe8b23307890e5003b4960fc01732c5299f1df5bca2a971ebccb06a6048faabccc4ba0dae5d1229014809500e543a300e322f5e1bd51aef8b5015317744bce3cb3bcac0377ece98c76f7a98440ca632f026e999bfb3261640c9d92fd1fe1322d659d1fb5bb930d548c200b0b7c2d1b4ed1fc695830e24e480431caeb1479dca987ce44a7b8ff8e261c901915d803a4ebebb55490519731f03db478b7b22635120c2ccb3fe2855f5db114d7b4b285bf39af63b7528281eac6257dd9a625053af34267d8b1a5454"}) [ 414.461191][T22976] loop1: detected capacity change from 0 to 264192 [ 414.470224][T22979] loop2: detected capacity change from 0 to 98304 09:12:54 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x5, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:54 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x9, &(0x7f0000001740)=[{&(0x7f0000000040)="c1b7c8157b1213a6cc6620a9f579b10c3d567079ef49495e64bb5e47f56cd51fae0a6dd7678c76374e98d04ee27967b5147f902016820591e238427244a41cbd5296cb7c8c404119d6bdde8299bfc6b0650d53753b601afda483d3bada11845f38331582353f737f351acad0c0bbc23ce40fc2c3bc1761796274a53d234e26f4335029192f84e009a03c439097abbcae4d5dba131981ad29eb6ee410d15adf888b718db3c2af7a15225a843a3fc67395b37d92afdd4ba95e7471670b7aaf5b33ee7370c8029c5642c52675a1e84c1f11bf40d287a914b00f718742ff4e4b869998d373ba1344a80b6e666ffa591286ff4ee872bc58945dd0f6", 0xf9, 0xffffffff}, {&(0x7f0000000200)="9dabec15788bcced9f9b948347a3e50fe28d8abb7ff1c6f50dde17a067a23b8d777e7e2ab57accf3a991c3548880b95c5caa9bc07832e746a18d43a1a753e22e030ac46bcb24036a0ad54d79d740c2761e599e74ab0852d7df1b7787b6921b5925653fc9a459b7d0a461e0a1dd24c2af75090fb948c15d134951f582cdbdbc467db994d9b77efc35353be1d09bf354d4c212b24446ea2305329d73c5c3a2a7605a4ff49b566279478d91bcfa74816a521b76ccf1d29eadebddeff1c354fc935602128e5f2d70bb530d1a0eda5a003971d6e7b618de66a2e625401c29a9de787ea05c5f13daa2765fe9a489f382c61372359197eb91dc50e7d9c5b2fb3ee5069c4f1b2004b7846875667f1faa4b6859eca36914565e4aa3b070714d1ba5a74f708e5428c31038e4699145f37c02604c804dec6c20a083fa0e94a1fe1deeb1a13493234dbfb19e75ce884abdfcf954ed6e73a34c76ba03a7b133e8c1457298f78b8c9a6cb21a776e7381d5942893f3e98bd214af88280815151799ceb6c08c2e3086dc9586f096592e622bcb5d37e23d4d67933b996b99b63fa77ae0fe8eed8920504f52f45e1ca70188cc5d3a7629affbd595b00f99fbe54d0268a3405aacb47fd450b5407107b977bc9eaab4ff380c5619bf2aefd890e46090306834ce8e50628b066b96217ea3e676bdecd9d8f73c3391badd0d3dc6115b70bafe687b0e38a125f8401101b436d421198b2590f163984b2c67ca632cf6cf80e02e7bde39dccab5a6066b992370185158be6c2c65e822f83868d9d282bf2769df9179159b33c03a6130142b0fea6a08eeb4841c3c9913f0ecb8aa90a78cdc1777dc083673df8a195fb9c50286f1464dc76b08e958a7da181655eba3e06c7c519875fccbcf816009513e6403f4fbbfa6daee57367ae88bda219d0db9d7ddfbbba6cd72b0191140572bfe07be6e04c115f4f3b73e5164a879efc3fefdb1f4861c005413cc9183d460155f546850cb8aafe20980651c5c2a88e30afe01cf1b02c8b1207871bc7f890fae98e26ed5c5199c72010328236213743d4ab1804584d684e982b07b7f5897828556336fb60d9fed2db572e9e5605417f2ea13afaea014c313dde022244865abd98b953a1e7f03ea8eba897b17abb2b16bbee4d23b0a95596d82684ba5e3897f574b437c49e2a9cbf2d31340290e6951d14dc2f17bf6c430bbe9f26a22d9e92f11f16f2ff81cf25c372127708f6082f42eb6170fa53661b89be211b038c9362f41d96624874afec24414775c1850cf4c7571dfe8fe028f60a5f8dd09d7ae7caf27e14eac2fa6654679a2c6c69e8884e4a4a2b90a662038a9d63a665035dcf042e6a2de756c24755bb128e707b51c56e8109e875d7e66e2247e98c90c934de2071d6afb945bfd7d2e930e575bae09e61d4b47047b24146d937c708ff1b243b362c732a9ce28460da2e124f9da2a7a2d2c3395ef2f55030f07906e0f1f9e6534a5cd325c1a69265cb26ec7dc192f7a6124d5c964251e7f0f3353c38917cc7a36b81d01e0627622805345475a5f88d875435c64880a8ea55263ca5b4f2279ca346292e34e77275018debce17ae4cdbb241596db559c25c89dd38ab2ff614c5a1529fa9a4f3b80be88ba76080f77985bc16f981aace8e4aeb3de53be2a1390d88a307d8a9cefd2690b7d14291419a2eb9f6968d271f5380bbddc2282d93aa629a1e49d6aa440fcac6dff15de23bef810f50697d246bfe2e9750ed0adf4b7891626a72774a27c593d0cbd13d5ce43f51f2804a42b23d37156b924fb05bf716def61121c52067380e62a618734aee0565abda226c52f5ac2ae630df7f5f08a5dfeda438b88fd40fadfb2f11010d32c7bc9ed18afcb332b356bef0ed2e7389998b98a0fbdb73739ea371b813557ebac79dfef7403ce8226e64ca66ad6f5c2d9b71f5bfb9990d43f172d9280183d453582cde2264ca593fd173c132bbb9c049e2c3267fea12b15731b28b22c8d142e170cff0b81e8de6d8a451617f53cde54b55b21da19badb96f6ca8d7aa6b167ff5321f92a5c7d407b18e69799c767079337f28c1ab05bd7016a122b67f5fe49f2699a291dd09ab57a49765d6509e2278f5c882e3f36dffdf6ce09e0abba22480a0c0758629c18065da07ee89eb2b5f0dea6f272ce4fe5f2d85379d79c32c7c2cc5ef9f1d306b4d55d6c93b88f009ced85e4bd469ca344043b9b7e370a1536defda5a7b3e7ebe113e57ca6dd04308ada1d67795ed00b82aa608e28b39a831d2a43e7a27ed6d557c1335c4e57cb98f1c5499df02c42b7a6ac9daa6cf4ef888ecfcfec53e54c8e9088bf2943273422ee285ce39ab672af59a9c0fc2473ee82f297b533198e573dc8055033f22a5c06f0172bfa9143b82883c941e3adc6695d3d973edc8ed065377d43e6249b1df044010089781e555cbc40ccb7a368fe7555a8e1eb60f317a1b18bb0742732b0fef2a7feaa3fc3b052186ae9f0fa07fe18db11f29e27b7499dd7518ce6da7dbdbeff794d5c9ae59289e026b5f630098a66b3dbca09819292db362257e8105e37b4beb4a0fc72879bd571705815591901b8a5dfbfac7df4b24d34758bc31d84f446dbc32a9686bccd5a0e5f838f3eb9b39b1706591e1386a2637537a67ed2e5e1d79588dc9bb0d60490f3275d35b44278b952cda0a59ff8adcf687cd5075f59d001e67d7e592deb2e28d8178ec9ba09f6194533c155d8ac88cf227a8cd4f5681381c06a2b314deda39d15f5003e3b6b0eac925ddbc4a4d980b8bcf705ef283053303f53ff70f5fceaccfec85183fd522e9d098146360c45007ca862d3cacedf7c2930f1ac8018935a1542dca1238f50e5dc8c06d516b73fce323af6d77436101ff455ba65a8f949926258b3e782b068f7646f6778a17d940fef0720a2cddcc7a251cdba6e02fc0dac43360e23c1fb3cc62cb308a709979ca56b7026eba28cb77e0a9bcc6e1b34ac33e82c326c59ccfd30ae6924cd369ddf1e697315bd240e2758655107e5ff118555f149680ff9f7a982149e57553a95a2a90a45c885cac86cd2785540528563e69450146cb871859763e637c57b2400e0d21909ebfd0a6f970d27a31f5128cf377d9351cddb1bfca902969eebad12d4ccc479f5d6285c8c9336a79e57a779b4d01b375e6994af5c1c1fdcbe0e23ecc4db48795c87887bc62587518b32de2ad0c3b8b0d55122d0ee42cdff1cc8a6e09aa6eb97de482dd416b9adebcca331cfa8faf7f7b50338bb21fc797d31ecf84236caaecae09c990c1ecd583c6570f0f0bfd3f1cb2fd3d84536da3df8faafa6cff514af5dcee6824bf3ab3ab8d4b2b3e7cd48eebdd65917e6aa8bcf5a1c8e6a96d37e490b3ab91847d68abb2f27b680681c3069ff90280bed2d988d0b401b116691a3608b13a05020582e5e41c93f54c8c230771a7b9ddedee4ca25775815ecd0791533c9c69f2fd5f579dd3fa9615b02e0ce3be1798d7a3bc42232252dfc3e65ae719af3caf84bad01dd81971f7b865ee9d85db7a1530bdd9f054d89753ffd4672619f83b43470f4082c1d06593d6850d7f2032190ea504284bd3ecc854c87b7d75892da2a6226173801c38e6948faf4ce3e44008cde86683f25663f49a868d6a929b3b3efbaf260eb752cb9d1315cee3e2096ac92311f975f4c6b62beaca6fd35c04f992d039da724b2046de9a730be63502af13a7009119bd988c6bfa9c86a269c7a29b4aecd4df6ca802514823664df66e0a2be223bc8afcdee2b97a057fdfd2b1f702032f6e7b5d0ea5bc5af1d0e743ee6979a37614b5c1e5b11497049eb64679ce84166406b9562d5c044c630207cadfe5ffb33f8fcd3262846637798f9e2ff37aef636b189631c88832c12fc4fea0363e35bd9f2425783f21fef74b61b0092e3a280261dd449717da3cac8c4602c06b2b3f06da6f58b6c1254ccd5626831aa0c0d0c8df5bfda92e4e2ecd77457ee55ece4a7057d22c13a976279175acec092b839d7b53a13fc76cc0596f1221ca6c561121c836a4e7c0b51ebc7f41d20c98799f2341bade6bce69df6959cd777c0ed7024eb50d48ce9f2b121369088ca654ee8083a674420cb48c5546af17970651e932f2cec69ef4a7047b2110cc46d2e8e30c13e572e59960809549c879017d1eef64f44f9772cc2f2c9e50b6b7f1322239cb57d1d8255f697d72fc4fc58163353257241584ceaf665bdf14eae5c049fc5b83819137ace868e5650fde3e0b42a4bffc7d70224df22f127c89f3e798ef24b8f7784acf94a71b5c4bb5f443d784c78ad5e3f5e04029f6fe9d6b8b6983e765fd079521f429b6f69abbcb627d743366c8b859a87c9b9e20cb812df2b3c23c88848b6dcf2b37f0042d2b7de007543a61d49598de392da18490042449337947d464916468c77737b9912ab292f45f413cca82add845d31a4fbb323431c54aecf52c89b8712680d8dad811b6930845609a94e75e6c0d0844532870efdd2c7239a18d182ea1e4c5565762a19e36efa038dc53bc3f35eee8ea5016bc7004285c6d721882453e2a09cdfc760b28c3c2ae2644c15d725872f1d2e7e5e97d98c667eb2ae7cd9210fa643b4768ad17385133c6b8068765a54db2a9b74baedf055e1dde049bb20f9cdead9b00d4dec78bd4cedcdd9e22aafe6f75669cdc70e2ca830a2e0e860eec57fca9a64742f2d9ce9d714eb74bfcbac4a1b16c197b00f334f21b9436e1a82bc4b112cd56a90e425dc7a26272b6ca390cf350a03f261c22b941c76d68abfc980abb8dc4b96ecca0a08f3649b30fa3983ec8203df8eeede808c98769f1fd9b5b7d24437c488de9ffab8744203bc366fa1053429472510fb33c4ff45e8c1e3262b21d4ccfb12371d0020ef6ee8fb2aee06556dc860b662f10d008fc38b27b76fdfa045ab7443f80064d7b945b448467475276e898f90e8964314068f314c544f3e6aa7fb66f3d3c88852fdcc9d46dea8c68bfff0b4fc299cde38f241cb9c41a7ce89ad7233a5c95675806db3ccd799001971faadcb79f25858f7d06e10698e5f48313beeed41fc8b0a84be64f5055ba147126ac00022657edcf9ed76daa4add8df2719a2a517e8adf213044b054235f185e02b331dfd3330239f6a6d71b7a2f14f8a19a6bfc7aec107690d69ee83e9ff2885ad574c356ca481a24669c46ba94c58c688f26c8b4aa40558cfcfe22aa4733d808c27447c9bbdca36db3ccb4c7213615484356b1adceefca807a662321a7009befbed16fb547bb038b46db43111717b7ec8e86273628c2153f5a290345195f43cd2e9a627663c1db88689977ce3cd86dd34fc3710ac51c7c86b10397fc23b0f0feeed2ded02d19b507597e46fc9c9c712e06467df150c0ad93c800606603406bc1753749e6dc999fa4745d454fbece2b90dd9742b2c7f9482da35bb2540b4e6774f6a6d4bd8d5187103711272df7db1ed561f378bf4d903ef3658f6421a082dbb52b5175f04d803d4f1e495c1632fbf6fb9db406aeaaced6f8c384654e251d747e0837487d5da69370bed524e72ae7ff21f11cb7c62098d59b732de8437569774dc4a8a1c9a7ef42712133dfdad61bf4ead6192d561c099455d036838f003e2965e8728cddd0882181fde3022fc9b1bc19b468402c65f84a49c509dae6a945efe81a8775051e318bac994c269ea09683874977284c761f491fb8a45ceeb84d2bb067c22470cdf15c60d53d11da6ed5ce4dce9ff650a02f18bbe5e930f5dd01e35db411bcad0230d999dc7a7be763fd44b678c976c9fd1a1523ffb8d1ac971", 0x1000, 0x4}, {&(0x7f0000001200)="6f949b120b810f747f1e8e72b65d41146128163da0b8f01ba508b0de0b1b6027d211f53101f438eae892db2d855ae0b57a597087bdbb2ec17ca1ba1c855533c342a4bede9da1d5b32a831236cec47013e05e289b01f3aef0b9c1eab3203431fa3f027bcf91d68b5d167eb116816272ca8d92f872175673ee3241eb81ca5fc505856004b3cfba0a293f8efc3d1e4fd68ee4718f810d6219222420c818e77cf0a74802cb0e61bc47fbc35be7f0ed34c1f5573be889acbf67dd278af45fb8130d429297", 0xc2, 0x2}, {&(0x7f0000001300)="d856f17197fe3508881d6c7086ec8dafac57d1f2e554e1bb3aa6f8738fa481d94ee61e3db47d56f276023c2dfbf9546a7ba6350eb4fea9bc8a28dcd77770e7504e484d7aae17ad8a38ffab4b", 0x4c, 0x9d518f5}, {&(0x7f0000001380)="b0b19dae220f82b9e2b8e81545ea316d32ac4d", 0x13, 0x6}, {&(0x7f00000013c0)="aa2ea124c7aa4e74a0b55b12b71ba335af9390b081b257c57ef399c2e28a9aa1d37ca3199d462b51629aae73d32ba2a71709ebab280afe2e39d4c6d4f1948ad1d0662ee1674acd6283dd08d8b9a3ada2fbc6c2354972f3f4ec3cf9239c5c00876e7fb1a525b0f81b7d7dd45cd4c8a21740dae363defa35a1b9fdede6f39d933737317a0ace40e97e4dfbc7a96cc89d753756f28e75cedcd7f5d236ffc6bbc5e337de193e74", 0xa5, 0x5}, {&(0x7f0000001480)="8287a970479e55f5acb46560d7f79622fa39dfd7cf8f958e05606fac4097fe97e503bca3f03da8927b5f9d4e85b222a663f5b90b54c56fc1baf6c35145537d693131a7696bf67b06ae63043b70fb41326d52d818932a300fbb547acc49151df77e94413b0c36c50ec3994ca1b39b4276dc282ff5794cfeed73f146f3d88a75a93762a8291489dae52dfe6e428f02539f8e7933", 0x93, 0x80000000}, {&(0x7f0000001540)="603ac9febeda2665ff56c10e96e1a43ee941983699354468bf801cf5f88c16b1d389decfd6c6e013bd3d4422b8050f20b77e70824d8e898ccb600f145e1dfdb1704bd378430a1c444eb994ecd45cd2e2f164523a989e0988f702b5b794fa2ee08ac48d41280649c121552defcd597947a2b55eb6b5a7a772892e1a469df4b6306e39b3dd1dbd94c7c7bdc357835c9c5736ed5665740d8db002a951b6d40df76d1c4c89da88afce10fcc65c6ef7c27ee1bdb5d96af7e1ddff3a5edcd0e7699dab33e38be6b347a0bf36d1dfae66aecb7d087711174be80fe8711aeac3b78024747e8b13b35d2c767742f4fa159bfd29469f2416b9", 0xf4, 0xffffffffffffffaf}, {&(0x7f0000001640)="b00cf0b112d55971311c68cb0d55b905a76a6a98421e6bae7fd094a07a89b8e55544f3455350513d6bf3fb50309da7505195a56d4cc15a7168b4906156e168e45771bb65f143adef36a095b60b371f5d4c36853720c40dcedcecab7d9afb37a2bf56c0f93c0bde4541044fba37fe2a87ef1b1d84e7299d288db841d2fb52a0c575f6c47612337e57bfe74d6d92f941d295702e5b1fa77bb1f5ccf942c792976ddbe953fd96c22e1283c406f537c784b1e5ec40524b50964d9305ee1605d076afe326dd5b495cf1a052249d905488844dca75a3c905861f931e704ecc5f", 0xdd, 0x7}], 0x0, &(0x7f0000003900)) [ 414.512502][T22979] befs: Unrecognized mount option "{Ù" or missing value [ 414.530540][T22983] loop0: detected capacity change from 0 to 4 [ 414.548131][T22979] befs: (loop2): cannot parse mount options [ 414.647836][T22976] omfs: Invalid superblock (0) 09:12:54 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:54 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x500}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:54 executing program 4: fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000000)=0x3) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 414.796426][T22996] loop5: detected capacity change from 0 to 1 [ 414.818020][T23006] loop0: detected capacity change from 0 to 4 09:12:55 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xf00000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r0, 0x1) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) recvmsg(r1, &(0x7f0000000ac0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/54, 0x36}, {&(0x7f0000000c00)=""/84, 0x54}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000003040)=""/77, 0x4d}], 0x4, &(0x7f0000000980)=""/22, 0x16}, 0x100) pipe2$9p(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r4 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000680)='/dev/urandom\x00', 0x80100, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r5, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) recvmsg(r5, &(0x7f0000000ac0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/54, 0x36}, {&(0x7f0000000c00)=""/84, 0x54}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000003040)=""/77, 0x4d}], 0x4, &(0x7f0000000980)=""/22, 0x16}, 0x100) read$FUSE(0xffffffffffffffff, &(0x7f00000006c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r7 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYRES32=0x0, @ANYRES64=r8, @ANYRES32=0x0, @ANYRESOCT, @ANYRES32=0x0, @ANYBLOB="040000004a00000000000000030000000000000005000000000000000b00000014000000636c8861725f72656673000000000000", @ANYBLOB="050000000200000000000000050000000000000000000000080000000100000001000000400000000000000004000000000000000000000000000000ff000000000000000800000000000000d8000000b5ffffff050000", @ANYRES32=0xee01], 0x350) sendmsg$unix(0xffffffffffffffff, &(0x7f0000002840)={&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000240)="40fa3da48fee4429201a178323039b7c3d6a4684e0d627e6740e047fbde042bcc3b902de323c51ac704f36df9f3334db426c8b31dddbe0a997592fd64022ad00856baf308a4139c2a5fc54bef07e3c4bf585f5b458afe62c7534f95fc207e48a485c82f1173e8406bb01d462b297f644858d2f9cee6a50cc4ea5382e61379a7ac7bbadcbc2b39270b0cd937457e00fb45b1c06d22aeff686db3b11fe049913db53b8d7f17c3a7e39ae56a72344b35ae62d1124e341ab2d91f96b6d8304a8b88ea878cf82731ac2eaf6b17bb926762834919920ad778b3f0c2573878428c89b60bc89f1a2", 0xe4}, {&(0x7f0000000340)="4c04931896c7c8f0c0972647417676b2da68909fdba9c2955ba7f11e67be47790594f3e9195cf0f875d83a10d8a1b934e34e36d30c4015b940326aa53e6291e2179786e35df0eefdab87d10fbbe3daa6bc45b36ea28e1e03c87cbdf54416331fd3eeeba98113ac16a950b5095781dcd7de30f1bdaf305832ccac4c675d99af21a1926678a64ff8a879405394a14e6475093edcc6e2318e84a1c11f89663fadc010c68bb11674a23c", 0xa8}], 0x2, &(0x7f0000003340)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r4, @ANYRES32, @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r2, @ANYRES32, @ANYRES32=r4, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r5, @ANYRES32, @ANYBLOB="f8008df1875abe08b3a725589b63a4ec25dfa07ab986547a3af990d1fbd3c33b8b128d121daa31ec6fb4b5c64ec120d5b303704b82ce1b98ee87d3694f052eb1d0dd8e4a33a223d6c069a5d304f804638e19fad53d86433b351664be06f4e54b056a12333b42f9df57ba910e6f92159aa128a5bb2a2021bbc7", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00'], 0x140, 0x80}, 0x4000) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:55 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x600}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 415.012901][T23013] loop2: detected capacity change from 0 to 131072 [ 415.046404][T23020] loop5: detected capacity change from 0 to 1 09:12:55 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x6, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:55 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) recvmsg(r1, &(0x7f0000000ac0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/54, 0x36}, {&(0x7f0000000c00)=""/84, 0x54}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000003040)=""/77, 0x4d}], 0x4, &(0x7f0000000980)=""/22, 0x16}, 0x100) ioctl$BTRFS_IOC_ADD_DEV(r1, 0x5000940a, &(0x7f0000000240)={{r0}, "2086ad64f732fd3b1268b5415e4b5981bcd81de083494112b71b3c26d4a182f2f9d5d68e801b312739894158b26ff55897462b2917f70d6845dc2e579781aaeb933d124e67a4c05288b72bbc3b37927f22a29a6adb0f93c05e5e1a2570659a41c4222c34644646f5694e24f2b70128eada16f97a6b04a7245a3c1b699e98cdbc91a4082652ba95eda3fbad6f474e24bd6b055a456d5e89c25fa3375b331358a60294ab03bd28b4f72d0e09df6a50269598369a3f40d81b416e9db3c57b052f83087f226db9beda0a1aa6cfcc0cf9ddfe58409a54794227e2a53c6d59ed7468c24ea9df8e66a8435cddf60f9ff8d76246b010f54b27a20666bb9e6aa58a2caea789e55059b98c2eec1f5bfa0ae97ebf83439c49c35a357ccc3d367e60d6591b54652fa63f836356f94305813048bbf07923951e92520b0baeca7fe44aeff88e2a3b7dfcde46e2aee428a74ccd68efce926a4f065ef267a1e491ad7ddf46c2c9db6b905ae7d8b8fb716c87be1ba9acee604e3ba4e14e018cc80bce18286d37a7792d0f8f6fb7f96e30949ae4b89d6335db51aa430d627638b3e4703f2b5619afa85207cb1e80b963cfac6bd0f83a5f956b57f70f5e3609f25bee4ce5724d701c9d7ba8aac06422bc3b56e9624c36068b17b8a053e3414e131da7b7cf6dbfe85ff2cb5292c3b658209ef7b6ea0ebc1e207f354075ce4f379e47896f2e0c946d41621c3174ccbb589a787d6bc94068b97fd2704ca5145209111c171f4d7aeb115f47c0981dff38e2484383a9250bfbce7d7767bce0e9ab037e57a36ca3bcadec74173e0c32133335a2fd55c98535df569c238c7abdd9cf9f745ad7056b271137c6ee1818b3fe90f0a3b44d46efdc2ba04386b48971de311acab28da9ad92bd2c9fe83524ca24fd7f29c5524d27ca97628f3fc05939a767c462b30dc3f17b39474ec81864f9aab123c9c06b0f2c7b63e998d24bec72a72e137ac12dc691415dd5a0598e832b73a47cfe5ba9133f9c73765af7b3752216c40b471677715200e404c21cbcc0c7a59ed63cb618552617bbe4a5caf8269800223f1a7f422e121d2214c52214e14332f6042ecc56934f985cba03d998b770b5a4d799081631314446983c885293b95ed32d142cc2e7ec5974c910b8875aed964260c4ed80f10213806391cb20474b4691ee5f5c4eb20b9c9310332427335759b5399c5d9cbf6f10628dfd2609dcd47665fd8b93b6d10f54a5d1bb098b62db0e330dbce0eacca7c63646f4a8b65ac8f44188140eb80ed9f64daea5c27d53b71c30092ef445369816c3268dcabcbc377f8915a98a5b5991596a08d9b9181ec3ec1253085a6ee9ef733d2dc40363a6d44b5f2984e649ece23bed4c35ef9533657a7531450a2ac23cacd31bef880643e4da0f323cdbb15c2af0641adf14c700cd291cd78a202758807d306b8cf8d2c34518ba850ec7eb13274c7db7801c19233f793be95f1c193c059d0979587f824378d4d86112eff1787e674bd1b0f428a576fbade64abce39254ab41d3bcdc0b1a1ea3ef62ffbca36a00bf32a0e3c70c95159b7d3036e9cc7cbfa00ad5724f559cff12b14fb119c96500d7c9e2606e72aef12780771aa3b3034bfb6605187ba2a86113f07c50408910d7a295b3bd5c64964374f8c0dfb87a5cca87e2c1c5e3ceb066eb52d20683bdca6c776d5f4a19457995071ffe70818fc680a29130f7f1d1cc1c53dcb50755a15dc51a1380b3788cd48405652adb128ff77e9f678d356a145f5862f99ff69757518dd30f635aafe23fea4c9e71e6499ea2d76437b3e3f779c0aa7f4de698f63053d3e466c83dd8e4446b732c34473c8e7c5484211d110fa04497e4f63944093058d8791363710cf4a55a3ce01f788a614479626c0eee6cb5ef4a15d2e99d621109a9108fe79db402a31a41e309e141ebb68822d3f7c2f7a84fc70c9fabfc8d7c1b141c5b0daf0b07c651a4e94b58c84bfaaa4670056ab2012c0dc55494a3dd8a9f5dbfc577bea0d68f3fa473b569d0328c235806267edda3b0ddd563581c2d6b86f85e9816e6ec17260a1c24ee30a2432cdace046b8553f61af0fb05aa9127529f1b26744c3a8254adda50609995f2214824fc6108296ad355c9c58e7a38942069edcc4d0c4fb2becb7c886b28933ccdef6850fa9c2e166c1abf746248fc41a22ffc426c116cfb163cacbdd3554106df1fc610112bcba07eb890ca9cb11a912870b742d1570da64205bf0c153b436fcb6c05ac9403ec774fd97f696f1dfa29e68c34dd7d4b23b56c821967ec5d0ac4bb9287d97b1cdf707847bcd4c7f2d1cd55120305da5414dc1be8c903f5fec815c982b91d95b38c314e7f9b2905fc3b4940c962f61820fa92577827bbac9e51866fde4b9e938153c9baf5332e0673710d3b324b55f8e9ee8a73b84b5b059941e8a92a2603340a653c881639bb6bd608f9084304a3b065d9f802e8427073204d452a9e9a812c8dc8dc2bb6c1cbccb1da1f02f9ebb9af1e648e0017c9c1856d32b2f0ebf1d08d13f01e6325b6ce5a72ab50063a66d5b044b6748f0221de72d2c98b0823d28d7363033ec833908972dbaae364a53ada91c5a3587502bef5f578c3a988a7101ecf06c121069a67b8ab0cd29bc058401410eeb3ceb73a251edb556698ccbef06c9060439d761702664e85533a188e76eda1b8f4c4b5e3bbe8080f2e5f49a9972523ec63b421b3ccbf3c3a07f96ea2fbcd8106bf81d6a8bc7c487e869c8eb92ccf04068daf82a28efaa54a01629018efdb863136566dd5361738e8b45cc3c4551f4dbbe196da3ac5eb070226be04be468111e3166d03dabb2307c39e54f4b28a74a91a17db2410ae960516fdd8e5885e5ff8eb2d9e6c6a5a358036820cab2651f1e02efc073edeec2c1aa19b9d39e94a89e674ff07456d41dbbd8a14ee7de0086b403698ad8e7ffe278904fa1c2a234a46daade657eba384f12307cdcc2b88a19be2ba2f77ad3ec84c702d0de41376735e2b1fb97fed8222d3e03e48a08b29a93bb13e0520e977ae8766d89709c8c8005d7dfc5c5ada23d5d5bc8f8b3359df9e88186d59737c45ae589923a057d001ec687c3093a5b9e0bfe1fa80a9d366734e8fd06e7e0f5a56122b9943a76d29c296a91a28bcfa319b0a7b57af0fbcf417f16af766a1ae9e29aafe0909b50a6ec7c930736197fd7fa43dbbe9cf18f040bedcdc359e1565ec9e03c11f420ddf1d57a8a395a3ad6f544ccb5b35569c6cb73027f1e04cb4e894a09961a8f243be3ff77b49daceb96fc08a39f2c65b8a45c85fec7e944cb0881e7e29adb2c6841c328184b9d11a2e9a95d1f07147d74a25bac5a477d3a28a110dac6e51a2fe26d0c5174250ba4748308e77004dbaa3e0fdd0044700711c3e1ca5a3517d458c8f4edaf2ff598067b295220b55215a30649f2d9a5673c0803b258e6aad47b16772f0d894b9304dbcc6ce763b3ba3d15dcd29fee020bc6e3e52994021986bedcd1c6a2ca6875e7e843d36498074ee8100dc732b192e260a5ec5331234025800abe9274b6a059323ec2a56925912b30d3868ffb305eced1dd715b8b04b637af5f1c986923b8b5ee3f51fec0ea81b4c3fa6df9b984926adaa22522f12e24770a537b82d84a60cad2216a221becbb7d1495d4e07829517c805bc6593aa867540f4ed1a8e030ee1fd62aab9b363daa13071501a78cfbdf62dd4e9f653aa4467f58745af2fad19249d620141f77c68e2ef87250bd2f61708227eb74f860e7ba41aef564019e61a8d2d757124848ae67f0e08597b0d2fe35d3f8f181441152132de25544c8fc278e13021a7d727c8125bd14f7f349e79792f9cea7d34740d3e88abd1de41e0a0723f4bdb28be3f1c62f479aa356da793d5e2389d84a426adf808dbc6190aa43c2c76ac2367b9a057e70abee78cde4207eaf31d017c5fa69b40b1acd6ae903800a06e691eb07ccf98702d5efb9fc52ff9e1cb5ccc61047a4221d4b58fe713085e2ff340d5671d84ca1c5d9f1fb4f4ad4476100313c4c5404b68c9c1dbff67bdce4cc58b299cb9e437e8415e100ddd5a4ce0eb179b7810a652679bc1737f3038d077608bd082584aa0769f9c4c24b16660d40b05ea17ead59716c98ae1cae34aca7261e3f137260f10486d6b767a9b0979d399227a26fa4202b39431d58c76ad8eb39d2f5abdb3aa1205927ab66f79075467f0b5d2abb8e5d43764fecf764ff9b5bbcaeae332aec2eb0d8c424eb1db11e5e773b1681a4463e36de039063a844899922f62a05019c6310219620b2bb8383f929f372c5f8c470a042ebb26597cb7d7c01a40dac74bd6e2d6e48209a4d88f19205cdda7704abdf031db1b2c1809f1d680404ae009974efab70f56b56b5a3f228d56fe9f9b9a2fb8cd745d4b09dc3f18490a33f03d1a579a5e1bd7fa43fe1bc3bb39e2623f5569309b633750d9937096d83ece0cbb641e4f6eb3db67521bc881f6240aae22b16b2ce7e644d40452360c6c812e1b8d39a8a04fe712e730d165e0e13a669f56cbd1958588625990089f185bd1fccd34da5d1ca4e40582ef05456a85e1711850115eee7afb1abf659f2620780552b714a2354db627eb23da494611bede49a133b9bc3d90287b998fcbc22c7314e8228c9ece49627ce8938147b32cf7d2be7bb5922ee764e13fb757ba7ab021c2c1df0486555a65d57e3b5af8f631065d04bd0e3b58146a81b5604a857801596c380565af661fe5ab85519abf9dc7b8b9ddce842f44460292d66fc010966b99397a65583bf117c38c5ce9294be3290b670bb050e4b5984c0af2858a7cfebb31245893df0eeed95ef95fd615098c5161340b2f1135a73f232343c27b5b79f87537fa71cca67c87898606f9c8b297ad1d7095f2e1ce85106910c2124eeea0b1a66c6403593b03b9d7e4986f36ea558003736d74ddda2cc4b8665784b227d5bccb10b1f3719bb1d48e17473f71cbfffa2c7def6aa1e93a4b164009b6062513b872a1cf81c842c905abfb9ef634984595c6958f0e1dcea182dd9451750a2fd667c9262d7c2e60a5347ade97af315f0ee2a0d7956c98e95a8dbe64a5f48a54adb2fbf141376bd12766a0acd0673c5c6a5f740ad4524ac892d3001eb2bfd5e25930f61a5a2ee84a614760659d0227f850280bd166d9f2a046f6467eb2b666e122a4434b42d2fb26c68c7cce13965d19961f180fcbc8dd9cfe20b5792677e007df0d91ab1414c75f305e4f7ad9af1cba7d074e74d6950cfc5f4afce7d10fd607cae0b75060d30d3968e32c410b061069b25beb89cfa359c36c9e1d0e357202a7812dbed17f28d8fb2a9b7893ceaa9f7ba9cbe1d5bfd4a5dcc799bbd2eb4c91a8d86b7c5b997ca34a89893329273a886c05f5f3d941264d99d84f8d0d542ffed4b0a166c262c3e87aeb4666e316407b4f995b483a3f7e8d8c4f1f2f959efd4e588087e7f38ea90fcd3610b4aa87803dd1656b90459274f0280eb78e1c456033fe89dd745c2d60f11912f54fe8b23307890e5003b4960fc01732c5299f1df5bca2a971ebccb06a6048faabccc4ba0dae5d1229014809500e543a300e322f5e1bd51aef8b5015317744bce3cb3bcac0377ece98c76f7a98440ca632f026e999bfb3261640c9d92fd1fe1322d659d1fb5bb930d548c200b0b7c2d1b4ed1fc695830e24e480431caeb1479dca987ce44a7b8ff8e261c901915d803a4ebebb55490519731f03db478b7b22635120c2ccb3fe2855f5db114d7b4b285bf39af63b7528281eac6257dd9a625053af34267d8b1a5454"}) [ 415.100647][T23013] befs: Unrecognized mount option "{Ù" or missing value [ 415.116170][T23013] befs: (loop2): cannot parse mount options [ 415.162577][T23028] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 415.192390][T23027] loop1: detected capacity change from 0 to 264192 [ 415.199802][T23028] device team0 left promiscuous mode [ 415.199817][T23028] device team_slave_0 left promiscuous mode 09:12:55 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x5000000, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 415.207288][T23028] device team_slave_1 left promiscuous mode [ 415.229901][T23032] loop0: detected capacity change from 0 to 4 [ 415.252806][T23028] bridge0: port 3(team0) entered disabled state [ 415.292920][T23028] team0: Cannot enslave team device to itself [ 415.324032][T23035] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 415.348170][T23035] bridge0: port 3(team0) entered blocking state [ 415.360527][T23027] omfs: Invalid superblock (0) [ 415.394850][T23035] bridge0: port 3(team0) entered disabled state [ 415.401608][T23043] loop5: detected capacity change from 0 to 1 [ 415.428610][T23035] device team0 entered promiscuous mode [ 415.434750][T23035] device team_slave_0 entered promiscuous mode [ 415.441350][T23035] device team_slave_1 entered promiscuous mode [ 415.453368][T23035] bridge0: port 3(team0) entered blocking state [ 415.459762][T23035] bridge0: port 3(team0) entered forwarding state [ 415.467183][T23028] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 415.520819][T23028] device team0 left promiscuous mode [ 415.538608][T23050] loop2: detected capacity change from 0 to 163840 09:12:55 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x1000000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:55 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x700}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 415.605501][T23050] befs: Unrecognized mount option "{Ù" or missing value [ 415.614220][T23028] device team_slave_0 left promiscuous mode [ 415.621571][T23028] device team_slave_1 left promiscuous mode [ 415.628131][T23028] bridge0: port 3(team0) entered disabled state [ 415.655832][T23028] team0: Cannot enslave team device to itself [ 415.664012][T23061] loop1: detected capacity change from 0 to 264192 [ 415.674647][T23041] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 415.684093][T23050] befs: (loop2): cannot parse mount options [ 415.693247][T23041] bridge0: port 3(team0) entered blocking state 09:12:56 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 415.710500][T23041] bridge0: port 3(team0) entered disabled state [ 415.718295][T23041] device team0 entered promiscuous mode [ 415.724503][T23041] device team_slave_0 entered promiscuous mode [ 415.730748][T23041] device team_slave_1 entered promiscuous mode [ 415.738383][T23041] bridge0: port 3(team0) entered blocking state [ 415.744705][T23041] bridge0: port 3(team0) entered forwarding state [ 415.760795][T23052] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 415.773097][T23028] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 415.804773][T23067] loop0: detected capacity change from 0 to 4 [ 415.825135][T23041] device team0 left promiscuous mode [ 415.830805][T23041] device team_slave_0 left promiscuous mode [ 415.873946][T23041] device team_slave_1 left promiscuous mode [ 415.880187][T23041] bridge0: port 3(team0) entered disabled state [ 415.901597][T23041] team0: Cannot enslave team device to itself [ 415.912016][T23028] bridge0: port 3(team0) entered blocking state [ 415.959892][T23028] bridge0: port 3(team0) entered disabled state [ 415.969480][T23061] omfs: Invalid superblock (0) [ 415.999653][T23028] device team0 entered promiscuous mode 09:12:56 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x1100000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:56 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x6000000, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:56 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000080)={0xc8, 0x9fcc, {0x0}, {0xffffffffffffffff}, 0x5, 0x1}) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x70, 0x1, 0x1, 0x0, 0x0, 0x764, 0x8000, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x100, 0x1a12}, 0xd100, 0x8, 0x81, 0x1, 0x6, 0x0, 0x3}, r1, 0x6, r0, 0xa) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:56 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0xa00}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 416.007453][T23076] loop5: detected capacity change from 0 to 1 [ 416.023517][T23028] device team_slave_0 entered promiscuous mode [ 416.030848][T23028] device team_slave_1 entered promiscuous mode [ 416.037905][T23028] bridge0: port 3(team0) entered blocking state [ 416.044235][T23028] bridge0: port 3(team0) entered forwarding state 09:12:56 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) recvmsg(r1, &(0x7f0000000ac0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/54, 0x36}, {&(0x7f0000000c00)=""/84, 0x54}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000003040)=""/77, 0x4d}], 0x4, &(0x7f0000000980)=""/22, 0x16}, 0x100) ioctl$BTRFS_IOC_ADD_DEV(r1, 0x5000940a, &(0x7f0000000240)={{r0}, "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"}) [ 416.181036][T23085] loop5: detected capacity change from 0 to 1 09:12:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0058c5d1669a"]) [ 416.307707][T23089] loop1: detected capacity change from 0 to 264192 09:12:56 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x8, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 416.357168][T23091] loop2: detected capacity change from 0 to 196608 [ 416.391446][T23097] loop0: detected capacity change from 0 to 4 [ 416.474886][T23091] befs: Unrecognized mount option "{Ù" or missing value [ 416.499390][T23089] omfs: Invalid superblock (0) [ 416.539646][T23106] omfs: Invalid superblock (0) 09:12:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x120004, &(0x7f0000003900)) [ 416.560540][T23091] befs: (loop2): cannot parse mount options [ 416.587596][T23103] device team0 left promiscuous mode [ 416.593006][T23103] device team_slave_0 left promiscuous mode 09:12:56 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x1020}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:12:56 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x1f00000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 416.612307][T23114] loop5: detected capacity change from 0 to 1 [ 416.659022][T23103] device team_slave_1 left promiscuous mode [ 416.667324][T23103] bridge0: port 3(team0) entered disabled state 09:12:57 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x7000000, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 416.719230][T23103] team0: Cannot enslave team device to itself [ 416.728224][T23118] loop0: detected capacity change from 0 to 4 [ 416.777266][T23106] bridge0: port 3(team0) entered blocking state [ 416.783725][T23106] bridge0: port 3(team0) entered disabled state [ 416.805818][T23124] loop5: detected capacity change from 0 to 1 [ 416.925930][T23106] device team0 entered promiscuous mode [ 416.952228][T23106] device team_slave_0 entered promiscuous mode [ 416.952950][T23132] loop1: detected capacity change from 0 to 264192 [ 416.960297][T23106] device team_slave_1 entered promiscuous mode 09:12:57 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xe, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 416.972821][T23106] bridge0: port 3(team0) entered blocking state [ 416.979162][T23106] bridge0: port 3(team0) entered forwarding state [ 416.987962][T23135] loop2: detected capacity change from 0 to 229376 09:12:57 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) recvmsg(r1, &(0x7f0000000ac0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/54, 0x36}, {&(0x7f0000000c00)=""/84, 0x54}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000003040)=""/77, 0x4d}], 0x4, &(0x7f0000000980)=""/22, 0x16}, 0x100) ioctl$BTRFS_IOC_ADD_DEV(r1, 0x5000940a, &(0x7f0000000240)={{r0}, "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"}) 09:12:57 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x2000}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 417.045747][T23135] befs: Unrecognized mount option "{Ù" or missing value [ 417.052980][T23135] befs: (loop2): cannot parse mount options 09:12:57 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0xa, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:57 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x8000000, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 417.128562][T23132] omfs: Invalid superblock (0) [ 417.180245][T23144] loop0: detected capacity change from 0 to 4 09:12:57 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x7f, 0x0, 0x1f, 0xf4, 0x0, 0x200, 0x8, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp, 0x20, 0x2, 0x383b, 0x7, 0x7, 0x3, 0x9}, 0xffffffffffffffff, 0x1, r0, 0xb) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x7f, 0x4, 0x3, 0x9, 0x0, 0x6, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x4, @perf_bp={&(0x7f0000000100), 0x8}, 0x800, 0x4, 0x8, 0x4, 0x6119, 0x6, 0x8}, 0x0, 0x1, r1, 0xa) perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0x0, 0xca, 0x6, 0x0, 0x0, 0x1, 0x107, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x4, 0x3, @perf_config_ext={0xe0e2}, 0xa, 0x3ff, 0x5, 0x9, 0x0, 0x72f2, 0xff}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='\x00') 09:12:57 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x2000000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:57 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x2010}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 417.375946][T23154] loop5: detected capacity change from 0 to 1 [ 417.378873][T23155] loop2: detected capacity change from 0 to 262144 [ 417.422292][T23155] befs: Unrecognized mount option "{Ù" or missing value [ 417.478202][T23167] device team0 left promiscuous mode [ 417.505191][T23155] befs: (loop2): cannot parse mount options [ 417.514207][T23167] device team_slave_0 left promiscuous mode [ 417.520264][T23156] omfs: Invalid superblock (0) [ 417.527783][T23167] device team_slave_1 left promiscuous mode [ 417.585253][T23167] bridge0: port 3(team0) entered disabled state 09:12:57 executing program 4: ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000000)=0x7fff) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 417.663769][T23167] team0: Cannot enslave team device to itself [ 417.666182][T23173] loop0: detected capacity change from 0 to 4 [ 417.681035][T23174] loop1: detected capacity change from 0 to 264192 [ 417.695723][T23169] bridge0: port 3(team0) entered blocking state [ 417.723469][T23169] bridge0: port 3(team0) entered disabled state 09:12:58 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x10000000, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:58 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x10, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 417.830782][T23169] device team0 entered promiscuous mode [ 417.853309][T23174] omfs: Invalid superblock (0) [ 417.865286][T23169] device team_slave_0 entered promiscuous mode [ 417.874563][T23169] device team_slave_1 entered promiscuous mode 09:12:58 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x7, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0)}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r1, 0x1) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0x2, &(0x7f0000000100)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3ff}], &(0x7f00000002c0)='GPL\x00', 0xffffffff, 0x1b, &(0x7f0000000300)=""/27, 0x40f00, 0x10, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000340)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x2, 0x3, 0x0, 0x10000}, 0x10, 0x11bea, r1}, 0x78) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={@map, r2, 0xc}, 0x10) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) recvmsg(r3, &(0x7f0000000ac0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/54, 0x36}, {&(0x7f0000000c00)=""/84, 0x54}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000003040)=""/77, 0x4d}], 0x4, &(0x7f0000000980)=""/22, 0x16}, 0x100) ioctl$BTRFS_IOC_SCRUB(r3, 0xc400941b, &(0x7f0000000480)={0x0, 0x6, 0xffffffff}) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x2, 0x0, 0x81, 0x4, 0x0, 0x3, 0xd988, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3bff, 0x1, @perf_bp={&(0x7f0000000040), 0x6}, 0x840, 0x7, 0x3, 0x6, 0x7fffffff, 0x9, 0x800}, 0x0, 0xb, r0, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x4) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 417.885853][T23169] bridge0: port 3(team0) entered blocking state [ 417.892261][T23169] bridge0: port 3(team0) entered forwarding state 09:12:58 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x3f00}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 417.956140][T23189] loop2: detected capacity change from 0 to 264192 09:12:58 executing program 3: ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000000)=0x7fff) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:58 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x2010000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 418.090802][T23194] device team0 left promiscuous mode [ 418.098380][T23189] befs: Unrecognized mount option "{Ù" or missing value [ 418.106063][T23196] loop5: detected capacity change from 0 to 45945 [ 418.184026][T23194] device team_slave_0 left promiscuous mode [ 418.191159][T23194] device team_slave_1 left promiscuous mode [ 418.200636][T23194] bridge0: port 3(team0) entered disabled state [ 418.221860][T23194] team0: Cannot enslave team device to itself [ 418.228386][T23197] bridge0: port 3(team0) entered blocking state [ 418.232919][T23189] befs: (loop2): cannot parse mount options [ 418.251877][T23197] bridge0: port 3(team0) entered disabled state 09:12:58 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x1f000000, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:12:58 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x12, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 418.335494][T23197] device team0 entered promiscuous mode [ 418.341250][T23197] device team_slave_0 entered promiscuous mode [ 418.352240][T23197] device team_slave_1 entered promiscuous mode [ 418.360648][T23197] bridge0: port 3(team0) entered blocking state [ 418.367010][T23197] bridge0: port 3(team0) entered forwarding state [ 418.436247][T23205] loop1: detected capacity change from 0 to 264192 [ 418.460560][T23194] device team0 left promiscuous mode [ 418.471950][T23194] device team_slave_0 left promiscuous mode [ 418.502768][T23213] loop5: detected capacity change from 0 to 45945 [ 418.520707][T23194] device team_slave_1 left promiscuous mode [ 418.552891][T23218] loop0: detected capacity change from 0 to 4 [ 418.563488][T23194] bridge0: port 3(team0) entered disabled state [ 418.579940][T23220] loop2: detected capacity change from 0 to 264192 [ 418.590917][T23194] team0: Cannot enslave team device to itself [ 418.600589][T23197] bridge0: port 3(team0) entered blocking state [ 418.626211][T23197] bridge0: port 3(team0) entered disabled state [ 418.663486][T23205] omfs: Invalid superblock (0) [ 418.698958][T23220] befs: Unrecognized mount option "{Ù" or missing value [ 418.707628][T23197] device team0 entered promiscuous mode [ 418.713180][T23197] device team_slave_0 entered promiscuous mode [ 418.713465][T23220] befs: (loop2): cannot parse mount options [ 418.719837][T23225] loop5: detected capacity change from 0 to 45945 09:12:59 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x2300000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:59 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x14, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:12:59 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x4000}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 418.895768][T23197] device team_slave_1 entered promiscuous mode [ 418.924381][T23197] bridge0: port 3(team0) entered blocking state [ 418.930774][T23197] bridge0: port 3(team0) entered forwarding state 09:12:59 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x20000000, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 419.031036][T23227] omfs: Invalid superblock (0) 09:12:59 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 419.106551][T23240] loop1: detected capacity change from 0 to 264192 09:12:59 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x7, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0)}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r1, 0x1) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0x2, &(0x7f0000000100)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3ff}], &(0x7f00000002c0)='GPL\x00', 0xffffffff, 0x1b, &(0x7f0000000300)=""/27, 0x40f00, 0x10, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000340)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x2, 0x3, 0x0, 0x10000}, 0x10, 0x11bea, r1}, 0x78) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={@map, r2, 0xc}, 0x10) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) recvmsg(r3, &(0x7f0000000ac0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/54, 0x36}, {&(0x7f0000000c00)=""/84, 0x54}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000003040)=""/77, 0x4d}], 0x4, &(0x7f0000000980)=""/22, 0x16}, 0x100) ioctl$BTRFS_IOC_SCRUB(r3, 0xc400941b, &(0x7f0000000480)={0x0, 0x6, 0xffffffff}) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x2, 0x0, 0x81, 0x4, 0x0, 0x3, 0xd988, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3bff, 0x1, @perf_bp={&(0x7f0000000040), 0x6}, 0x840, 0x7, 0x3, 0x6, 0x7fffffff, 0x9, 0x800}, 0x0, 0xb, r0, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x4) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:12:59 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000240)=0x2a, 0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x8, 0x200000) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x2, 0x3, 0xff, 0x0, 0x0, 0x6104d, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000000), 0xc}, 0x6040, 0x0, 0x5, 0x3, 0x9, 0x9f840000, 0x800}, r0, 0x3, r1, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file0\x00', 0xb, 0x5, &(0x7f0000000640)=[{&(0x7f00000002c0)="58d5efdcd29a39e2b4a8ca6fab3d43ce3682b400a963bf75fd22016bb5fc528fd9692a9c528278d5b24bffbd92ddf7cd24ff4e3cd10940300a7d9c2a004f737fea1157a00ce7af4a798e0d3aac1a3750002aab13e19aeaa54714d01d90d227c14a1311fa9fea934af7e29c01ba27ad78a7c222e357259da1b9db7b6d294b523472757abf6a0653e73d480e46d5123eecf4c2b1ff5458886ab3aeec8a44274cd2b25006b87a54267861724e9519e60c3079fb4179057ce362f99ab46d259ddd207df8d9bd67d8841330925fda698a46cc9af1eb45e18f9ea2b850fd7c6506b0b1488d", 0xe2, 0x2}, {&(0x7f00000003c0)="335f84369334f794cddb8ab0fe8c4fe402fb450255d6a582a19fff6e549e3177a1ea6917ce8e5a8499f1a761ececa6ec289d20c3f159a6ae2ffd6bdc0259cc11241680f286499cb63168220f51dfb3734b082d6ac1adae527e5655250c4befda9d77d0a863daec1547ee1879fe9874db8871fd1469b2a18422536132b83d1b607a88b3b2fda905beab14c9a886d4f35e392d5b1c5d3d933e737560c43704c51e96fc5dbc58bce26b140fa92dd944c55b81de815988f4e02be37d2647d5b57744edfd178da4aac8e8c3b6d19453490c08d404bba7961275b22a", 0xd9, 0xbf0}, {&(0x7f00000004c0)="df9fcf3e672f29376da63b0fc4a7e15c49e45b8175b8992ad8af1484f0e90b7ef6c57aea5bc7b196f447a522060dc14fe8fbae71fe61c8c904bba459dea4ada07db836048f65e64046e05611779fc90da6fe7e37417e87318a6d0595b0fbea45aad3fc7953e5bcba5642eb6e72e2d5b0fbd1a8a3392d95b2ae76bae06d744f8b89f41335afa10a82c7c8e3bf9d4b21d485ef4632c20524c0b2b2e04d1da6f71c3b5838e9243922fcc5f22e3a3e62e63eb0058c836fe847664c205b", 0xbb, 0xee}, {&(0x7f0000000580)="938caf476905670e43bbc1fcac30d8a7f3c3b41c91dc23bd5368bc8a9b91d8f50ad7f75ec1317afd8b140b8ee9b566f4dbf9bd55bb279d40eea4d6bfe2550eba38d50e69340be727fea4892b0632d342b3e2ef943dc08e7958d3eeb66e87d04f4327", 0x62, 0x3}, {&(0x7f0000000600)="dd7350a642972c3b617f2bea1abf069455a3db35f42b276d40dbcd46e81d9ef39212d23d5ad9b3fd69224d18cbf387a4d67a", 0x32, 0x6086}], 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f00000006c0)={0x4, 0x70, 0x9a, 0x6, 0x80, 0x0, 0x0, 0x9, 0x20020, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8ee, 0x4, @perf_config_ext={0x401, 0x5}, 0x20, 0x8, 0x8001, 0x9, 0x5, 0x8, 0x719}, 0x0, 0xa, 0xffffffffffffffff, 0x1) [ 419.187937][T23245] loop0: detected capacity change from 0 to 4 [ 419.197848][T23244] loop2: detected capacity change from 0 to 264192 [ 419.295964][T23246] loop5: detected capacity change from 0 to 45945 [ 419.304664][T23244] befs: Unrecognized mount option "{Ù" or missing value [ 419.311873][T23244] befs: (loop2): cannot parse mount options [ 419.319256][T23257] validate_nla: 10 callbacks suppressed [ 419.319302][T23257] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 419.345112][T23257] device team0 left promiscuous mode [ 419.412123][T23257] device team_slave_0 left promiscuous mode 09:12:59 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x4800}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 419.462877][T23257] device team_slave_1 left promiscuous mode [ 419.471847][T23257] bridge0: port 3(team0) entered disabled state [ 419.493212][T23240] omfs: Invalid superblock (0) 09:12:59 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x20100000, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 419.558805][T23269] loop5: detected capacity change from 0 to 45945 [ 419.559803][T23266] omfs: Invalid superblock (0) 09:12:59 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 419.690007][T23275] loop0: detected capacity change from 0 to 4 [ 419.697531][T23278] loop2: detected capacity change from 0 to 264192 [ 419.710988][T23257] team0: Cannot enslave team device to itself 09:13:00 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x3f00000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:13:00 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x3c, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 419.777640][T23278] befs: Unrecognized mount option "{Ù" or missing value [ 419.785099][T23278] befs: (loop2): cannot parse mount options [ 419.788975][T23259] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 09:13:00 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfffffffffffffffe, 0x0, &(0x7f0000003800), 0x928002, &(0x7f0000000000)={[{'omfs\x00'}, {}, {'omfs\x00'}, {'omfs\x00'}]}) [ 419.826578][T23259] bridge0: port 3(team0) entered blocking state [ 419.838115][T23259] bridge0: port 3(team0) entered disabled state [ 419.849588][T23259] device team0 entered promiscuous mode [ 419.874698][T23259] device team_slave_0 entered promiscuous mode [ 419.888789][T23259] device team_slave_1 entered promiscuous mode [ 419.929994][T23290] loop1: detected capacity change from 0 to 264192 09:13:00 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x20000, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f00000000c0)=@sha1={0x1, "8355fbdb0aeb43215423464f4c23d2badf5182cd"}, 0x15, 0x1) 09:13:00 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x3f000000, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:13:00 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x4c00}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 419.970303][T23259] bridge0: port 3(team0) entered blocking state [ 419.976668][T23259] bridge0: port 3(team0) entered forwarding state 09:13:00 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x20100000, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 420.061352][T23297] loop5: detected capacity change from 0 to 45945 [ 420.127239][T23290] omfs: Invalid superblock (0) 09:13:00 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x4000000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 420.160093][T23303] loop3: detected capacity change from 0 to 264192 [ 420.183647][T23303] befs: Unrecognized mount option "{Ù" or missing value [ 420.193406][T23303] befs: (loop3): cannot parse mount options 09:13:00 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x7, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0)}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r1, 0x1) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0x2, &(0x7f0000000100)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3ff}], &(0x7f00000002c0)='GPL\x00', 0xffffffff, 0x1b, &(0x7f0000000300)=""/27, 0x40f00, 0x10, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000340)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x2, 0x3, 0x0, 0x10000}, 0x10, 0x11bea, r1}, 0x78) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={@map, r2, 0xc}, 0x10) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) recvmsg(r3, &(0x7f0000000ac0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/54, 0x36}, {&(0x7f0000000c00)=""/84, 0x54}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000003040)=""/77, 0x4d}], 0x4, &(0x7f0000000980)=""/22, 0x16}, 0x100) ioctl$BTRFS_IOC_SCRUB(r3, 0xc400941b, &(0x7f0000000480)={0x0, 0x6, 0xffffffff}) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x2, 0x0, 0x81, 0x4, 0x0, 0x3, 0xd988, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3bff, 0x1, @perf_bp={&(0x7f0000000040), 0x6}, 0x840, 0x7, 0x3, 0x6, 0x7fffffff, 0x9, 0x800}, 0x0, 0xb, r0, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x4) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:13:00 executing program 4: getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x10) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 420.318749][T23307] loop2: detected capacity change from 0 to 264192 [ 420.335734][T23310] loop0: detected capacity change from 0 to 4 [ 420.354032][T23315] loop5: detected capacity change from 0 to 45945 [ 420.382828][T23307] befs: Unrecognized mount option "{Ù" or missing value [ 420.421505][T23326] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 420.459503][T23325] loop1: detected capacity change from 0 to 264192 [ 420.461014][T23307] befs: (loop2): cannot parse mount options [ 420.474970][T23326] device team0 left promiscuous mode [ 420.480494][T23326] device team_slave_0 left promiscuous mode [ 420.490492][T23326] device team_slave_1 left promiscuous mode [ 420.499900][T23326] bridge0: port 3(team0) entered disabled state 09:13:00 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x901, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 420.587636][T23326] team0: Cannot enslave team device to itself [ 420.598854][T23332] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 420.615457][T23332] bridge0: port 3(team0) entered blocking state [ 420.680036][T23332] bridge0: port 3(team0) entered disabled state 09:13:00 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x41504890, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:13:01 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x6}, [{0x2, 0x4, r2}], {0x4, 0x1}, [], {}, {0x20, 0x4}}, 0x2c, 0x0) ioprio_get$uid(0x0, r2) fchown(r0, r2, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000002600)='/proc/capi/capi20\x00', 0x183880, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000028c0)={&(0x7f0000002640)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000002880)={&(0x7f0000002a00)=ANY=[@ANYBLOB="000200006400000227bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x200}, 0x1, 0x0, 0x0, 0x84}, 0x800) syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file1\x00', 0x8001, 0x9, &(0x7f0000002440)=[{&(0x7f0000000080)="190f08790724a51ff4873755634691e4ca62941d0aa7b34cb41b48755d2d48033975b80dbca760036f1bb740b04bcc134f14", 0x32, 0xfff}, {&(0x7f00000000c0)="8840", 0x2, 0x9}, {&(0x7f0000000100)="903bf49312eeaafc73b475f029f2bfc062420e9893d51a43063125a27185939f99502d39c7ec286df8", 0x29, 0x1}, {&(0x7f0000000240)="3a591cda8598df1f371873655bca01193e0e3b5b06eaa1e5d25c1fc9c46365bab24a55cc4bf3cd4ce95735944a5aebde39f9464a91849eb988b53f", 0x3b, 0x5}, {&(0x7f0000000280)="0e7e18ad793b7e4972717fe5d63c14237f5717ed306ca5741489cc3150e8338abc25009a04ed8aa5183886a510afef2860d76cc969", 0x35, 0xffff}, {&(0x7f00000002c0)="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", 0x1000, 0x8000000000000}, {&(0x7f00000012c0)="0457e0a2820e0e043e47ae0eb60bc7271ef15590e176bac866df7a09339096772fbe28b15432e5184a12e38f5b0b0ee67b7419a3671ad97ca63bfc8d334b356b2f44ec3a5e2ba85772ca1c87809fd7672af26aaf2ca1704b8c34f1de6fe63b751723676a674e40d34ea561a36d3507123dc2a17cf12fc7c8afbcbe620683892b7092255a00ac26d74dd13537036ed427a280d9ccaf68367c85bc228285cf833d45a1fe389386417ee1befcfae8419d3e1a91aa9f147f6dd1fea038885dd7cd2eeb30da22c6d219336b8d139d1a44656e8ff46c21e2bdb8b97b2fccbffb306b0f050f3cd8d50e4d0aed9328c0432dd958e0b2af14e8f7ecf9df83e7df416f0258e4b7e067a38c4b723a27219b621bed1392e9b7008dbb009db020427423456c3e3247ad329a39b64b398c98fa51a2e5bd303d364773f9b19e72a6e69ae2330daa298167b65c827a69352863f7c5d642c48946d08ab148c8a2d2b55f0ebf2d3c33b0ad47ef8fc21f60e82ad07fd5583ccb69fa45f1a24093690c68cff0d7f501f63d314697cf56d267292c5644367b3a9a2bd8795d08607464dec7a1cb0606317b4b0551c883f9fec7c96fce42f5ad59ec1efefe6235c3fd6167f40e31303462224bf0330003132bfd593e1b8a954c2303b41aaa3f9c6e447e6f71df7ae5f786782febe20d2e4b5fd5687208ba0543e1f7b460b1fc035860984260fccddc7fd10d105a386b5e02194bc82b1767b9d79c0faaf550c028eb32e89e484203e0e5c5ce492b874e6dfba82e9e72f148b661f860e447463459a505fe6640e3b75eeebfdc4bfb761ed3b8a5c1e9466eef6787f7f16d57d01b24ab80f5c415aa54ed3d4b461c6ae85399c04d07e981c3151987555a25063e29664a8a8640623404106bcf6c8a91ac9a238858dd7beff82afbe6dc7d6b56d5adb1a8d378a226b989906be66adf1813d888b0b8e72ffb4f226ade6e5b6eb5b47e6af4448afbbb4e3e2831237110856965b076974b06c8977c6637479fe5ec6d252fcbdbdbba18a0220d1e789395d975aaebc346914fa4a8e2e9b91f28f909b8927564c7e5928bf58e8a89812699b299458244d742573f5be50f79bdeb9fbaf94ceaccd317ec01b3753e8706883f85171792411e9e75b2e55d47465355c3b54d6a0c26b4235d6b31ed792270fe7021201b43a7b0f3918e0027e43847a08efa0f5e16bfb28444d026b05f69e0dba94dbf73a86f1dba1ce5b10d70da50dd2fd46b760e9a5dfd272bf6e75b85c687a2d239d8631d95c412d85d86a7f62800a9c0d91f94d526ca846189da5d099005fed30d312f2c1108a1061d7f60d23070b1b0a2c42051538b9c8e090e4fa6111f09b5a444408a542cb5cc3b239765fc8c6b56770ba644dfa3b4d5b96f71682e85d12c833c7b01320507105cd69d48b9a36c0e367d0b60282458f06fafe91a356a2d4bd23b8b732c915460cdea3ce3769f249715cf097fa63e3766718b1a719c08dcd3bbfc6015c92d55088c48c2618abaa3e9c4b486d6c08d0f552dca55cebe8340a5c27cb56cfc1d96662637305a1a245e211d2374a340f3548e5bdca7b64557fac7656e612f0b7bb05c37df87fc788bd0fa0de85eda57bc025fe991f236a99a09b723d971b7c8fc701974ac4953e6aacfe806927e691bfc04f690bc7467d273fb20dfacd83a961011f351f06254fbfd5dceef31dcb021d51d4c5b0abcab184dda99033c856e583d0c60a42296a401372547df0a8ecb11948fe9d04b8e67d1861e18f19b94ff225b92ac00b5554de69adba6d935e44e7ad52bc09aec4284b398bc7fe7bf2ec347571fa713da8d5775a31fe2c93c2fcffd284ca29ff51b605486248efdc645a0cbac07cee2d7c3611182f549f8eac83cf18445f52a9a673af51f941894b077cc671032b737168475f6b88df83738e07d518ea88bf5b0c0b181b3d7f7679f684be69733af736a5665a1e512f313503a3546f77c63d176678d84b811e811a02a7d79cd6ee8bd30d7468b6c4f572130ff26da2667a206eecfb95257cbef04493a2f5cad8a041d75f4bb07616e0b7ff56c8abfdbe037a3b15a4330a54b1d4197a1fa6b3ebbce59cbe50d894821460f12d6e36b80690247ffa85c2ba3095e1f4227248f246ded6f7841b7677b47f8378571bbc9a6bd1c875dbfe653e46ee8d70961f6561cdb4940fabf73f464495e430710824ee4e628b662819f777e59c42709c784fcb2f488c5365b18ecc0dd9c9aa30a24437f82c03e5340f1e6e2ae788673ecfa41f894a2cbc7e320de612ecb969f119ff1c001a1672131b9df24035f34c3ab0c0fa6ef757631943750a64becc6701f0e891dfda43a8ddcf26e7eb8cdf0746604629cff08ac93d7f14827a2d69c9876eb0a88239bb312ff96c9cc1212d3d79dfb44718d8dd93749e9deb079e91278ed7a22b03be6e1c42b3a130228d47ae02577056f3718172badd2cf009f5906a072f9b66d9da4604c018ea792ff451f81c99fdfdc99deaf90538f07fa8c0ff19dab4320931afda9e4df142b639c26a510c008cbdb990e0de9b2bae4b1b25d1ab4b982cb74683653fca6d8c0cffe4d9bc97568bf5b448b4b4c0783d69cc538ceb5d5d8188c9cc5d3549d2d9e0bd8ce382ea32c80d62c827594a1268cc28988ad6bc267d06db92f8f0e4c96b99ae0158bc46359f71167147cf479a65cff07cc9c6493a9355c498e6b9291e9bd753449b20c10eaba90ece07bfdefed7463c7b0b8b9b05788a8912aa213cdcc11dd4036871464defb3c405bb23787f54e56c54a4ab355ee8aedfd823e9ae8ca9db6a8e0897bc3d411555fae503729cc2025f53c24b4156c6f82d3088e7fb9318be0e9b1f9311eebc625565ad538928cfbf7ea21751ea8a4c6477e9fcc7f4aa5e6d3e990592bcc07f0ab9838729e9fe675996e1c1c119a7fe3ac133dc0672de25f2fcef4f4bbaf24c18743c20139092f20e2150e5f72ace1e8285e8b8af4a83326dffbe47af6da64fc85790b3d150c04a9e5041054a9ea6dd33df3b3e0357af40afaab61910f611983abb6f9294e8140fb03f9241d9b46b23dde391e76fe94f025b6c32ed663e88f5b29e40ec5c7aa7ea99a12ceedbd31546a3d512a33bcefd5d023db4e24a4b4f2501d4a5df28534ab2e40a9d6d698b4569efcdea77ce3f1671a52b6f90df6c06495796373b3d2d13970e9a26f50a8894df20ff9993b2d2a974ad8f2e6b08bb878086f8a7f9c657102592db786496f1c2873e9c1096dd4cf5c580d0abdf9121aed1553d558d6166929565fbcfc0847a6eeb72b917afc9ed8b2e89e6de8fc4188a0ef1ac42a686d3afce3fe89d59566b465925e2ba30f03c7b1c12027349029118cbe82060d1cde83af2db3efed822639fbf8168322ef1d293767460ba92014b1b5486c4c009d92ef5ea5bd57c5154b922d8eece10af5cf26410ffa5094ed9303060d8169856a7d816a8deaee92e4ab3c011cf8efb86362f5488a82694afd90e9b12a96bfc7bed5e37b985aab89b9e70b845f094cda6c3e1cee460e56349b39f2ac6706105b9cf68a4d67211e535ea09ff5c0de08cf0545bc8fafa432557c619344dedeef75972b1b9ffa1289ab9f60e341209a992d936a3283df99633e9bae4e1765b4457341f5ca1eb31e5755714e01a4da12d513f2bfe007dfff3f4577cb1bb84417dae2b2266af8d8deda929d12aef722c22352aa219ec6ddcdb08206b3517b8be9b901dca290c2a8ac419d5238cdd7d33c21d38d66846983174349194e2d29a6914ff6c08f049fd1d66228bbbb9494615baa0c68ca754e8e74b14b80c47053b4d1afe344ffff47242408b0069a75ec2e6c0df37913b0a84a89cf6988be10388795042dcd6f679e2e8e92bdf3e7fdbcee1d499ffc39c9ee7643bb3c981a008f2f16037628ed7f18f13f3273cfe1ec2f8aa124875930e6af042b50f5b74730fb1fa4edcd96b0c3662ac1732012adb5fd812f0923328701ebc2d660ad4f5352335e6bf88bb2c71661c3896f3ad74f04ed14445bc157325ce4706917644b32b2961e3d8689e6c4f851f0816f90ee01190ec73eb1160fdcbeb5d1cbc58a1e568ab667ad41bfb81b23f8f39453f9f222dbc5654cf327d5abfee9d0b2693aaf6c25e22ba894f8e9f68fdbc93f144b90bf3de555370b4b949942ed3e3fbf5e69445b83af25861279a3c7594d174947b2352a03b2e075bee70bb1c1674c5898d91826336e357929d2fdc3de5b3a76528fc2b9084f0bb8f44af7a7cfe43a38b3d1a59c45293a1ee732ec976fabcd08d1882a478e7c1121f9464f2f8e1242d32006d3e8fab1f3268f05da9b749af2bd34a0f3494cf30f5c50308cf84de8930b70b0fc5ee09341f7c8f8150299466e6019945bd8b23caa4564cacfb65c6f19be0a73c9fc6cf3249ff8b7e280c4068fbc7605ea287375260c8bcea254a7f623d7ebf18146f7ecb7b348412a7cb9c85a7665eb0197ab5100dad529eb9e039157d3efa8403a4179aac0341ca0c9b1072707da89b11100f500bb87b8c9fd6edb09858c17ac7782fd2f19bd72ff921acb18d15d71173c7e45d27830341869a427fe9950fa04b1b5ec6be1516077ce596da8e9abd1a6f0f96f90080790576646f69e8390a1bdeb5f999e0179834e9778a64762f36e6639fea1d44687b2a83a26e35d198996f97efb602bf565f8459653b31bf2dabb7cc01666bee7a0a2b683e6fd6a5c46f3b12cd0e2f73c2ac0972a27db7b51ff57adb94cfedde1f301c20379dc01aaf83495eb07c840216e5249e7a79ba28d8eec60f9860d18acf9289e9184ef578473be35e6471862f3a33b91087e696943e998a77ec826f6dae5d042163f902908c6b93d35f517498c8c9d404c618d0091aa3ead2e4e85d56c18677985391b1f8c530d3c482f3d7b89a24cb11beef04a99738e30ba3fc0ae45299a30b463e591a3f0b3fbcea32b8791304c58105c397af88c72d6ca1702e092b7fd5f609f0cd6e39918f7891ba20489f1fd203230860bea144fdea24197a5ea9513c63bd5b765a5cb37c9e9e92427e6c02a7902883d2da4ccbfc1fc30dcd5eadc71a906fd9f0cb4cbf2e1af2f4ce0e8ba9d6695de2074bceb08acb97cdb9beb862167670f61142e23a4f4f3e3871cc413df9931af46e5d333237b246718ea3967bd81d7faea6fc39461d45aab7934a7b1d3c4122c77ac8b25670781da5675b3242f34dff11274daf3e6f78712091ebed3fbd3db5cadf0439d2291ef71a05cae565c539cbc7b4b0b05743a19217325cd24fae83d8cc9d895913e35afbd554a075845a0591111c7368af5d427a7f674f7865316ea7dbe5bf78ef14aa71fa3055cbb1cea5ca1b40c6aa0cdac1744c2c215af58c71167c614b16c4a29f77f1b5e8c41bbfb8f0e390b9701c1c761a070b1625d94a6e007ed89c216e374472fbb9c581bd8931e2987d77d9fd07077e99cbd274b53400373a689b88672e2db1fbf54e7791104ac8b7da4055ea9f40c531adc146fd5b8df0d56c3079c89def394b7cea377bc1abf150c606f692ca17784930d4f31ac53d58b16dc497e1022ebc06961d44a6757aa1097d3f37fd693d764d1939f73bc5a5bbb6c637432a19f4385efea11c095fe4cb85e58e977320d99b8b2c1ca009f43fb385f08d9f7656ec1263a1f1ef6c28b6c2ce34d4c54c6247dc71f49ee43e94e1ec27b55b1ce32739d4e9ed15ac7c96a567aa6c621b0cc2640be692f92f9fb684ce9a245b6a84dfbfb9d192eda7c28dd012c865368bea8925835faa500d8f2d7e98058d27f25317c06214eb5dafc8e490ac59991", 0x1000, 0x6}, {&(0x7f00000022c0)="4dcca474e9f057a47f64f0759a8779c92e7524aab4df104a8a22d07dfcfe7d244946e49a4435329767b9543d4c35a4f805722835118e9673fc8f3f6673c717bc9e8ecef0bea3fd42b12c2e2b29d153597eeac1dbb2507597caa83c60bf5137a0521b72b0fd35ca8554befb2c900fb3ffbd1ac1da236abccf9b8618279482cba2b4fef15ac7ae929e328b0cf35675b2a3eb298782773ee5a7229c3bccbf193b5ae2d1f2bad5b8e3d86f73b35b48fed43dd26d1e77c93f30", 0xb7, 0x6}, {&(0x7f0000002380)="a66c5da5559aa4c7046ae9634442bc98e11a1886ee4d9824c835ae4b2be3661d6fc2e752d4646569ca041ce5a6f4584fae7f01fd46784be8fa488e5d74fa5824fc96453c2e1378c7c82190206bc0b9d2bb781408e88fd08ba4630e20319d8dde493bdedecdebbb1ca524fbf76dfa747b1adcb08a02e02a526e3e2e687a1b9eeca6555a6207", 0x85, 0x1}], 0x127061, &(0x7f0000002540)=ANY=[@ANYBLOB='nr_blocks=1%82,nr_inodes=1g,obj_user=omfs\x00,func=FILE_MMAP,hash,rootcontext=staff_u,euid>', @ANYRESDEC=0xee00, @ANYBLOB=',uid<', @ANYRESDEC=r2, @ANYBLOB="2c0000be0e3742f30000000000"]) [ 420.732364][T23326] omfs: Invalid superblock (0) [ 420.751704][T23332] device team0 entered promiscuous mode [ 420.759969][T23332] device team_slave_0 entered promiscuous mode [ 420.781138][T23332] device team_slave_1 entered promiscuous mode [ 420.795142][T23332] bridge0: port 3(team0) entered blocking state [ 420.801442][T23332] bridge0: port 3(team0) entered forwarding state 09:13:01 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x7, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0)}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r1, 0x1) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0x2, &(0x7f0000000100)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3ff}], &(0x7f00000002c0)='GPL\x00', 0xffffffff, 0x1b, &(0x7f0000000300)=""/27, 0x40f00, 0x10, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000340)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x2, 0x3, 0x0, 0x10000}, 0x10, 0x11bea, r1}, 0x78) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={@map, r2, 0xc}, 0x10) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) recvmsg(r3, &(0x7f0000000ac0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/54, 0x36}, {&(0x7f0000000c00)=""/84, 0x54}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000003040)=""/77, 0x4d}], 0x4, &(0x7f0000000980)=""/22, 0x16}, 0x100) ioctl$BTRFS_IOC_SCRUB(r3, 0xc400941b, &(0x7f0000000480)={0x0, 0x6, 0xffffffff}) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x2, 0x0, 0x81, 0x4, 0x0, 0x3, 0xd988, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3bff, 0x1, @perf_bp={&(0x7f0000000040), 0x6}, 0x840, 0x7, 0x3, 0x6, 0x7fffffff, 0x9, 0x800}, 0x0, 0xb, r0, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x4) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:13:01 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x6800}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 420.861755][T23325] omfs: Invalid superblock (0) 09:13:01 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x3a, &(0x7f0000000280)={0x0, 0x7, 0x4}) sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x652000, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x2, 0x6, 0x3, 0x0, 0x0, 0x10010, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xd, 0x0, @perf_config_ext={0x5c, 0x9}, 0x21c4, 0x200, 0x0, 0x3, 0x100, 0x2, 0x6}, r0, 0x8, r1, 0x2) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)=ANY=[@ANYBLOB="ff"]) [ 420.945900][T23340] loop5: detected capacity change from 0 to 45945 [ 420.974753][T23344] loop2: detected capacity change from 0 to 264192 [ 421.086570][T23357] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 421.114317][T23357] device team0 left promiscuous mode [ 421.119786][T23357] device team_slave_0 left promiscuous mode [ 421.126114][T23356] loop0: detected capacity change from 0 to 4 09:13:01 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x4800000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 421.149472][T23357] device team_slave_1 left promiscuous mode [ 421.172651][T23344] befs: Unrecognized mount option "{Ù" or missing value 09:13:01 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x6c00}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 421.195836][T23357] bridge0: port 3(team0) entered disabled state [ 421.216016][T23344] befs: (loop2): cannot parse mount options 09:13:01 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x48000000, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 421.289619][T23365] omfs: Invalid superblock (0) [ 421.309543][T23357] team0: Cannot enslave team device to itself [ 421.318898][T23361] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 421.340471][T23361] bridge0: port 3(team0) entered blocking state 09:13:01 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0xa01, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:13:01 executing program 4: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x121000, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '-+\x00'}, 0x8) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 421.383015][T23361] bridge0: port 3(team0) entered disabled state [ 421.392686][T23372] loop1: detected capacity change from 0 to 264192 [ 421.447790][T23361] device team0 entered promiscuous mode [ 421.490120][T23381] loop2: detected capacity change from 0 to 264192 [ 421.490335][T23378] loop0: detected capacity change from 0 to 4 [ 421.558915][T23381] befs: Unrecognized mount option "{Ù" or missing value [ 421.576264][T23361] device team_slave_0 entered promiscuous mode [ 421.630780][T23381] befs: (loop2): cannot parse mount options [ 421.667976][T23361] device team_slave_1 entered promiscuous mode [ 421.704896][T23361] bridge0: port 3(team0) entered blocking state [ 421.711319][T23361] bridge0: port 3(team0) entered forwarding state [ 421.771059][T23388] loop5: detected capacity change from 0 to 45945 [ 421.843750][T23372] omfs: Invalid superblock (0) 09:13:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x41504890, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:13:02 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x7400}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:13:02 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x4c000000, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:13:02 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x4c00000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:13:02 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000000240)=ANY=[]) r2 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x6}, [{0x2, 0x4, r4}], {0x4, 0x1}, [], {}, {0x20, 0x4}}, 0x2c, 0x0) ioprio_get$uid(0x0, r4) fchown(r2, r4, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r6 = dup3(r2, r0, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r6, &(0x7f0000001d40)={&(0x7f0000001b80)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001d00)={&(0x7f0000001bc0)={0x118, 0x0, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER={0x84, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @private1, 0x10000}}, {0x14, 0x2, @in={0x2, 0x4e20, @remote}}}}, @TIPC_NLA_BEARER_NAME={0x17, 0x1, @l2={'eth', 0x3a, 'bridge_slave_0\x00'}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_NODE={0x48, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x42, 0x4, {'gcm(aes)\x00', 0x1a, "b5d5fba6dffa829a6949846596ace0ba01f1012c4c117e25729c"}}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x40000}, 0x18080) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r5, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r5, 0x1) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r7, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) mknodat$null(r1, &(0x7f0000000000)='./file0\x00', 0x8, 0x103) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r7, 0x1) ioctl$LOOP_SET_STATUS(r7, 0x4c02, &(0x7f0000001940)={0x0, {}, 0x0, {}, 0x64, 0x12, 0xa, 0x10, "eb31ceb7244b24e85ebd3d62df6b76ae5c1ce947b05000830b72e1bee4f1c7be3d2407ce2afc44663676c0938badbd9a20904f3df2385a63b81844916e8b0e9e", "e48a3425a5784c86cc5709898fc23de72d0609c4f5c14e46374f39121b7437af", [0x0, 0x1]}) getsockopt$rose(r5, 0x104, 0x6, &(0x7f00000018c0), &(0x7f0000001900)=0x4) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f0000001a00)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001a80)={&(0x7f0000001a40)={0x30, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x1000, 0x7c}}}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x4000040) [ 422.100683][T23401] loop3: detected capacity change from 0 to 264192 [ 422.139619][T23401] befs: Unrecognized mount option "{Ù" or missing value 09:13:02 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x1201, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 422.142423][T23407] loop0: detected capacity change from 0 to 4 [ 422.180268][T23401] befs: (loop3): cannot parse mount options [ 422.216612][T23411] loop2: detected capacity change from 0 to 264192 [ 422.218648][T23413] loop1: detected capacity change from 0 to 264192 09:13:02 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)=ANY=[@ANYBLOB]) 09:13:02 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x7a00}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:13:02 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3e36af3f, 0x4}}, 0x0, 0xf, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)=ANY=[@ANYBLOB='I']) 09:13:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x6c00}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 422.439802][T23411] befs: Unrecognized mount option "{Ù" or missing value [ 422.459711][T23411] befs: (loop2): cannot parse mount options [ 422.487707][T23413] omfs: Invalid superblock (0) [ 422.522487][T23418] loop5: detected capacity change from 0 to 45945 09:13:02 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x6000000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:13:02 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x60000000, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:13:02 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) [ 422.658292][T23435] loop3: detected capacity change from 0 to 4 sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)={0x1d04, r0, 0x800, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_PMSR_ATTR_PEERS={0xab4, 0x5, 0x0, 0x1, [{0x264, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x16c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x168, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x101}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xa72}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x7}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xdc}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x20}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}]}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_REQ={0xdc, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xb0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xe}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x1f}]}]}, {0x4c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_CHAN={0x24, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x30}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x2}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}]}, {0x20, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x14, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xc}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}]}]}, {0x94, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_CHAN={0x14, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x4}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x1d}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_REQ={0x64, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x5c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x101}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xb1a}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}]}, {0x224, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x220, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x138, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xe}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x15}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x9}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1ff}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xd7}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xf}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x17}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xe6}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x8c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x6}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x40}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1c}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x15}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x10}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x200}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x54, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x40}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x11}]}]}]}]}, {0x38, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x34, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xd}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x30}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x3b}]}]}, {0x40, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x3c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x20}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x4}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x16df}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xf}]}]}, {0x30, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0xc, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}]}, {0x2e0, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_REQ={0x14, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x130, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x74, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x101}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xa}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xfe}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x27}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x94, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xffc1}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_REQ={0x174, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xf8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x81}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x13}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x959}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x15}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1d}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x16}]}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}]}, {0x1a0, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x6}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x5}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x15c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x14}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x91}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x78, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x20}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x9c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xffff}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}]}]}, @NL80211_PMSR_ATTR_PEERS={0xc8c, 0x5, 0x0, 0x1, [{0x718, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x270, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x90, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xc0}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xac5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}]}, @NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x64, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6c}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x17}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xafbe}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x13c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x10}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x14}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x9}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1c}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1d}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x200}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xfff}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1e}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x9}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_REQ={0x20c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x140, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x14}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x3}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xbd}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x400}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xc4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x13}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x15}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3d8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x218, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xf8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x13}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x26}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x54}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x17}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x400}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x104, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1c}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x14}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x2d1}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x40}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x13}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x4c, 0x2, 0x0, 0x1, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x6}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x3f}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x7}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2d6}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xd}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x22}]}]}, {0x28, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x24, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8}]}]}, {0x84, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x44, 0x2, 0x0, 0x1, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x1}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2d}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x9}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x10}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x10}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x7b}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x1a}]}]}, {0x88, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x78, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1b}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}]}, {0x43c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x14, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0xd5}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_REQ={0x1e4, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0xa4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x14}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xc2}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xd4}]}, @NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x17}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x4c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x48, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xc4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x6}]}, @NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x15}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x15}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1e}]}]}]}, @NL80211_PMSR_PEER_ATTR_REQ={0xf4, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xe8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x20}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}]}, @NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x40}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xfff}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xf7}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x80}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3d9}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x98a}]}, @NL80211_PMSR_PEER_ATTR_REQ={0xdc, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xd0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x10}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xf}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_CHAN={0x3c, 0x2, 0x0, 0x1, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x2}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2f}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x16ad}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x1}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xea}]}]}]}, @NL80211_PMSR_ATTR_PEERS={0x5a8, 0x5, 0x0, 0x1, [{0x51c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x270}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x7}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x96c}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x398}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x29}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x2ac, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x78, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x6}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x10}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x84, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xeee9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xe}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x50, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xae}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1b}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x158, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x9f}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1c}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xfffd}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x1d0, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x140, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x13}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x13}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xfff8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x7}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x81}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1a}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x2}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x5}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}]}]}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x58, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}]}, {0x10, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}]}, {0x10, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}]}, {0x68, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x4c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2db}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x204}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x1}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}]}]}]}, 0x1d04}, 0x1, 0x0, 0x0, 0x10}, 0xc080) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:13:03 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x4c00000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:13:03 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x100000, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 422.765787][T23437] loop0: detected capacity change from 0 to 4 [ 422.831207][T23446] loop2: detected capacity change from 0 to 264192 09:13:03 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0xedc0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 422.886302][T23451] loop1: detected capacity change from 0 to 264192 [ 422.912865][T23446] befs: Unrecognized mount option "{Ù" or missing value [ 422.920270][T23446] befs: (loop2): cannot parse mount options 09:13:03 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='*)\',\xd4\\)-^:,\'\x00') syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 422.993705][T23455] loop3: detected capacity change from 0 to 264192 [ 423.057541][T23451] omfs: Invalid superblock (0) 09:13:03 executing program 4: writev(0xffffffffffffffff, &(0x7f0000000900)=[{&(0x7f0000000640)="ffe052372265451e52439a685ff0dd9bd4ca9a37bff25aaf30199b79aa16ce0c6660d950491aefaf381ff66dcc6878e81f3ea99d3680b707207fd9596fd5c969fb503de318db2d48952a52c3b50b13a2a7c0902725dc1238f50ada54e7051b7bb504f952f30a3290ddce43dc0dfcd32cf27469e3f44fea338d0e1dd5a602257f01b89e395a5ee90d2aed41b1ec08589216a032fdcc5d4ecde38d12382386a71b32484209160ef7170c989758db6fc2709eceb6aa0ce7f8dd2b9abb5f4c626a573a32bb1c05866743072fb5723ba2d5462eb4c8693b2740f1c957541c5b19e754a1ff199c5e18bc4edee82c842d0f5a", 0xef}, {&(0x7f00000000c0)="ab1c2aeb7ef3c5642d40bc9694", 0xd}, {&(0x7f0000000740)="241ca07f31fdb8cdc157acbdd691b58f5fdc2619f51531e714cc40b4ca2899821f288d7ee0c6becd187bcfffbcf12118b9035be9dd9d99966cf51f293409d2622ec5698aebabe7907136cba028b494c19732aa36133976de508d0d8c6f878890325402088688a406680390a1a440e1a3b9459d0c1e049209a45dc00fae1f1267b06d56eae98df368ccfcd4a97fc984cdc292f62805f211f1242e0a8cc9f19df35a8b2fde4e62b44bfc991fa7e128ca5923aecfab64eb94845b51f8f61da683e24604d6cdeb87111bca9600", 0xcb}, {&(0x7f0000000840)="9fabf6d802746c8ff85709f6796c56927ab713f9c13771f373d483f522e0b472965fcecc603350e0ba38e253bc303d1b258ed956481ba090ac964a0f0593e1cfa5b5fc4e4a0749d71cfc27f8780f87c98ac350b73f1b81697ea26d5e052fb2bd6e51cc5a99c00d936bf6970064816faab611e6566e8c859f8e925ce27f1bea87166b05064533220067645cba60c4902895e6f8b998f055667d1146b07eeb28445222c7f2475db7b7a23f7f121a5eae0aa1bbf4035f8cbc56238876", 0xbb}, {&(0x7f0000000100)="f8cd5ebc04e7ed0df10a0ccdc13bd19e137b19c2b0db6e23719b1c63b5d93a1e2f71b12d1b80674116446c8ea0e49f3a23972dc4ac17b901", 0x38}], 0x5) r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x20010, r0, 0x77c83000) r1 = syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0xb, 0x2, 0x1, 0x0, 0x0, 0x3c, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r3, 0x1) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r3, r0, r1], 0x3) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x3f, 0x8, 0x9, 0x7f, 0x0, 0xcc, 0x120, 0xb, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x4, 0x9}, 0x100, 0x7f, 0xff, 0x8, 0x101, 0x3, 0x8c}, r2, 0xd, r0, 0x8) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000240)={0x0, 0x8001, 0x1, 0x1}) [ 423.109555][T23455] omfs: Invalid superblock (0) 09:13:03 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x6800000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:13:03 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x68000000, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:13:03 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0x3, 0x12) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x81, 0xda, 0x3, 0x0, 0x800, 0x14121, 0x4, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xd9, 0x0, @perf_config_ext={0x4, 0x9}, 0x41018, 0x0, 0xca, 0x4, 0x1, 0xb7, 0x3}, 0x0, 0x10, r0, 0x1) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00cad6336958d52cbef699885bf436027f3ebe9adfe5a3a5d6"]) 09:13:03 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x6800}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 423.242140][T23472] loop0: detected capacity change from 0 to 4 [ 423.337423][T23482] loop1: detected capacity change from 0 to 264192 [ 423.345850][T23481] loop3: detected capacity change from 0 to 4 09:13:03 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0xfeff}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:13:03 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x6c00000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 423.439757][T23482] omfs: Invalid superblock (0) [ 423.568701][T23490] loop2: detected capacity change from 0 to 264192 09:13:03 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x6800}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:13:03 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0xf8, 0xfa, 0x6, 0x0, 0x1, 0x0, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x2000, 0xffffffff00000000, 0x3, 0x1, 0x2, 0xfffffffb, 0x51d6}, 0x0, 0xb, r0, 0x3) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00c1a98fe237c8ee58bef834c4ebec0ab02962a286f545c9d5e4da254adb4cc3a6ebc535f7605699951119bb1043e8371dad5668bac4dead72b5c6a421225be63eb8c6ebee42fabc5bb96e7c697f831eab831b3c4da9c38675b2e645a74744"]) chdir(&(0x7f0000000240)='./file0\x00') [ 423.741600][T23497] loop0: detected capacity change from 0 to 4 [ 423.760027][T23490] befs: Unrecognized mount option "{Ù" or missing value [ 423.809484][T23490] befs: (loop2): cannot parse mount options [ 423.868390][T23502] loop3: detected capacity change from 0 to 4 09:13:04 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x4, &(0x7f0000003800)=[{0x0, 0x2}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:13:04 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7400000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:13:04 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x6c000000, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:13:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0xff00}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:13:04 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file1/file0\x00', 0xfffffffffffffff9, 0x6, &(0x7f00000014c0)=[{&(0x7f0000000080)="954417288fa153af248c0958db488fd596dc308bde2f36c07dc0739c8782eab730e186e5785035e7c5e8c45f3f521a582595e29c5866758c80c2f32f810995dccc3f88354a4c5e0a9f60d7656e715a34", 0x50, 0xfffffffffffffffe}, {&(0x7f0000000240)="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", 0x1000, 0x5}, {&(0x7f0000001240)="d3031ea18c4ec59ac1e67cb000496412db2cf8b91862558da2538ce2f1c0925ffa35b0275a48b37fdf85ecb6adc70edfa79050f4727b0b99b72a997bd44f9432e5c16a44928673350aa2cf3b370ab2830aeff1392d3a6d2119fd7a93ff2bf85db613094c993a5a905996c372b581983a2324242d93a9504e53b3159eb47f6a6af0d30d571dfaee7d9f31bc2f3b6954401b311431a4409ab4f386785b6b9a501ba7a30b859ff971edfe37e3409e738d0608d99490cb96d8ac7e90fd1b1b2442d9cf55d737d2a213bb6d039c6334d1", 0xce, 0x3f}, {&(0x7f0000001340)="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", 0xfc, 0x3eb3cb3c}, {&(0x7f0000001440)="bc8346f71bd89b49235b457ebbdd9472c23ab4231479384a465d3f187466f5a69b4381eceb68bddadf26d1d40941656a2f4783d1d9a4a01c22f8ca167a7f98fbe7cd5d9a2bf3b78524c2191c9d353d4e38a0fb60ca192fadb3b3d2b5307febc30e7fff12dc84b8df827aa776c7014d5f4bf682ca4739294f7f4a", 0x7a, 0x7}, {&(0x7f0000000100)="be5a1443190e5e825273ddd46c8b", 0xe, 0x6}], 0xa0084, &(0x7f0000001580)={[{@huge_never='huge=never'}, {@huge_never='huge=never'}, {@gid={'gid', 0x3d, 0xee01}}], [{@dont_appraise='dont_appraise'}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@pcr={'pcr', 0x3d, 0x3a}}]}) 09:13:04 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x6800}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 424.162672][T23519] loop1: detected capacity change from 0 to 264192 [ 424.214298][T23524] loop2: detected capacity change from 0 to 264192 [ 424.221265][T23521] loop0: detected capacity change from 0 to 4 [ 424.271696][T23529] loop3: detected capacity change from 0 to 4 [ 424.290180][T23527] loop5: detected capacity change from 0 to 1 09:13:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0xff0f}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 424.459769][T23524] befs: Unrecognized mount option "{Ù" or missing value [ 424.470623][T23519] omfs: Invalid superblock (0) 09:13:04 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r1, 0x1) openat$cgroup_ro(r1, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r2, 0x1) openat$cgroup_ro(r2, &(0x7f0000000200)='io.stat\x00', 0x0, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(0xffffffffffffffff, 0xf507, 0x0) r3 = syz_mount_image$vxfs(&(0x7f0000000040)='vxfs\x00', &(0x7f0000000080)='./file1\x00', 0x7, 0x6, &(0x7f00000014c0)=[{&(0x7f00000000c0)="4ac8", 0x2, 0x5}, {&(0x7f0000000100)="4406d16980da64ef14759441700b9e5811b114a81ffb53ec824ade54581b6d5d09dd46ff5a98a5c037dc065c7e3c", 0x2e, 0x3}, {&(0x7f0000000240)="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", 0x1000, 0x1}, {&(0x7f0000001240)="82c5dff2831655c9a78f75871add539c570fc3f5b6ae0bbcf6e4c0070b1ee918f4d1434039bd7e6e43731e6c36cf525b6ea7193ecfbaf0a66a190360a458591a1e93f81ee34052bf4ba8d52ea991831397c2743685debd64c5c14bf47b7eadc6e942ef77c9b7207f7b78e82d809156927d032da471dcaafcb5d1969a85bd92dbaa72921d939573f4d57edbac98add8883e0e86ed1bad369fb4e13147d771c7c8b97c0ea656a1826e1a81dc3109998199cc0960ccc280a2b866409b735d2121b4739aea003af3f3deb060b44acf379487", 0xd0, 0xfffffffffffff9fd}, {&(0x7f0000001340)="1d14980a2ee93881831b2d102db2f18ba859af7a6e6b55d54cd1fe5828afa85a62aca9cb8c75eb9328c76503b8ffc26ed0ebfb03e4669f762ec1452cd8846f47b0ddf5d823361cac380fd86f859eb0699faeb7c0911e0a4a09abbe20137a219158a900de688f3a8a3f64f61639dfd805ba163e351541ccd4a34b9b148508", 0x7e, 0xffffffffffff0000}, {&(0x7f00000013c0)="85b00ca132cbc95d2f70d8c7f0ddb42446a1d76d50dc5bc67844a4a882602d113fa24304ab0d13b814ad1c224fa08474a8e0c8b6889fb4e9e06c9248e604492d6125632ebae77de003479c8f2cb720d08010e1d0ee6a02488fe78a93c3af6f080c8ed6a24aade93372ca1cba0ca845be2e1d5de8c73045b6a046651539ad2dab760494cad9ae9f3bdffcf2ceb343bec0165b129f354f6643cd25d60f67962446471b15d852bdbffd01c3bae67e09fa5afe5630a1561ff2f78f2531695aae4ec008f471da437fb97e6e445d1332444ccd5b", 0xd1, 0x3}], 0x1000000, &(0x7f0000001580)={[{'omfs\x00'}], [{@dont_appraise='dont_appraise'}, {@permit_directio='permit_directio'}, {@fowner_gt={'fowner>'}}, {@uid_gt={'uid>', 0xee00}}, {@smackfshat={'smackfshat', 0x3d, 'omfs\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'omfs\x00'}}, {@appraise_type='appraise_type=imasig'}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) renameat2(r0, &(0x7f0000000000)='./file1\x00', r3, &(0x7f0000001640)='.\x00', 0x4) 09:13:04 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x2000}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 424.587984][T23524] befs: (loop2): cannot parse mount options 09:13:04 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7a00000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:13:04 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x4, &(0x7f0000003800)=[{0x0, 0x3}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 424.662180][T23545] loop3: detected capacity change from 0 to 4 [ 424.692385][T23546] loop0: detected capacity change from 0 to 4 09:13:05 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x74000000, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 424.762754][T23560] loop5: detected capacity change from 0 to 1 09:13:05 executing program 3: fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000780)='trusted.overlay.redirect\x00', &(0x7f00000007c0)='\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0xc40, &(0x7f0000003800), 0x0, &(0x7f0000003900)) r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb10000000e3bd6efb440009000e000a000d000000ba8000001201", 0x27}], 0x1}, 0x50252) recvmsg(r2, &(0x7f0000000ac0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/54, 0x36}, {&(0x7f0000000c00)=""/84, 0x54}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000003040)=""/77, 0x4d}], 0x4, &(0x7f0000000980)=""/22, 0x16}, 0x100) fcntl$setpipe(r2, 0x407, 0x3) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="020000000100060000000000020104006aa4851c17ff16512ecb8b457d6bc2128b713789290e9651ebcd6f45dd5f2aa2a476f4f8cdc7a443b7d2a9dc10ced8da847adb520b3ca9b2708d160337f9cb823b50ef412a1bda3363dd39501e7520c944b5b2d532989ebcd5a319f15949c3a80b722de561be2d69edd72639402a7f9b8c0faab502f561c21eee357f3430e806f11f6ffb842d", @ANYRES32=r3, @ANYBLOB="040001000000000010000000000000002000040000000000"], 0x2c, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0xf55bb000) ioprio_get$uid(0x0, r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000740)='B-\x00') fchown(r0, r3, 0x0) syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file1\x00', 0xfffffffffffff0b8, 0x6, &(0x7f0000000580)=[{&(0x7f0000000240)="75f5ad1c15e7f5e7bf5a7e601ff90307d788e0fc6bdb38e521ebe34fdf128a7d5b91d6a6b743a823fdb3a1dcfb1503ff9e39b611524726f76109b5291f0121ff164adfb58819baa9f79bd09e469a5abba04c1926642b5785763ac335d2b191f1aaf98ed0d3599f80a8ff9c5c2b33efc7295337bc98c9bce12bfd0e52ae574b3db9b527e8b4dbc090c1a3ad5290435242941e1abe0908b9f51e9e32ea5725e66924f9ddcc1aa6978096626934f6f9494143d3b7505f0932ba637ee4ae716d0686ee6f057beb1c0a40d9fec75ccfcc01731b39", 0xd2, 0x4}, {&(0x7f0000000340)="a6f8870ff5302ac3638d5dbe7a5d26b3102b80b4b22691dbf6b583c127863b52016c5bb17d3aa7d3133a66244132097d03b89db97b3ce99abf53dabbfe61b4ef377d7b3558849bb89c179c3dd7e091f4f4f9ccb5aaa63f795a6a5d41e0ad70371b3977b6511f615babf2e2c83f54b5039a40cd2513b56d2c587db960894f95f5900e1caed60a51222d062da417a008a0c3ee852c78c08a385bd59281369d2d181b54674223560bd2ce25bd66d28697d3270fa3d37b30e76693081e5b4caabedd9cd63bacd18be84a6cfee8c726855ed965473eabdfa843cc62a10cf80775335f10ffd659196b", 0xe6, 0x2}, {&(0x7f0000000080)="a4c104bef85fede1fe0dd43c691de922fbe8151051dad22364bbf57bb8d169f7985505553ca1a390b7737f6426a397ca3f95241a", 0x34, 0x5}, {&(0x7f00000000c0)="caece1c663d2458b01cc6a1344e1808239a1a7ed7b5bd39162e47bebd818bb1bfcaecd5ed659df6e5b07268a073aeb79710f66dd4ae547fd917168c133e3e9b084f3f7cb2eec9f8ece638fd2da0dfdb1e79dcdbe1fcfd0ebccaf69eed6e62a63d975", 0x62, 0x8}, {&(0x7f0000000440)="f02e15b1dde2d902297208ddfdc2f48312cd98b7f51c1c0f018dd52a599be1b9f8507c4623f54588df77048cc9e7a188512fa4f47b46314648903816f5a25aad3b1cd5068d2b34639263131facfc999c9b1af03dd1533c5b33756697871d33fb6d2b0949e1941f7d8714c04d16d0bf1211a7b639", 0x74, 0x84}, {&(0x7f00000004c0)="bc8cc362e21e2465f8d90f39c1d923edb7f4374094c68af9db6c5d31414a2f4ad6f88d4fcf976d7a95231a1a4bebf81d36c46faf3dd819cbd0f087b48cc3f8bb34d158beb348ed4c34f5cd18d495819e3f8667e3161cba31fd4f06cecde13a7098572812261be7c4bee06508b51e52693fa0fb29140c0d81e011eb4ec20ef0284dd4a46968e42bbf80eab6b43092020a60456ef025869a4d967ef19f674ae96ef1b7ed4fc8783ef66f76866c426d829a90b6", 0xb2, 0x2}], 0x44cb2, &(0x7f0000000640)=ANY=[@ANYBLOB='%,omfs\x00,omfs\x00,seclabel,euid<', @ANYRESDEC=r3, @ANYBLOB="2c6673757569643d65326f30636631332d353307612d573365342d633430622d36316165353134332c736d61636b66736465663d6f6d6673002c736d61636b6673666c6f6f723d6f6d6673002c736d61636b66736465663d2b7b2c6d6561737572652c64576e745f61707072616973652c646f6e745f6d6561737572652c726f6f77636f6e746578743dbb6e636f6e66696e65645f752c00"]) 09:13:05 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipv6_getnetconf={0x2c, 0x52, 0x4, 0x70bd27, 0x25dfdbff, {}, [@NETCONFA_IFINDEX={0x8}, @NETCONFA_FORWARDING={0x8, 0x2, 0x7fffffff}, @NETCONFA_FORWARDING={0x8, 0x2, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40805}, 0x4) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 424.850831][T23565] loop5: detected capacity change from 0 to 1 09:13:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0xfffe}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:13:05 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x4, &(0x7f0000003800)=[{0x0, 0x4}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 424.947734][T23569] loop1: detected capacity change from 0 to 264192 09:13:05 executing program 4: perf_event_open(&(0x7f0000000140)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 425.038131][T23581] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 425.099659][T23578] loop2: detected capacity change from 0 to 264192 [ 425.173193][T23581] device team0 left promiscuous mode [ 425.239490][T23581] device team_slave_0 left promiscuous mode [ 425.240312][T23585] loop0: detected capacity change from 0 to 4 [ 425.252610][T23581] device team_slave_1 left promiscuous mode [ 425.265138][T23581] bridge0: port 3(team0) entered disabled state [ 425.278570][T23578] befs: Unrecognized mount option "{Ù" or missing value [ 425.279386][T23592] loop5: detected capacity change from 0 to 1 [ 425.287285][T23578] befs: (loop2): cannot parse mount options [ 425.337461][T23581] team0: Cannot enslave team device to itself [ 425.352653][T23569] omfs: Invalid superblock (0) 09:13:05 executing program 3: fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000780)='trusted.overlay.redirect\x00', &(0x7f00000007c0)='\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0xc40, &(0x7f0000003800), 0x0, &(0x7f0000003900)) r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb10000000e3bd6efb440009000e000a000d000000ba8000001201", 0x27}], 0x1}, 0x50252) recvmsg(r2, &(0x7f0000000ac0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/54, 0x36}, {&(0x7f0000000c00)=""/84, 0x54}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000003040)=""/77, 0x4d}], 0x4, &(0x7f0000000980)=""/22, 0x16}, 0x100) fcntl$setpipe(r2, 0x407, 0x3) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="020000000100060000000000020104006aa4851c17ff16512ecb8b457d6bc2128b713789290e9651ebcd6f45dd5f2aa2a476f4f8cdc7a443b7d2a9dc10ced8da847adb520b3ca9b2708d160337f9cb823b50ef412a1bda3363dd39501e7520c944b5b2d532989ebcd5a319f15949c3a80b722de561be2d69edd72639402a7f9b8c0faab502f561c21eee357f3430e806f11f6ffb842d", @ANYRES32=r3, @ANYBLOB="040001000000000010000000000000002000040000000000"], 0x2c, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0xf55bb000) ioprio_get$uid(0x0, r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000740)='B-\x00') fchown(r0, r3, 0x0) syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file1\x00', 0xfffffffffffff0b8, 0x6, &(0x7f0000000580)=[{&(0x7f0000000240)="75f5ad1c15e7f5e7bf5a7e601ff90307d788e0fc6bdb38e521ebe34fdf128a7d5b91d6a6b743a823fdb3a1dcfb1503ff9e39b611524726f76109b5291f0121ff164adfb58819baa9f79bd09e469a5abba04c1926642b5785763ac335d2b191f1aaf98ed0d3599f80a8ff9c5c2b33efc7295337bc98c9bce12bfd0e52ae574b3db9b527e8b4dbc090c1a3ad5290435242941e1abe0908b9f51e9e32ea5725e66924f9ddcc1aa6978096626934f6f9494143d3b7505f0932ba637ee4ae716d0686ee6f057beb1c0a40d9fec75ccfcc01731b39", 0xd2, 0x4}, {&(0x7f0000000340)="a6f8870ff5302ac3638d5dbe7a5d26b3102b80b4b22691dbf6b583c127863b52016c5bb17d3aa7d3133a66244132097d03b89db97b3ce99abf53dabbfe61b4ef377d7b3558849bb89c179c3dd7e091f4f4f9ccb5aaa63f795a6a5d41e0ad70371b3977b6511f615babf2e2c83f54b5039a40cd2513b56d2c587db960894f95f5900e1caed60a51222d062da417a008a0c3ee852c78c08a385bd59281369d2d181b54674223560bd2ce25bd66d28697d3270fa3d37b30e76693081e5b4caabedd9cd63bacd18be84a6cfee8c726855ed965473eabdfa843cc62a10cf80775335f10ffd659196b", 0xe6, 0x2}, {&(0x7f0000000080)="a4c104bef85fede1fe0dd43c691de922fbe8151051dad22364bbf57bb8d169f7985505553ca1a390b7737f6426a397ca3f95241a", 0x34, 0x5}, {&(0x7f00000000c0)="caece1c663d2458b01cc6a1344e1808239a1a7ed7b5bd39162e47bebd818bb1bfcaecd5ed659df6e5b07268a073aeb79710f66dd4ae547fd917168c133e3e9b084f3f7cb2eec9f8ece638fd2da0dfdb1e79dcdbe1fcfd0ebccaf69eed6e62a63d975", 0x62, 0x8}, {&(0x7f0000000440)="f02e15b1dde2d902297208ddfdc2f48312cd98b7f51c1c0f018dd52a599be1b9f8507c4623f54588df77048cc9e7a188512fa4f47b46314648903816f5a25aad3b1cd5068d2b34639263131facfc999c9b1af03dd1533c5b33756697871d33fb6d2b0949e1941f7d8714c04d16d0bf1211a7b639", 0x74, 0x84}, {&(0x7f00000004c0)="bc8cc362e21e2465f8d90f39c1d923edb7f4374094c68af9db6c5d31414a2f4ad6f88d4fcf976d7a95231a1a4bebf81d36c46faf3dd819cbd0f087b48cc3f8bb34d158beb348ed4c34f5cd18d495819e3f8667e3161cba31fd4f06cecde13a7098572812261be7c4bee06508b51e52693fa0fb29140c0d81e011eb4ec20ef0284dd4a46968e42bbf80eab6b43092020a60456ef025869a4d967ef19f674ae96ef1b7ed4fc8783ef66f76866c426d829a90b6", 0xb2, 0x2}], 0x44cb2, &(0x7f0000000640)=ANY=[@ANYBLOB='%,omfs\x00,omfs\x00,seclabel,euid<', @ANYRESDEC=r3, @ANYBLOB="2c6673757569643d65326f30636631332d353307612d573365342d633430622d36316165353134332c736d61636b66736465663d6f6d6673002c736d61636b6673666c6f6f723d6f6d6673002c736d61636b66736465663d2b7b2c6d6561737572652c64576e745f61707072616973652c646f6e745f6d6561737572652c726f6f77636f6e746578743dbb6e636f6e66696e65645f752c00"]) 09:13:05 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x3a, &(0x7f0000000280)={0x0, 0x7, 0x4}) sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10030212}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000320000082dbd7000ffdbdf25000000004000010010001a000b000100706f6c6963650000100014000b000500706f8269636500000c000c0008000300e4f3ffff100008000b0001006d6972726564000008000400ff7fffff1c0001000c00110008000100627066000c00140008000300010000000101020001000000000000000c0002000000000001000000"], 0x90}, 0x1, 0x0, 0x0, 0x4000800}, 0x8010) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r1, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x7f, 0x2, 0x4, 0x1f, 0x0, 0xffffffffffff0001, 0xf33c0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000000), 0xe}, 0x500, 0x80000001, 0x1ff, 0x0, 0xfff, 0x9}, r0, 0xa, r1, 0x1) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)=ANY=[@ANYBLOB="cf"]) 09:13:05 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x7a000000, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:13:05 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7fffffffffffffff, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 425.465138][T23603] loop5: detected capacity change from 0 to 1 09:13:05 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x4, &(0x7f0000003800)=[{0x0, 0x5}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:13:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x20000}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 425.627827][T23615] loop1: detected capacity change from 0 to 264192 [ 425.744301][T23619] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 425.779209][T23615] omfs: Invalid superblock (0) 09:13:06 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x802e324101000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 425.794428][T23619] team0: Cannot enslave team device to itself [ 425.864146][T23622] loop3: detected capacity change from 0 to 264192 [ 425.877479][T23625] loop0: detected capacity change from 0 to 4 [ 425.894750][T23621] loop2: detected capacity change from 0 to 264192 [ 425.954170][T23621] befs: Unrecognized mount option "{Ù" or missing value [ 425.985054][T23621] befs: (loop2): cannot parse mount options [ 425.998262][T23629] loop5: detected capacity change from 0 to 1 09:13:06 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x4, 0x8, 0x81, 0x6, 0x0, 0x3ff, 0x102b0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x81, 0x4, @perf_bp={&(0x7f0000000040)}, 0x8080, 0x200, 0x8, 0x0, 0x0, 0x1ff, 0xffe1}, 0x0, 0x4, r0, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r1, 0x1) write$P9_RREADLINK(r1, &(0x7f0000000000)={0x10, 0x17, 0x1, {0x7, './file1'}}, 0x10) [ 426.114417][T23636] loop1: detected capacity change from 0 to 264192 09:13:06 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x8cffffff, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:13:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x80000}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 426.220687][T23641] loop5: detected capacity change from 0 to 1 [ 426.303505][T23636] omfs: Invalid superblock (0) 09:13:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x23, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000003100)={0x0, 0x70, 0x7, 0x2, 0x1, 0x0, 0x0, 0x40, 0x40, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000030c0), 0xe}, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x8, 0x2}, 0x0, 0xb, r0, 0x1) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f0000000680)={{}, {0x100}, 0x10, 0x0, 0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)="9a170f2bdfa922bfddd58f705b6d649eb1c725308a9f9680f8ca18055a0283fcb585d441f4f3865bc2b3a9ad2c7d563a48380e7e2f6579d61d7a47f04d4d94ae8ed400cc0bf539c1022d61ff0ebbf25a51ff95a6517924fd3ed8c3ff4b18b6d30fd704d1e36a3dcdfec91537e2b82b7f5b19b4c93baccce54c4210e49b0dcfd5c5a4acedb7edeb2bf5fa5ae381c10415ed", 0x91, 0x0, &(0x7f0000000540)={0x2, 0xb6, {0x1, 0xc, 0x95, "f991d75fd95ff5f7bbda8c241f508e5b2a96980b7afce6d6435b03ca6d8ed29e997f83ffdaa0a00949b6d244b3c7582c9bcec3d183912bde72c7453f3da94c3f78164c4d7b02223199993a5c326e6637f69dcf7dcde76c2123f22e867e883295d725200e0d52b9314cda67eae05f905303595cd3b2b771c27551f11d7adf9f9b9a633414c7fc0e5777c392285b1c5b58f6d0377b98", 0x14, "9b64ca05c3c00ff3420278b5e924a7ec8ee7b720"}, 0x53, "a20d82b60b5dad5522bebcae621fbe87b01f3ed7f6225dee599bea7e793bbfafedb3a0b32250c6f0c37089b0f45940eae1c4a10213dc94e1ed163aacb5a792647efbc36ed4d2aecf2326b5f92e6fc649287488"}, 0x115}) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000800)={0x0, &(0x7f0000000700)=""/251}) umount2(0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x8001, 0x4, &(0x7f0000000300)=[{&(0x7f0000000140)="752a97e7e37d8433cdcdad183c418008f9e97bd213488530020002d2c9d7cd0e7a8ab58b82221293659083a6a2abfa5549cb63bb7ededa4764f8242a43716c863ad87291eb490087ff3351a78e3cdb5ba8d4cffd5fece40df7f64caff436066643309fcb66edd96490bbc91a3f9e1370fe391839e9c536167652f2a5fd8f423fb9c501454c65e7eba422b934", 0x8c, 0x115}, {&(0x7f0000000200)="afaf8e2ffc498aaa008a", 0xa, 0x6}, {&(0x7f0000000240)="eb2a59dd9e2281217cffc587177dcc275d133c3e8a258ee7a8a8e950cda76919fb1f981d88b45ca05e47664dad6ed4937d553c2d4186b9c1c0139b", 0x3b, 0x7}, {&(0x7f0000000280)="26f37ed54a8225187e2fcd7f60042536b491a8be1de6312336138853192e6f3f81d37ea57f8f17794f529d34cb868bd008c7dbd79bc95f96e9a9136fd36e20a94562cf32e6bd25", 0x47}], 0x1256012, &(0x7f0000000380)={[], [{@permit_directio='permit_directio'}, {@hash='hash'}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, ']&-'}}, {@dont_appraise='dont_appraise'}, {@dont_measure='dont_measure'}]}) 09:13:06 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x4, &(0x7f0000003800)=[{0x0, 0x6}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:13:06 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x8803000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:13:06 executing program 4: ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000100)={0x7, &(0x7f0000000000)=""/200, &(0x7f0000001780)=[{0x1, 0x41, 0x8000, &(0x7f0000000240)=""/65}, {0x8, 0x1000, 0x0, &(0x7f00000002c0)=""/4096}, {0xb3, 0xd1, 0x40, &(0x7f00000012c0)=""/209}, {0x2, 0xd1, 0x8, &(0x7f00000013c0)=""/209}, {0x10001, 0xc8, 0x11, &(0x7f00000014c0)=""/200}, {0x8, 0xeb, 0x7, &(0x7f00000015c0)=""/235}, {0x5, 0x83, 0x2, &(0x7f00000016c0)=""/131}]}) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 426.480147][T23656] loop2: detected capacity change from 0 to 264192 [ 426.558741][T23661] loop0: detected capacity change from 0 to 4 [ 426.658631][T23656] befs: Unrecognized mount option "{Ù" or missing value [ 426.724632][T23672] loop1: detected capacity change from 0 to 264192 [ 426.751413][T23656] befs: (loop2): cannot parse mount options 09:13:07 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 426.781083][T23670] loop3: detected capacity change from 0 to 64 [ 426.803121][T23676] loop5: detected capacity change from 0 to 1 [ 426.830001][T23672] omfs: Invalid superblock (0) 09:13:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x400000}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:13:07 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="747e3078adfa40e9"]) 09:13:07 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x90485041, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:13:07 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='./file0\x00') umount2(0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000600)='./file0\x00', 0x100, 0x702, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x6}, [{0x2, 0x4, r5}], {0x4, 0x1}, [], {}, {0x20, 0x4}}, 0x2c, 0x0) ioprio_get$uid(0x0, r5) fchown(r3, r5, 0x0) syz_mount_image$tmpfs(&(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='./file0\x00', 0x3, 0x4, &(0x7f0000000580)=[{&(0x7f00000002c0)="ebfe0b9be2636642947ccb0014780678ac1d59e373c9fb94a401e017526d6e8b7a40cf3a1288710bdb3109a4e957861254fb286c7e3c1e2c0baa59eb55f079a96be891515b61405e59a9dcadabd22e8758564657f1ee1163f59affea5d219106c0220bb8c9485c0e3f57200a142fec", 0x6f, 0x5}, {&(0x7f0000000340)="57e42e674a8f78574f136a5ae272a8a92bac5d01f9d6a6b3ca6d036b31e63d3ac7d32a3b2a9ba426981bd1e9f5bd8ede9cbeb1384293d0d18103d2b78b6296e47015c9a5618d7a182cb3769fcc110e25096dfd5b6cef3cf9ea1ff489ecc2e919757172543a009b5cd5c70a3ab5457b37f1fb9a4f05fae810658654cd20bcf215c7eee0965dafd06c86d138352c37837479b42da993ab3ff5381f82d7105467b5fdb80ca8205ee34d49df59fb8cf2af9d3adff58b30f7aa85d006a8fe9968f2986cc709e2198326b6d94159faddc5582cf95238b75de1efaf3472a014f3dc7618", 0xe0, 0xf0}, {&(0x7f0000000440)="6ba53ee4903a4cd168707129c8526169f16b91033a3d7683ef1050d81f87abe121cb130d9f224825b96014ce95ab1a6eb142fd151cfbe851995eb2bffa0db9c96b7ee92897ee357b684947824fd6eb55b5efb49a12018df5d047360a116a3d7c4986d30c6c51063daaac18a5bef1b5aa57a0560f95ccb2dc6337aaa09a33e99a332a1a33a635ea5d94a6bd445b4a7a34afbc383dc53a13935ae319869f02b77ae23bd64b086a52a2b3d67bfe5b602dd8e6ac0f33389ea0a0058b25e69cc3b5ff86b84198658baede56d08e4abe6d21", 0xcf, 0x2}, {&(0x7f0000000540), 0x0, 0x1ff}], 0x4, &(0x7f0000002780)={[{@gid={'gid', 0x3d, r1}}, {@huge_never='huge=never'}, {@huge_within_size='huge=within_size'}, {@nr_inodes={'nr_inodes', 0x3d, [0x31, 0x65, 0x30, 0x78]}}], [{@dont_appraise='dont_appraise'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, r0}}, {@subj_user={'subj_user', 0x3d, '\\:.@\xc4&'}}, {@euid_eq={'euid', 0x3d, r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ocfs2_dlmfs\x00'}}, {@uid_lt={'uid<', r0}}, {@fowner_eq={'fowner', 0x3d, r5}}, {@euid_eq={'euid', 0x3d, r0}}]}) 09:13:07 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x8cffffff00000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:13:07 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)=ANY=[@ANYBLOB="02"]) [ 426.960287][T23686] loop5: detected capacity change from 0 to 1 09:13:07 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x4, &(0x7f0000003800)=[{0x0, 0x7}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 427.074252][T23698] loop0: detected capacity change from 0 to 4 09:13:07 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x4105, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 427.201867][T23700] loop3: detected capacity change from 0 to 1 [ 427.203390][T23704] loop2: detected capacity change from 0 to 264192 [ 427.213559][T23707] loop1: detected capacity change from 0 to 264192 [ 427.315418][T23700] tmpfs: Bad value for 'nr_inodes' [ 427.333988][T23714] loop5: detected capacity change from 0 to 1 09:13:07 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)=ANY=[@ANYBLOB="02"]) [ 427.364917][T23704] befs: Unrecognized mount option "{Ù" or missing value [ 427.372855][T23704] befs: (loop2): cannot parse mount options 09:13:07 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x97ffffff, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:13:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x1000000}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 427.623948][T23707] omfs: Invalid superblock (0) 09:13:07 executing program 4: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x89482, 0x0) tee(0xffffffffffffffff, r0, 0x1f, 0x4) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:13:07 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x4, &(0x7f0000003800)=[{0x0, 0x8}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:13:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xa926000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 427.800256][T23732] loop0: detected capacity change from 0 to 4 [ 427.808592][T23735] loop5: detected capacity change from 0 to 1 [ 427.829972][T23737] loop2: detected capacity change from 0 to 264192 09:13:08 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:13:08 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x2000000}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 427.927523][T23737] befs: Unrecognized mount option "{Ù" or missing value [ 427.952191][T23747] loop5: detected capacity change from 0 to 1 09:13:08 executing program 4: getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 427.990584][T23737] befs: (loop2): cannot parse mount options 09:13:08 executing program 3: openat$fb1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb1\x00', 0x40000, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, 0x0) r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @default}, [@rose, @default, @bcast, @rose, @remote, @remote, @bcast]}, &(0x7f0000000140)=0x48) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FBIOBLANK(r1, 0x4611, 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) ftruncate(r0, 0x7) umount2(0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x10201, 0x82) [ 428.070151][T23754] loop1: detected capacity change from 0 to 264192 [ 428.122744][T23758] loop0: detected capacity change from 0 to 4 09:13:08 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0xc0ed0000, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:13:08 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x4, &(0x7f0000003800)=[{0x0, 0x10}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:13:08 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x3000000}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:13:08 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xbc030000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:13:08 executing program 3: ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='veth1_virt_wifi\x00'}) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000180)={0x0, 0x8}, &(0x7f00000001c0)=0x8) rename(&(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='./file0\x00') r2 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x6}, [{0x2, 0x4, r4}], {0x4, 0x1}, [], {}, {0x20, 0x4}}, 0x2c, 0x0) ioprio_get$uid(0x0, r4) fchown(r2, r4, 0x0) mount$overlay(0x0, &(0x7f0000000300)='./file2\x00', &(0x7f0000000340)='overlay\x00', 0x1010, &(0x7f0000000380)={[{@xino_off='xino=off'}, {@workdir={'workdir', 0x3d, './file1'}}, {@index_off='index=off'}, {@xino_off='xino=off'}, {@metacopy_on='metacopy=on'}, {@xino_off='xino=off'}, {@xino_auto='xino=auto'}, {@xino_on='xino=on'}], [{@fowner_gt={'fowner>', r4}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) open(&(0x7f0000000440)='./file2\x00', 0xa000, 0x149) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000200)={r1, 0x20, 0x676, 0x100, 0x3}, &(0x7f0000000240)=0x14) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) umount2(0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x1) [ 428.326660][T23754] omfs: Invalid superblock (0) 09:13:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xad26000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:13:08 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xb7030000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 428.441641][T23775] loop2: detected capacity change from 0 to 264192 [ 428.450228][T23779] loop5: detected capacity change from 0 to 1 [ 428.477950][T23781] loop0: detected capacity change from 0 to 4 09:13:08 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x4, &(0x7f0000003800)=[{0x0, 0x48}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 428.573964][T23775] befs: Unrecognized mount option "{Ù" or missing value [ 428.581674][T23775] befs: (loop2): cannot parse mount options [ 428.602292][T23790] loop5: detected capacity change from 0 to 1 [ 428.658245][T23794] loop1: detected capacity change from 0 to 264192 09:13:09 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x1800000000000000, &(0x7f0000003900)) [ 428.757113][T23794] omfs: Invalid superblock (0) 09:13:09 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x4000000}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:13:09 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x300000000000000, &(0x7f0000003900)) 09:13:09 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0xf6ffffff, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:13:09 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xb703000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 428.854303][T23803] loop5: detected capacity change from 0 to 1 09:13:09 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0xfffffdfc, &(0x7f0000003900)) [ 428.936610][T23812] loop2: detected capacity change from 0 to 264192 [ 428.964451][T23816] loop1: detected capacity change from 0 to 264192 [ 428.985410][T23820] loop5: detected capacity change from 0 to 1 [ 429.052050][T23823] loop0: detected capacity change from 0 to 4 [ 429.052340][T23812] befs: Unrecognized mount option "{Ù" or missing value [ 429.067681][T23812] befs: (loop2): cannot parse mount options 09:13:09 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x5000000}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:13:09 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x4, &(0x7f0000003800)=[{0x0, 0x4c}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:13:09 executing program 3: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfdffffff, 0x4, &(0x7f0000003800)=[{0x0}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 429.210086][T23816] omfs: Invalid superblock (0) 09:13:09 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0xf9fdffff, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:13:09 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xb803000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:13:09 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0xfffffff6, 0x401}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 429.388266][T23844] loop5: detected capacity change from 0 to 1 [ 429.402743][T23843] loop0: detected capacity change from 0 to 4 [ 429.411722][T23847] loop3: detected capacity change from 0 to 264192 [ 429.452843][T23848] loop2: detected capacity change from 0 to 264192 [ 429.452930][T23852] loop1: detected capacity change from 0 to 264192 09:13:09 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f0000003800), 0x5, &(0x7f0000003900)) [ 429.497250][T23860] loop5: detected capacity change from 0 to 1 [ 429.517547][T23848] befs: Unrecognized mount option "{Ù" or missing value [ 429.525265][T23848] befs: (loop2): cannot parse mount options [ 429.577103][T23852] omfs: Invalid superblock (0) 09:13:09 executing program 4 (fault-call:2 fault-nth:0): syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfsd\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 09:13:09 executing program 3 (fault-call:3 fault-nth:0): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000005540)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, r1, 0xc09, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x4a}, @val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'syzkaller0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x58}}, 0x0) 09:13:09 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0xfcfdffff, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:13:09 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x4, &(0x7f0000003800)=[{0x0, 0x68}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:13:09 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xb903000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:13:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x6000000}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:13:10 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfsd\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 429.793347][T23876] loop2: detected capacity change from 0 to 264192 [ 429.842779][T23878] loop5: detected capacity change from 0 to 1 [ 429.847599][T23883] FAULT_INJECTION: forcing a failure. [ 429.847599][T23883] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 429.890983][T23876] befs: Unrecognized mount option "{Ù" or missing value [ 429.899692][T23886] loop1: detected capacity change from 0 to 264192 [ 429.944509][T23883] CPU: 0 PID: 23883 Comm: syz-executor.3 Not tainted 5.12.0-rc7-syzkaller #0 [ 429.953375][T23883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 429.963428][T23883] Call Trace: [ 429.963695][T23876] befs: (loop2): cannot parse mount options [ 429.966703][T23883] dump_stack+0x141/0x1d7 [ 429.966736][T23883] should_fail.cold+0x5/0xa [ 429.966764][T23883] _copy_from_user+0x2c/0x180 [ 429.966790][T23883] __copy_msghdr_from_user+0x91/0x4b0 [ 429.991443][T23883] ? __ia32_sys_shutdown+0x70/0x70 [ 429.996563][T23883] ? mark_lock+0xef/0x17b0 [ 430.000987][T23883] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 430.006991][T23883] sendmsg_copy_msghdr+0xa1/0x160 [ 430.012023][T23883] ? do_recvmmsg+0x6d0/0x6d0 [ 430.016629][T23883] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 430.022622][T23883] ? _parse_integer+0x132/0x180 [ 430.027492][T23883] ___sys_sendmsg+0xc6/0x170 [ 430.032093][T23883] ? sendmsg_copy_msghdr+0x160/0x160 [ 430.036166][T23891] loop5: detected capacity change from 0 to 1 [ 430.037381][T23883] ? __fget_files+0x266/0x3d0 [ 430.037409][T23883] ? lock_downgrade+0x6e0/0x6e0 [ 430.037445][T23883] ? __fget_files+0x288/0x3d0 [ 430.045442][T23895] loop0: detected capacity change from 0 to 4 [ 430.048152][T23883] ? __fget_light+0xea/0x280 [ 430.048180][T23883] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 430.048211][T23883] __sys_sendmsg+0xe5/0x1b0 [ 430.062776][T23886] omfs: Invalid superblock (0) [ 430.063733][T23883] ? __sys_sendmsg_sock+0x30/0x30 [ 430.063771][T23883] ? syscall_enter_from_user_mode+0x27/0x70 [ 430.063803][T23883] do_syscall_64+0x2d/0x70 [ 430.063828][T23883] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 430.105186][T23883] RIP: 0033:0x466459 [ 430.109082][T23883] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 430.128685][T23883] RSP: 002b:00007f3769288188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 430.137156][T23883] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 430.145547][T23883] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 430.153508][T23883] RBP: 00007f37692881d0 R08: 0000000000000000 R09: 0000000000000000 [ 430.161465][T23883] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 430.169417][T23883] R13: 00007ffff7144b4f R14: 00007f3769288300 R15: 0000000000022000 09:13:10 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfsd\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 09:13:10 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xba03000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:13:10 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x4, &(0x7f0000003800)=[{0x0, 0x6c}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:13:10 executing program 3 (fault-call:3 fault-nth:1): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000005540)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, r1, 0xc09, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x4a}, @val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'syzkaller0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x58}}, 0x0) 09:13:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x7000000}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:13:10 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0xfdfdffff, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 430.371314][T23907] loop5: detected capacity change from 0 to 1 [ 430.395143][T23908] loop1: detected capacity change from 0 to 264192 [ 430.419938][T23910] loop0: detected capacity change from 0 to 4 [ 430.442156][T23908] omfs: Invalid superblock (0) [ 430.447828][T23917] FAULT_INJECTION: forcing a failure. [ 430.447828][T23917] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 430.473511][T23917] CPU: 1 PID: 23917 Comm: syz-executor.3 Not tainted 5.12.0-rc7-syzkaller #0 [ 430.482280][T23917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.492333][T23917] Call Trace: [ 430.495611][T23917] dump_stack+0x141/0x1d7 [ 430.499956][T23917] should_fail.cold+0x5/0xa [ 430.504471][T23917] _copy_from_user+0x2c/0x180 [ 430.509166][T23917] iovec_from_user+0x242/0x3c0 [ 430.513940][T23917] __import_iovec+0x65/0x500 [ 430.518539][T23917] import_iovec+0x10c/0x150 [ 430.523027][T23917] sendmsg_copy_msghdr+0x12d/0x160 [ 430.528124][T23917] ? do_recvmmsg+0x6d0/0x6d0 [ 430.532698][T23917] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 430.538664][T23917] ? _parse_integer+0x132/0x180 [ 430.543519][T23917] ___sys_sendmsg+0xc6/0x170 [ 430.548102][T23917] ? sendmsg_copy_msghdr+0x160/0x160 [ 430.553389][T23917] ? __fget_files+0x266/0x3d0 [ 430.558070][T23917] ? lock_downgrade+0x6e0/0x6e0 [ 430.562924][T23917] ? __fget_files+0x288/0x3d0 [ 430.567594][T23917] ? __fget_light+0xea/0x280 [ 430.572177][T23917] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 430.578412][T23917] __sys_sendmsg+0xe5/0x1b0 [ 430.582902][T23917] ? __sys_sendmsg_sock+0x30/0x30 [ 430.587926][T23917] ? syscall_enter_from_user_mode+0x27/0x70 [ 430.593814][T23917] do_syscall_64+0x2d/0x70 [ 430.598227][T23917] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 430.604116][T23917] RIP: 0033:0x466459 [ 430.607998][T23917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 430.627593][T23917] RSP: 002b:00007f3769288188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 09:13:10 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfsd\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) [ 430.635998][T23917] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 430.643957][T23917] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 430.651944][T23917] RBP: 00007f37692881d0 R08: 0000000000000000 R09: 0000000000000000 [ 430.659909][T23917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 430.667871][T23917] R13: 00007ffff7144b4f R14: 00007f3769288300 R15: 0000000000022000 09:13:11 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xbb03000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 430.740885][T23922] loop2: detected capacity change from 0 to 264192 09:13:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x8000000}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:13:11 executing program 3 (fault-call:3 fault-nth:2): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000005540)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, r1, 0xc09, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x4a}, @val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'syzkaller0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x58}}, 0x0) [ 430.821441][T23922] befs: Unrecognized mount option "{Ù" or missing value [ 430.823452][T23929] loop5: detected capacity change from 0 to 1 [ 430.833453][T23922] befs: (loop2): cannot parse mount options 09:13:11 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfsd\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x4) [ 430.880590][T23940] FAULT_INJECTION: forcing a failure. [ 430.880590][T23940] name failslab, interval 1, probability 0, space 0, times 0 [ 430.893574][T23940] CPU: 1 PID: 23940 Comm: syz-executor.3 Not tainted 5.12.0-rc7-syzkaller #0 [ 430.902342][T23940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.912402][T23940] Call Trace: [ 430.915396][T23935] loop1: detected capacity change from 0 to 264192 [ 430.915677][T23940] dump_stack+0x141/0x1d7 [ 430.915711][T23940] should_fail.cold+0x5/0xa [ 430.930969][T23940] should_failslab+0x5/0x10 [ 430.935469][T23940] kmem_cache_alloc_node+0x64/0x3b0 [ 430.940656][T23940] ? __alloc_skb+0x20b/0x340 [ 430.945241][T23940] __alloc_skb+0x20b/0x340 [ 430.949654][T23940] netlink_sendmsg+0x94f/0xd90 [ 430.954414][T23940] ? netlink_unicast+0x7d0/0x7d0 [ 430.959350][T23940] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 430.965613][T23940] ? netlink_unicast+0x7d0/0x7d0 [ 430.970631][T23940] sock_sendmsg+0xcf/0x120 [ 430.975041][T23940] ____sys_sendmsg+0x6e8/0x810 [ 430.979799][T23940] ? kernel_sendmsg+0x50/0x50 [ 430.984468][T23940] ? do_recvmmsg+0x6d0/0x6d0 [ 430.989050][T23940] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 430.995024][T23940] ? _parse_integer+0x132/0x180 [ 430.999874][T23940] ___sys_sendmsg+0xf3/0x170 [ 431.004458][T23940] ? sendmsg_copy_msghdr+0x160/0x160 [ 431.009737][T23940] ? __fget_files+0x266/0x3d0 [ 431.014403][T23940] ? lock_downgrade+0x6e0/0x6e0 [ 431.019253][T23940] ? __fget_files+0x288/0x3d0 [ 431.023923][T23940] ? __fget_light+0xea/0x280 [ 431.028513][T23940] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 431.034753][T23940] __sys_sendmsg+0xe5/0x1b0 [ 431.039246][T23940] ? __sys_sendmsg_sock+0x30/0x30 [ 431.044271][T23940] ? syscall_enter_from_user_mode+0x27/0x70 [ 431.050182][T23940] do_syscall_64+0x2d/0x70 [ 431.054597][T23940] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 431.060483][T23940] RIP: 0033:0x466459 [ 431.064368][T23940] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 431.083968][T23940] RSP: 002b:00007f3769288188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 431.092378][T23940] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 431.100336][T23940] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 431.108318][T23940] RBP: 00007f37692881d0 R08: 0000000000000000 R09: 0000000000000000 [ 431.116280][T23940] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 09:13:11 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0xfdffffff, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 431.124241][T23940] R13: 00007ffff7144b4f R14: 00007f3769288300 R15: 0000000000022000 09:13:11 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x4, &(0x7f0000003800)=[{0x0, 0x74}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:13:11 executing program 3 (fault-call:3 fault-nth:3): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000005540)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, r1, 0xc09, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x4a}, @val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'syzkaller0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x58}}, 0x0) [ 431.258981][T23944] loop0: detected capacity change from 0 to 4 [ 431.280162][T23935] omfs: Invalid superblock (0) [ 431.322085][T23951] FAULT_INJECTION: forcing a failure. [ 431.322085][T23951] name failslab, interval 1, probability 0, space 0, times 0 [ 431.335236][T23951] CPU: 1 PID: 23951 Comm: syz-executor.3 Not tainted 5.12.0-rc7-syzkaller #0 [ 431.344006][T23951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.354061][T23951] Call Trace: [ 431.357341][T23951] dump_stack+0x141/0x1d7 [ 431.361692][T23951] should_fail.cold+0x5/0xa [ 431.366205][T23951] ? netlink_sendmsg+0x94f/0xd90 [ 431.371138][T23951] should_failslab+0x5/0x10 [ 431.375636][T23951] __kmalloc_node_track_caller+0x73/0x320 [ 431.381350][T23951] ? __alloc_skb+0x20b/0x340 [ 431.385944][T23951] __alloc_skb+0xde/0x340 [ 431.390271][T23951] netlink_sendmsg+0x94f/0xd90 [ 431.395029][T23951] ? netlink_unicast+0x7d0/0x7d0 [ 431.399961][T23951] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 431.406201][T23951] ? netlink_unicast+0x7d0/0x7d0 [ 431.411133][T23951] sock_sendmsg+0xcf/0x120 [ 431.415545][T23951] ____sys_sendmsg+0x6e8/0x810 [ 431.420307][T23951] ? kernel_sendmsg+0x50/0x50 [ 431.424977][T23951] ? do_recvmmsg+0x6d0/0x6d0 [ 431.429565][T23951] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 431.435539][T23951] ? _parse_integer+0x132/0x180 [ 431.440394][T23951] ___sys_sendmsg+0xf3/0x170 [ 431.444973][T23951] ? sendmsg_copy_msghdr+0x160/0x160 [ 431.450254][T23951] ? __fget_files+0x266/0x3d0 [ 431.454926][T23951] ? lock_downgrade+0x6e0/0x6e0 [ 431.459777][T23951] ? __fget_files+0x288/0x3d0 [ 431.464448][T23951] ? __fget_light+0xea/0x280 [ 431.469029][T23951] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 431.475265][T23951] __sys_sendmsg+0xe5/0x1b0 [ 431.479759][T23951] ? __sys_sendmsg_sock+0x30/0x30 [ 431.484784][T23951] ? syscall_enter_from_user_mode+0x27/0x70 [ 431.490676][T23951] do_syscall_64+0x2d/0x70 [ 431.495086][T23951] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 431.500985][T23951] RIP: 0033:0x466459 [ 431.504869][T23951] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 431.524468][T23951] RSP: 002b:00007f3769288188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 431.532872][T23951] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 431.540832][T23951] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 431.548809][T23951] RBP: 00007f37692881d0 R08: 0000000000000000 R09: 0000000000000000 [ 431.556770][T23951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 431.564728][T23951] R13: 00007ffff7144b4f R14: 00007f3769288300 R15: 0000000000022000 09:13:11 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xbc03000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 431.598425][T23953] loop2: detected capacity change from 0 to 264192 09:13:11 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfsd\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x5) [ 431.646573][T23954] loop5: detected capacity change from 0 to 1 09:13:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0xa000000}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:13:12 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0xfeffffff, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 431.688794][T23953] befs: Unrecognized mount option "{Ù" or missing value [ 431.722009][T23953] befs: (loop2): cannot parse mount options [ 431.777099][T23964] loop1: detected capacity change from 0 to 264192 [ 431.815409][T23964] omfs: Invalid superblock (0) 09:13:12 executing program 3 (fault-call:3 fault-nth:4): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000005540)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, r1, 0xc09, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x4a}, @val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'syzkaller0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x58}}, 0x0) [ 431.823197][T23967] loop5: detected capacity change from 0 to 1 [ 431.846882][T23971] loop0: detected capacity change from 0 to 4 [ 431.911880][T23983] FAULT_INJECTION: forcing a failure. [ 431.911880][T23983] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 431.926987][T23983] CPU: 1 PID: 23983 Comm: syz-executor.3 Not tainted 5.12.0-rc7-syzkaller #0 [ 431.935851][T23983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.945909][T23983] Call Trace: [ 431.949189][T23983] dump_stack+0x141/0x1d7 [ 431.953534][T23983] should_fail.cold+0x5/0xa [ 431.958052][T23983] _copy_from_iter_full+0x1fa/0x8a0 [ 431.963274][T23983] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 431.969529][T23983] ? __phys_addr_symbol+0x2c/0x70 [ 431.974563][T23983] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 431.980292][T23983] ? __check_object_size+0x171/0x3f0 [ 431.985592][T23983] netlink_sendmsg+0x7c2/0xd90 [ 431.990374][T23983] ? netlink_unicast+0x7d0/0x7d0 [ 431.995325][T23983] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 432.001585][T23983] ? netlink_unicast+0x7d0/0x7d0 [ 432.006527][T23983] sock_sendmsg+0xcf/0x120 [ 432.010965][T23983] ____sys_sendmsg+0x6e8/0x810 [ 432.015743][T23983] ? kernel_sendmsg+0x50/0x50 [ 432.020426][T23983] ? do_recvmmsg+0x6d0/0x6d0 [ 432.025013][T23983] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 432.030989][T23983] ? _parse_integer+0x132/0x180 [ 432.035841][T23983] ___sys_sendmsg+0xf3/0x170 [ 432.040425][T23983] ? sendmsg_copy_msghdr+0x160/0x160 [ 432.045706][T23983] ? __fget_files+0x266/0x3d0 [ 432.050402][T23983] ? lock_downgrade+0x6e0/0x6e0 [ 432.055258][T23983] ? __fget_files+0x288/0x3d0 [ 432.059935][T23983] ? __fget_light+0xea/0x280 [ 432.064519][T23983] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 432.070760][T23983] __sys_sendmsg+0xe5/0x1b0 [ 432.075255][T23983] ? __sys_sendmsg_sock+0x30/0x30 [ 432.080307][T23983] ? syscall_enter_from_user_mode+0x27/0x70 [ 432.086201][T23983] do_syscall_64+0x2d/0x70 [ 432.090614][T23983] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 432.096505][T23983] RIP: 0033:0x466459 [ 432.100410][T23983] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 432.120011][T23983] RSP: 002b:00007f3769288188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 432.128425][T23983] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 432.136392][T23983] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 432.144355][T23983] RBP: 00007f37692881d0 R08: 0000000000000000 R09: 0000000000000000 [ 432.152321][T23983] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 09:13:12 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xbd03000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:13:12 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x4, &(0x7f0000003800)=[{0x0, 0x7a}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:13:12 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfsd\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x6) [ 432.160308][T23983] R13: 00007ffff7144b4f R14: 00007f3769288300 R15: 0000000000022000 09:13:12 executing program 3 (fault-call:3 fault-nth:5): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000005540)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, r1, 0xc09, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x4a}, @val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'syzkaller0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x58}}, 0x0) 09:13:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x10000000}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 432.288059][T23978] loop2: detected capacity change from 0 to 264192 [ 432.314181][T23989] loop5: detected capacity change from 0 to 1 [ 432.364974][T23994] FAULT_INJECTION: forcing a failure. [ 432.364974][T23994] name failslab, interval 1, probability 0, space 0, times 0 [ 432.374895][T23978] befs: Unrecognized mount option "{Ù" or missing value [ 432.385074][T23978] befs: (loop2): cannot parse mount options [ 432.393269][T23994] CPU: 0 PID: 23994 Comm: syz-executor.3 Not tainted 5.12.0-rc7-syzkaller #0 [ 432.402055][T23994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.405242][T23998] loop1: detected capacity change from 0 to 264192 [ 432.412111][T23994] Call Trace: [ 432.412131][T23994] dump_stack+0x141/0x1d7 [ 432.412164][T23994] should_fail.cold+0x5/0xa [ 432.412192][T23994] ? skb_clone+0x170/0x3c0 [ 432.412212][T23994] should_failslab+0x5/0x10 [ 432.412235][T23994] kmem_cache_alloc+0x5e/0x370 [ 432.412260][T23994] skb_clone+0x170/0x3c0 [ 432.448653][T23994] netlink_deliver_tap+0x990/0xb70 [ 432.453791][T23994] netlink_unicast+0x5e5/0x7d0 [ 432.458574][T23994] ? netlink_attachskb+0x870/0x870 [ 432.463697][T23994] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 432.469951][T23994] ? __phys_addr_symbol+0x2c/0x70 [ 432.474991][T23994] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 432.480722][T23994] ? __check_object_size+0x171/0x3f0 [ 432.486030][T23994] netlink_sendmsg+0x856/0xd90 [ 432.487599][T23998] omfs: Invalid superblock (0) [ 432.490809][T23994] ? netlink_unicast+0x7d0/0x7d0 [ 432.490842][T23994] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 432.490878][T23994] ? netlink_unicast+0x7d0/0x7d0 [ 432.490901][T23994] sock_sendmsg+0xcf/0x120 [ 432.490928][T23994] ____sys_sendmsg+0x6e8/0x810 [ 432.520894][T23994] ? kernel_sendmsg+0x50/0x50 [ 432.525587][T23994] ? do_recvmmsg+0x6d0/0x6d0 [ 432.530196][T23994] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 432.536191][T23994] ? _parse_integer+0x132/0x180 [ 432.541063][T23994] ___sys_sendmsg+0xf3/0x170 [ 432.545681][T23994] ? sendmsg_copy_msghdr+0x160/0x160 [ 432.550981][T23994] ? __fget_files+0x266/0x3d0 [ 432.555672][T23994] ? lock_downgrade+0x6e0/0x6e0 [ 432.560553][T23994] ? __fget_files+0x288/0x3d0 09:13:12 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfsd\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x7) 09:13:12 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xbe03000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 432.565250][T23994] ? __fget_light+0xea/0x280 [ 432.569852][T23994] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 432.576120][T23994] __sys_sendmsg+0xe5/0x1b0 [ 432.580633][T23994] ? __sys_sendmsg_sock+0x30/0x30 [ 432.585677][T23994] ? syscall_enter_from_user_mode+0x27/0x70 [ 432.591587][T23994] do_syscall_64+0x2d/0x70 [ 432.596018][T23994] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 432.601926][T23994] RIP: 0033:0x466459 [ 432.605829][T23994] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 432.625446][T23994] RSP: 002b:00007f3769288188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 432.634245][T23994] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 432.642413][T23994] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 432.650581][T23994] RBP: 00007f37692881d0 R08: 0000000000000000 R09: 0000000000000000 [ 432.658539][T23994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 432.666500][T23994] R13: 00007ffff7144b4f R14: 00007f3769288300 R15: 0000000000022000 09:13:13 executing program 3 (fault-call:3 fault-nth:6): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000005540)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, r1, 0xc09, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x4a}, @val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'syzkaller0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x58}}, 0x0) 09:13:13 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0xff000000, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 432.765985][T24004] loop0: detected capacity change from 0 to 4 [ 432.833652][T24029] FAULT_INJECTION: forcing a failure. [ 432.833652][T24029] name failslab, interval 1, probability 0, space 0, times 0 09:13:13 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x4, &(0x7f0000003800)=[{0x0, 0xfe}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 432.913455][T24030] loop1: detected capacity change from 0 to 264192 [ 432.927954][T24029] CPU: 1 PID: 24029 Comm: syz-executor.3 Not tainted 5.12.0-rc7-syzkaller #0 [ 432.936917][T24029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.946968][T24029] Call Trace: [ 432.950239][T24029] dump_stack+0x141/0x1d7 [ 432.954658][T24029] should_fail.cold+0x5/0xa [ 432.959164][T24029] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xd7/0x290 [ 432.966441][T24029] should_failslab+0x5/0x10 [ 432.970942][T24029] __kmalloc+0x72/0x310 [ 432.975089][T24029] ? lockdep_hardirqs_on+0x79/0x100 [ 432.980285][T24029] genl_family_rcv_msg_attrs_parse.constprop.0+0xd7/0x290 [ 432.987395][T24029] genl_family_rcv_msg_doit+0xda/0x320 [ 432.992850][T24029] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x290/0x290 [ 433.000215][T24029] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 433.006455][T24029] ? apparmor_capable+0x1d8/0x460 [ 433.011478][T24029] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 433.017719][T24029] ? security_capable+0x8f/0xc0 [ 433.022576][T24029] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 433.028817][T24029] ? ns_capable+0xde/0x100 [ 433.033233][T24029] genl_rcv_msg+0x328/0x580 [ 433.037908][T24029] ? genl_get_cmd+0x480/0x480 [ 433.042584][T24029] ? cfg80211_tdls_oper_request+0x780/0x780 [ 433.048475][T24029] ? lock_release+0x720/0x720 [ 433.053147][T24029] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 433.058431][T24029] netlink_rcv_skb+0x153/0x420 [ 433.063190][T24029] ? genl_get_cmd+0x480/0x480 [ 433.067863][T24029] ? netlink_ack+0xaa0/0xaa0 [ 433.072460][T24029] genl_rcv+0x24/0x40 [ 433.076431][T24029] netlink_unicast+0x533/0x7d0 [ 433.081195][T24029] ? netlink_attachskb+0x870/0x870 [ 433.086301][T24029] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 433.092538][T24029] ? __phys_addr_symbol+0x2c/0x70 [ 433.097557][T24029] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 433.103270][T24029] ? __check_object_size+0x171/0x3f0 [ 433.108560][T24029] netlink_sendmsg+0x856/0xd90 [ 433.113323][T24029] ? netlink_unicast+0x7d0/0x7d0 [ 433.118291][T24029] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 433.124532][T24029] ? netlink_unicast+0x7d0/0x7d0 [ 433.129467][T24029] sock_sendmsg+0xcf/0x120 [ 433.133881][T24029] ____sys_sendmsg+0x6e8/0x810 [ 433.138642][T24029] ? kernel_sendmsg+0x50/0x50 [ 433.143315][T24029] ? do_recvmmsg+0x6d0/0x6d0 [ 433.147904][T24029] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 433.153881][T24029] ? _parse_integer+0x132/0x180 [ 433.158736][T24029] ___sys_sendmsg+0xf3/0x170 [ 433.163318][T24029] ? sendmsg_copy_msghdr+0x160/0x160 [ 433.168599][T24029] ? __fget_files+0x266/0x3d0 [ 433.173270][T24029] ? lock_downgrade+0x6e0/0x6e0 [ 433.178123][T24029] ? __fget_files+0x288/0x3d0 [ 433.182797][T24029] ? __fget_light+0xea/0x280 [ 433.187382][T24029] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 433.193623][T24029] __sys_sendmsg+0xe5/0x1b0 [ 433.198119][T24029] ? __sys_sendmsg_sock+0x30/0x30 [ 433.203149][T24029] ? syscall_enter_from_user_mode+0x27/0x70 [ 433.209041][T24029] do_syscall_64+0x2d/0x70 [ 433.213454][T24029] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 433.219343][T24029] RIP: 0033:0x466459 [ 433.223235][T24029] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 433.242836][T24029] RSP: 002b:00007f3769288188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 433.251243][T24029] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 09:13:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x20000000}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 433.259205][T24029] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 433.267172][T24029] RBP: 00007f37692881d0 R08: 0000000000000000 R09: 0000000000000000 [ 433.275134][T24029] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 433.283096][T24029] R13: 00007ffff7144b4f R14: 00007f3769288300 R15: 0000000000022000 09:13:13 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfsd\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x8) 09:13:13 executing program 3 (fault-call:3 fault-nth:7): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000005540)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, r1, 0xc09, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x4a}, @val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'syzkaller0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x58}}, 0x0) [ 433.351290][T24030] omfs: Invalid superblock (0) [ 433.366950][T24034] loop2: detected capacity change from 0 to 264192 [ 433.406141][T24040] loop5: detected capacity change from 0 to 1 09:13:13 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xbf03000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 433.474566][T24047] FAULT_INJECTION: forcing a failure. [ 433.474566][T24047] name failslab, interval 1, probability 0, space 0, times 0 [ 433.488316][T24047] CPU: 1 PID: 24047 Comm: syz-executor.3 Not tainted 5.12.0-rc7-syzkaller #0 [ 433.497093][T24047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.507156][T24047] Call Trace: [ 433.510440][T24047] dump_stack+0x141/0x1d7 [ 433.514789][T24047] should_fail.cold+0x5/0xa [ 433.519308][T24047] should_failslab+0x5/0x10 [ 433.523830][T24047] kmem_cache_alloc_node+0x64/0x3b0 [ 433.529038][T24047] ? __alloc_skb+0x20b/0x340 [ 433.531025][T24034] befs: Unrecognized mount option "{Ù" or missing value [ 433.533642][T24047] __alloc_skb+0x20b/0x340 [ 433.533713][T24047] nl80211_new_interface+0x41e/0x1100 [ 433.550385][T24047] ? cfg80211_tdls_oper_request+0x780/0x780 [ 433.556297][T24047] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 433.562559][T24047] ? nl80211_pre_doit+0xa6/0x5c0 [ 433.567527][T24047] genl_family_rcv_msg_doit+0x228/0x320 [ 433.573076][T24047] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x290/0x290 [ 433.580443][T24047] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 433.586695][T24047] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 433.592935][T24047] ? ns_capable+0xde/0x100 [ 433.597383][T24047] genl_rcv_msg+0x328/0x580 [ 433.601886][T24047] ? genl_get_cmd+0x480/0x480 [ 433.606559][T24047] ? cfg80211_tdls_oper_request+0x780/0x780 [ 433.612451][T24047] ? lock_release+0x720/0x720 [ 433.617126][T24047] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 433.622416][T24047] netlink_rcv_skb+0x153/0x420 [ 433.627206][T24047] ? genl_get_cmd+0x480/0x480 [ 433.631884][T24047] ? netlink_ack+0xaa0/0xaa0 [ 433.636479][T24047] genl_rcv+0x24/0x40 [ 433.640454][T24047] netlink_unicast+0x533/0x7d0 [ 433.645217][T24047] ? netlink_attachskb+0x870/0x870 [ 433.650324][T24047] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 433.656567][T24047] ? __phys_addr_symbol+0x2c/0x70 [ 433.661594][T24047] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 433.667312][T24047] ? __check_object_size+0x171/0x3f0 [ 433.672610][T24047] netlink_sendmsg+0x856/0xd90 [ 433.677377][T24047] ? netlink_unicast+0x7d0/0x7d0 [ 433.682340][T24047] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 433.688608][T24047] ? netlink_unicast+0x7d0/0x7d0 [ 433.693540][T24047] sock_sendmsg+0xcf/0x120 [ 433.697955][T24047] ____sys_sendmsg+0x6e8/0x810 [ 433.702723][T24047] ? kernel_sendmsg+0x50/0x50 [ 433.707393][T24047] ? do_recvmmsg+0x6d0/0x6d0 [ 433.711980][T24047] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 433.717956][T24047] ? _parse_integer+0x132/0x180 [ 433.722811][T24047] ___sys_sendmsg+0xf3/0x170 [ 433.727397][T24047] ? sendmsg_copy_msghdr+0x160/0x160 [ 433.732678][T24047] ? __fget_files+0x266/0x3d0 [ 433.737351][T24047] ? lock_downgrade+0x6e0/0x6e0 [ 433.742237][T24047] ? __fget_files+0x288/0x3d0 [ 433.746913][T24047] ? __fget_light+0xea/0x280 [ 433.751499][T24047] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 433.757740][T24047] __sys_sendmsg+0xe5/0x1b0 [ 433.762237][T24047] ? __sys_sendmsg_sock+0x30/0x30 [ 433.767264][T24047] ? syscall_enter_from_user_mode+0x27/0x70 [ 433.773159][T24047] do_syscall_64+0x2d/0x70 [ 433.777574][T24047] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 433.783466][T24047] RIP: 0033:0x466459 [ 433.787544][T24047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 433.807161][T24047] RSP: 002b:00007f3769288188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 433.815574][T24047] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 09:13:13 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x4, &(0x7f0000003800)=[{0x0, 0x300}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) [ 433.823537][T24047] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 433.831503][T24047] RBP: 00007f37692881d0 R08: 0000000000000000 R09: 0000000000000000 [ 433.839468][T24047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 433.847435][T24047] R13: 00007ffff7144b4f R14: 00007f3769288300 R15: 0000000000022000 [ 433.884229][T24049] loop0: detected capacity change from 0 to 4 [ 433.888566][T24034] befs: (loop2): cannot parse mount options 09:13:14 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfsd\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x300) 09:13:14 executing program 3 (fault-call:3 fault-nth:8): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000005540)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, r1, 0xc09, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x4a}, @val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'syzkaller0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x58}}, 0x0) 09:13:14 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffdf9, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 433.973860][T24056] loop1: detected capacity change from 0 to 264192 09:13:14 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x20100000}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 434.061291][T24056] omfs: Invalid superblock (0) 09:13:14 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xc003000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 434.110570][T24064] loop5: detected capacity change from 0 to 1 [ 434.117120][T24067] FAULT_INJECTION: forcing a failure. [ 434.117120][T24067] name failslab, interval 1, probability 0, space 0, times 0 [ 434.169668][T24067] CPU: 0 PID: 24067 Comm: syz-executor.3 Not tainted 5.12.0-rc7-syzkaller #0 [ 434.179161][T24067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.189224][T24067] Call Trace: [ 434.192508][T24067] dump_stack+0x141/0x1d7 [ 434.196861][T24067] should_fail.cold+0x5/0xa [ 434.201383][T24067] ? nl80211_new_interface+0x41e/0x1100 [ 434.206941][T24067] should_failslab+0x5/0x10 [ 434.211462][T24067] __kmalloc_node_track_caller+0x73/0x320 [ 434.217193][T24067] ? __alloc_skb+0x20b/0x340 [ 434.221802][T24067] __alloc_skb+0xde/0x340 [ 434.226148][T24067] nl80211_new_interface+0x41e/0x1100 [ 434.231539][T24067] ? cfg80211_tdls_oper_request+0x780/0x780 [ 434.237448][T24067] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 434.243703][T24067] ? nl80211_pre_doit+0xa6/0x5c0 [ 434.248654][T24067] genl_family_rcv_msg_doit+0x228/0x320 [ 434.254214][T24067] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x290/0x290 [ 434.261599][T24067] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 434.267862][T24067] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 434.274116][T24067] ? ns_capable+0xde/0x100 [ 434.278549][T24067] genl_rcv_msg+0x328/0x580 [ 434.283154][T24067] ? genl_get_cmd+0x480/0x480 [ 434.287839][T24067] ? cfg80211_tdls_oper_request+0x780/0x780 [ 434.293750][T24067] ? lock_release+0x720/0x720 [ 434.298439][T24067] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 434.303743][T24067] netlink_rcv_skb+0x153/0x420 [ 434.308607][T24067] ? genl_get_cmd+0x480/0x480 [ 434.313295][T24067] ? netlink_ack+0xaa0/0xaa0 [ 434.317911][T24067] genl_rcv+0x24/0x40 [ 434.321905][T24067] netlink_unicast+0x533/0x7d0 [ 434.326687][T24067] ? netlink_attachskb+0x870/0x870 [ 434.331809][T24067] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 434.338068][T24067] ? __phys_addr_symbol+0x2c/0x70 [ 434.343110][T24067] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 434.348845][T24067] ? __check_object_size+0x171/0x3f0 [ 434.354149][T24067] netlink_sendmsg+0x856/0xd90 [ 434.359099][T24067] ? netlink_unicast+0x7d0/0x7d0 [ 434.364039][T24067] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 434.370280][T24067] ? netlink_unicast+0x7d0/0x7d0 [ 434.375209][T24067] sock_sendmsg+0xcf/0x120 [ 434.379710][T24067] ____sys_sendmsg+0x6e8/0x810 [ 434.384473][T24067] ? kernel_sendmsg+0x50/0x50 [ 434.389147][T24067] ? do_recvmmsg+0x6d0/0x6d0 [ 434.393732][T24067] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 434.399708][T24067] ? _parse_integer+0x132/0x180 [ 434.404559][T24067] ___sys_sendmsg+0xf3/0x170 [ 434.409144][T24067] ? sendmsg_copy_msghdr+0x160/0x160 [ 434.414428][T24067] ? __fget_files+0x266/0x3d0 [ 434.419099][T24067] ? lock_downgrade+0x6e0/0x6e0 [ 434.423955][T24067] ? __fget_files+0x288/0x3d0 [ 434.428634][T24067] ? __fget_light+0xea/0x280 [ 434.433221][T24067] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 434.439460][T24067] __sys_sendmsg+0xe5/0x1b0 [ 434.443959][T24067] ? __sys_sendmsg_sock+0x30/0x30 [ 434.449171][T24067] ? syscall_enter_from_user_mode+0x27/0x70 [ 434.455073][T24067] do_syscall_64+0x2d/0x70 [ 434.459490][T24067] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 434.465553][T24067] RIP: 0033:0x466459 [ 434.469529][T24067] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 434.489304][T24067] RSP: 002b:00007f3769288188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 434.497710][T24067] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 434.505675][T24067] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 434.513639][T24067] RBP: 00007f37692881d0 R08: 0000000000000000 R09: 0000000000000000 09:13:14 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffdfc, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:13:14 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xc103000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:13:14 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfsd\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x500) [ 434.521602][T24067] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 434.529562][T24067] R13: 00007ffff7144b4f R14: 00007f3769288300 R15: 0000000000022000 [ 434.544487][T24070] loop0: detected capacity change from 0 to 4 09:13:14 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xc203000000000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:13:14 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x3f000000}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:13:14 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x4, &(0x7f0000003800)=[{0x0, 0x500}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:13:15 executing program 3 (fault-call:3 fault-nth:9): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000005540)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, r1, 0xc09, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x4a}, @val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'syzkaller0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x58}}, 0x0) [ 434.736247][T24089] loop2: detected capacity change from 0 to 264192 [ 434.761973][T24089] befs: Unrecognized mount option "{Ù" or missing value [ 434.872217][T24089] befs: (loop2): cannot parse mount options [ 434.926544][T24101] loop5: detected capacity change from 0 to 1 [ 434.935036][T24103] FAULT_INJECTION: forcing a failure. [ 434.935036][T24103] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 434.957151][T24103] CPU: 0 PID: 24103 Comm: syz-executor.3 Not tainted 5.12.0-rc7-syzkaller #0 [ 434.966134][T24103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.976198][T24103] Call Trace: [ 434.979484][T24103] dump_stack+0x141/0x1d7 [ 434.981292][T24104] loop1: detected capacity change from 0 to 264192 [ 434.983831][T24103] should_fail.cold+0x5/0xa [ 434.983862][T24103] __alloc_pages_nodemask+0x189/0x730 [ 434.983887][T24103] ? do_raw_spin_lock+0x120/0x2b0 [ 434.983915][T24103] ? __alloc_pages_slowpath.constprop.0+0x2270/0x2270 [ 434.983937][T24103] ? rwlock_bug.part.0+0x90/0x90 [ 435.016925][T24103] ? mark_lock+0xef/0x17b0 [ 435.021365][T24103] ? _raw_spin_unlock+0x24/0x40 [ 435.026228][T24103] ? get_partial_node.part.0+0x24c/0x300 [ 435.031867][T24103] kmalloc_large_node+0x62/0x130 [ 435.036828][T24103] __kmalloc_node+0x2e1/0x350 [ 435.041525][T24103] kvmalloc_node+0xb4/0xf0 [ 435.045961][T24103] alloc_netdev_mqs+0x97/0xeb0 [ 435.050738][T24103] ? ieee80211_monitor_select_queue+0x220/0x220 [ 435.056997][T24103] ieee80211_if_add+0x1c6/0x18f0 [ 435.061941][T24103] ? ieee80211_monitor_select_queue+0x220/0x220 [ 435.068192][T24103] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 435.074433][T24103] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 435.080760][T24103] ieee80211_add_iface+0x99/0x160 [ 435.085782][T24103] ? ieee80211_rfkill_poll+0xb0/0xb0 [ 435.091074][T24103] nl80211_new_interface+0x541/0x1100 [ 435.096457][T24103] ? cfg80211_tdls_oper_request+0x780/0x780 [ 435.102352][T24103] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 435.108599][T24103] ? nl80211_pre_doit+0xa6/0x5c0 [ 435.113536][T24103] genl_family_rcv_msg_doit+0x228/0x320 [ 435.119081][T24103] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x290/0x290 [ 435.126463][T24103] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 435.132712][T24103] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 435.138981][T24103] ? ns_capable+0xde/0x100 [ 435.143401][T24103] genl_rcv_msg+0x328/0x580 [ 435.147903][T24103] ? genl_get_cmd+0x480/0x480 [ 435.152605][T24103] ? cfg80211_tdls_oper_request+0x780/0x780 [ 435.158498][T24103] ? lock_release+0x720/0x720 [ 435.163172][T24103] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 435.168462][T24103] netlink_rcv_skb+0x153/0x420 [ 435.173221][T24103] ? genl_get_cmd+0x480/0x480 [ 435.177894][T24103] ? netlink_ack+0xaa0/0xaa0 [ 435.182491][T24103] genl_rcv+0x24/0x40 [ 435.186467][T24103] netlink_unicast+0x533/0x7d0 [ 435.191228][T24103] ? netlink_attachskb+0x870/0x870 [ 435.196510][T24103] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 435.202749][T24103] ? __phys_addr_symbol+0x2c/0x70 [ 435.207771][T24103] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 435.213489][T24103] ? __check_object_size+0x171/0x3f0 [ 435.218777][T24103] netlink_sendmsg+0x856/0xd90 [ 435.223541][T24103] ? netlink_unicast+0x7d0/0x7d0 [ 435.228739][T24103] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 435.234983][T24103] ? netlink_unicast+0x7d0/0x7d0 [ 435.239913][T24103] sock_sendmsg+0xcf/0x120 [ 435.244332][T24103] ____sys_sendmsg+0x6e8/0x810 [ 435.249139][T24103] ? kernel_sendmsg+0x50/0x50 [ 435.253811][T24103] ? do_recvmmsg+0x6d0/0x6d0 [ 435.258403][T24103] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 435.264383][T24103] ? _parse_integer+0x132/0x180 [ 435.269236][T24103] ___sys_sendmsg+0xf3/0x170 [ 435.273820][T24103] ? sendmsg_copy_msghdr+0x160/0x160 [ 435.279117][T24103] ? __fget_files+0x266/0x3d0 [ 435.283794][T24103] ? lock_downgrade+0x6e0/0x6e0 [ 435.288653][T24103] ? __fget_files+0x288/0x3d0 [ 435.293331][T24103] ? __fget_light+0xea/0x280 [ 435.297920][T24103] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 435.304189][T24103] __sys_sendmsg+0xe5/0x1b0 [ 435.308688][T24103] ? __sys_sendmsg_sock+0x30/0x30 [ 435.313715][T24103] ? syscall_enter_from_user_mode+0x27/0x70 [ 435.319610][T24103] do_syscall_64+0x2d/0x70 [ 435.324025][T24103] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 435.329918][T24103] RIP: 0033:0x466459 [ 435.333807][T24103] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 435.353412][T24103] RSP: 002b:00007f3769288188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 435.361821][T24103] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 435.369788][T24103] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 09:13:15 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfsd\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x600) [ 435.377753][T24103] RBP: 00007f37692881d0 R08: 0000000000000000 R09: 0000000000000000 [ 435.385717][T24103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 435.393681][T24103] R13: 00007ffff7144b4f R14: 00007f3769288300 R15: 0000000000022000 [ 435.416907][T24105] loop0: detected capacity change from 0 to 4 09:13:15 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffdfd, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:13:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x41504890}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 435.494528][T24112] loop5: detected capacity change from 0 to 1 [ 435.502633][T24104] omfs: Invalid superblock (0) 09:13:15 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x4, &(0x7f0000003800)=[{0x0, 0x600}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:13:15 executing program 3 (fault-call:3 fault-nth:10): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000005540)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, r1, 0xc09, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x4a}, @val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'syzkaller0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x58}}, 0x0) 09:13:15 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xc2993d8700000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:13:15 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfsd\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x700) [ 435.746678][T24135] loop0: detected capacity change from 0 to 4 [ 435.753082][T24142] FAULT_INJECTION: forcing a failure. [ 435.753082][T24142] name failslab, interval 1, probability 0, space 0, times 0 [ 435.753193][T24136] loop2: detected capacity change from 0 to 264192 [ 435.777296][T24142] CPU: 0 PID: 24142 Comm: syz-executor.3 Not tainted 5.12.0-rc7-syzkaller #0 [ 435.786078][T24142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.786708][T24141] loop5: detected capacity change from 0 to 1 [ 435.796131][T24142] Call Trace: [ 435.796142][T24142] dump_stack+0x141/0x1d7 [ 435.796176][T24142] should_fail.cold+0x5/0xa [ 435.814310][T24142] ? __hw_addr_create_ex+0x5b/0x310 [ 435.819611][T24142] should_failslab+0x5/0x10 [ 435.824129][T24142] kmem_cache_alloc_trace+0x55/0x2a0 [ 435.829435][T24142] __hw_addr_create_ex+0x5b/0x310 [ 435.831424][T24136] befs: Unrecognized mount option "{Ù" or missing value [ 435.834474][T24142] __hw_addr_add_ex+0x1ed/0x2b0 [ 435.834508][T24142] dev_addr_init+0x10b/0x1f0 [ 435.834535][T24142] ? __hw_addr_unsync_dev+0x190/0x190 [ 435.846054][T24136] befs: (loop2): cannot parse mount options [ 435.846413][T24142] alloc_netdev_mqs+0x13d/0xeb0 [ 435.867149][T24142] ? ieee80211_monitor_select_queue+0x220/0x220 [ 435.873406][T24142] ieee80211_if_add+0x1c6/0x18f0 [ 435.878359][T24142] ? ieee80211_monitor_select_queue+0x220/0x220 [ 435.884617][T24142] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 435.890870][T24142] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 09:13:16 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfsd\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x1f00) [ 435.897130][T24142] ieee80211_add_iface+0x99/0x160 [ 435.902172][T24142] ? ieee80211_rfkill_poll+0xb0/0xb0 [ 435.907479][T24142] nl80211_new_interface+0x541/0x1100 [ 435.912869][T24142] ? cfg80211_tdls_oper_request+0x780/0x780 [ 435.918776][T24142] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 435.925028][T24142] ? nl80211_pre_doit+0xa6/0x5c0 [ 435.929978][T24142] genl_family_rcv_msg_doit+0x228/0x320 [ 435.935542][T24142] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x290/0x290 [ 435.942925][T24142] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 435.949181][T24142] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 435.955411][T24142] ? ns_capable+0xde/0x100 [ 435.959826][T24142] genl_rcv_msg+0x328/0x580 [ 435.964322][T24142] ? genl_get_cmd+0x480/0x480 [ 435.968997][T24142] ? cfg80211_tdls_oper_request+0x780/0x780 [ 435.974882][T24142] ? lock_release+0x720/0x720 [ 435.979546][T24142] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 435.984824][T24142] netlink_rcv_skb+0x153/0x420 [ 435.989584][T24142] ? genl_get_cmd+0x480/0x480 [ 435.994248][T24142] ? netlink_ack+0xaa0/0xaa0 [ 435.998835][T24142] genl_rcv+0x24/0x40 [ 436.002894][T24142] netlink_unicast+0x533/0x7d0 [ 436.007665][T24142] ? netlink_attachskb+0x870/0x870 [ 436.012851][T24142] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 436.019084][T24142] ? __phys_addr_symbol+0x2c/0x70 [ 436.024100][T24142] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 436.029815][T24142] ? __check_object_size+0x171/0x3f0 [ 436.035312][T24142] netlink_sendmsg+0x856/0xd90 [ 436.040085][T24142] ? netlink_unicast+0x7d0/0x7d0 [ 436.045189][T24142] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 436.051424][T24142] ? netlink_unicast+0x7d0/0x7d0 [ 436.056353][T24142] sock_sendmsg+0xcf/0x120 [ 436.060786][T24142] ____sys_sendmsg+0x6e8/0x810 [ 436.065550][T24142] ? kernel_sendmsg+0x50/0x50 [ 436.070235][T24142] ? do_recvmmsg+0x6d0/0x6d0 [ 436.074818][T24142] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 436.080789][T24142] ? _parse_integer+0x132/0x180 [ 436.085975][T24142] ___sys_sendmsg+0xf3/0x170 [ 436.090564][T24142] ? sendmsg_copy_msghdr+0x160/0x160 [ 436.095838][T24142] ? __fget_files+0x266/0x3d0 [ 436.100514][T24142] ? lock_downgrade+0x6e0/0x6e0 [ 436.105538][T24142] ? __fget_files+0x288/0x3d0 [ 436.110208][T24142] ? __fget_light+0xea/0x280 [ 436.114793][T24142] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 436.121027][T24142] __sys_sendmsg+0xe5/0x1b0 [ 436.125672][T24142] ? __sys_sendmsg_sock+0x30/0x30 [ 436.130696][T24142] ? syscall_enter_from_user_mode+0x27/0x70 [ 436.136761][T24142] do_syscall_64+0x2d/0x70 [ 436.141171][T24142] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 436.147057][T24142] RIP: 0033:0x466459 [ 436.150941][T24142] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 436.170690][T24142] RSP: 002b:00007f3769288188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 436.179096][T24142] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 436.187065][T24142] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 09:13:16 executing program 3 (fault-call:3 fault-nth:11): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000005540)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, r1, 0xc09, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x4a}, @val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'syzkaller0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x58}}, 0x0) [ 436.195022][T24142] RBP: 00007f37692881d0 R08: 0000000000000000 R09: 0000000000000000 [ 436.202978][T24142] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 436.210946][T24142] R13: 00007ffff7144b4f R14: 00007f3769288300 R15: 0000000000022000 [ 436.306514][T24144] loop1: detected capacity change from 0 to 264192 09:13:16 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0xffffff7f, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:13:16 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x48000000}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 436.371516][T24162] FAULT_INJECTION: forcing a failure. [ 436.371516][T24162] name failslab, interval 1, probability 0, space 0, times 0 [ 436.392347][T24157] loop5: detected capacity change from 0 to 1 [ 436.399010][T24162] CPU: 0 PID: 24162 Comm: syz-executor.3 Not tainted 5.12.0-rc7-syzkaller #0 [ 436.407784][T24162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.417846][T24162] Call Trace: [ 436.421143][T24162] dump_stack+0x141/0x1d7 [ 436.425491][T24162] should_fail.cold+0x5/0xa [ 436.430012][T24162] should_failslab+0x5/0x10 [ 436.434528][T24162] __kmalloc_node+0x79/0x350 [ 436.439125][T24162] ? kvmalloc_node+0x61/0xf0 [ 436.443733][T24162] kvmalloc_node+0x61/0xf0 [ 436.448165][T24162] alloc_netdev_mqs+0x776/0xeb0 [ 436.453034][T24162] ieee80211_if_add+0x1c6/0x18f0 [ 436.458160][T24162] ? ieee80211_monitor_select_queue+0x220/0x220 [ 436.464418][T24162] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 436.470669][T24162] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 436.476927][T24162] ieee80211_add_iface+0x99/0x160 [ 436.481967][T24162] ? ieee80211_rfkill_poll+0xb0/0xb0 [ 436.487282][T24162] nl80211_new_interface+0x541/0x1100 [ 436.492670][T24162] ? cfg80211_tdls_oper_request+0x780/0x780 [ 436.498584][T24162] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 436.504842][T24162] ? nl80211_pre_doit+0xa6/0x5c0 [ 436.509791][T24162] genl_family_rcv_msg_doit+0x228/0x320 [ 436.515344][T24162] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x290/0x290 [ 436.522729][T24162] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 436.528997][T24162] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 436.535388][T24162] ? ns_capable+0xde/0x100 [ 436.539820][T24162] genl_rcv_msg+0x328/0x580 [ 436.544337][T24162] ? genl_get_cmd+0x480/0x480 [ 436.549023][T24162] ? cfg80211_tdls_oper_request+0x780/0x780 [ 436.554934][T24162] ? lock_release+0x720/0x720 [ 436.559631][T24162] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 436.564932][T24162] netlink_rcv_skb+0x153/0x420 [ 436.569702][T24162] ? genl_get_cmd+0x480/0x480 [ 436.574394][T24162] ? netlink_ack+0xaa0/0xaa0 [ 436.579013][T24162] genl_rcv+0x24/0x40 [ 436.583010][T24162] netlink_unicast+0x533/0x7d0 [ 436.587789][T24162] ? netlink_attachskb+0x870/0x870 [ 436.592911][T24162] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 436.599163][T24162] ? __phys_addr_symbol+0x2c/0x70 [ 436.604200][T24162] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 436.609932][T24162] ? __check_object_size+0x171/0x3f0 [ 436.615243][T24162] netlink_sendmsg+0x856/0xd90 [ 436.620024][T24162] ? netlink_unicast+0x7d0/0x7d0 [ 436.624978][T24162] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 436.631243][T24162] ? netlink_unicast+0x7d0/0x7d0 [ 436.636373][T24162] sock_sendmsg+0xcf/0x120 [ 436.640802][T24162] ____sys_sendmsg+0x6e8/0x810 [ 436.645576][T24162] ? kernel_sendmsg+0x50/0x50 [ 436.650265][T24162] ? do_recvmmsg+0x6d0/0x6d0 [ 436.654869][T24162] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 436.660860][T24162] ? _parse_integer+0x132/0x180 [ 436.665743][T24162] ___sys_sendmsg+0xf3/0x170 [ 436.670353][T24162] ? sendmsg_copy_msghdr+0x160/0x160 [ 436.675653][T24162] ? __fget_files+0x266/0x3d0 [ 436.680344][T24162] ? lock_downgrade+0x6e0/0x6e0 [ 436.685224][T24162] ? __fget_files+0x288/0x3d0 [ 436.689917][T24162] ? __fget_light+0xea/0x280 [ 436.694515][T24162] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 436.700773][T24162] __sys_sendmsg+0xe5/0x1b0 [ 436.705285][T24162] ? __sys_sendmsg_sock+0x30/0x30 [ 436.710336][T24162] ? syscall_enter_from_user_mode+0x27/0x70 [ 436.716507][T24162] do_syscall_64+0x2d/0x70 [ 436.720935][T24162] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 436.726843][T24162] RIP: 0033:0x466459 [ 436.730753][T24162] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 436.750369][T24162] RSP: 002b:00007f3769288188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 436.758789][T24162] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 436.766765][T24162] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 436.774739][T24162] RBP: 00007f37692881d0 R08: 0000000000000000 R09: 0000000000000000 [ 436.782717][T24162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 436.790694][T24162] R13: 00007ffff7144b4f R14: 00007f3769288300 R15: 0000000000022000 [ 436.805385][T24144] omfs: Invalid superblock (0) 09:13:17 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xf5ffffff00000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:13:17 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfsd\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3f00) [ 436.971528][T24169] loop2: detected capacity change from 0 to 264192 [ 436.980793][T24171] loop0: detected capacity change from 0 to 4 09:13:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x4c000000}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:13:17 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x4, &(0x7f0000003800)=[{0x0, 0x700}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:13:17 executing program 3 (fault-call:3 fault-nth:12): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000005540)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, r1, 0xc09, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x4a}, @val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'syzkaller0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x58}}, 0x0) [ 437.096718][T24169] befs: Unrecognized mount option "{Ù" or missing value [ 437.186391][T24169] befs: (loop2): cannot parse mount options [ 437.187422][T24180] loop1: detected capacity change from 0 to 264192 09:13:17 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0xffffff8c, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 437.338929][T24180] omfs: Invalid superblock (0) [ 437.361619][T24187] loop5: detected capacity change from 0 to 1 [ 437.368244][T24191] loop0: detected capacity change from 0 to 4 [ 437.380689][T24192] FAULT_INJECTION: forcing a failure. [ 437.380689][T24192] name failslab, interval 1, probability 0, space 0, times 0 09:13:17 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfsd\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xff00) 09:13:17 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xf6ffffff00000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 437.448127][T24196] loop2: detected capacity change from 0 to 264192 [ 437.509825][T24192] CPU: 1 PID: 24192 Comm: syz-executor.3 Not tainted 5.12.0-rc7-syzkaller #0 [ 437.518625][T24192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.524537][T24196] befs: Unrecognized mount option "{Ù" or missing value [ 437.528679][T24192] Call Trace: [ 437.528688][T24192] dump_stack+0x141/0x1d7 [ 437.528722][T24192] should_fail.cold+0x5/0xa [ 437.528749][T24192] should_failslab+0x5/0x10 [ 437.535854][T24196] befs: (loop2): cannot parse mount options [ 437.538919][T24192] __kmalloc_node+0x79/0x350 [ 437.538942][T24192] ? kvmalloc_node+0x61/0xf0 [ 437.538971][T24192] kvmalloc_node+0x61/0xf0 [ 437.571689][T24192] alloc_netdev_mqs+0x911/0xeb0 [ 437.576566][T24192] ieee80211_if_add+0x1c6/0x18f0 [ 437.581523][T24192] ? ieee80211_monitor_select_queue+0x220/0x220 [ 437.587784][T24192] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 437.594028][T24192] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 437.600270][T24192] ieee80211_add_iface+0x99/0x160 [ 437.605292][T24192] ? ieee80211_rfkill_poll+0xb0/0xb0 [ 437.610587][T24192] nl80211_new_interface+0x541/0x1100 [ 437.615957][T24192] ? cfg80211_tdls_oper_request+0x780/0x780 [ 437.621854][T24192] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 437.628095][T24192] ? nl80211_pre_doit+0xa6/0x5c0 [ 437.633044][T24192] genl_family_rcv_msg_doit+0x228/0x320 [ 437.638587][T24192] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x290/0x290 [ 437.645955][T24192] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 437.652204][T24192] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 437.658442][T24192] ? ns_capable+0xde/0x100 [ 437.662857][T24192] genl_rcv_msg+0x328/0x580 [ 437.667364][T24192] ? genl_get_cmd+0x480/0x480 [ 437.672059][T24192] ? cfg80211_tdls_oper_request+0x780/0x780 [ 437.677961][T24192] ? lock_release+0x720/0x720 [ 437.682632][T24192] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 437.687920][T24192] netlink_rcv_skb+0x153/0x420 [ 437.692682][T24192] ? genl_get_cmd+0x480/0x480 [ 437.697361][T24192] ? netlink_ack+0xaa0/0xaa0 [ 437.701956][T24192] genl_rcv+0x24/0x40 [ 437.705954][T24192] netlink_unicast+0x533/0x7d0 [ 437.710717][T24192] ? netlink_attachskb+0x870/0x870 [ 437.715822][T24192] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 437.722058][T24192] ? __phys_addr_symbol+0x2c/0x70 [ 437.727088][T24192] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 437.732813][T24192] ? __check_object_size+0x171/0x3f0 [ 437.738102][T24192] netlink_sendmsg+0x856/0xd90 [ 437.742874][T24192] ? netlink_unicast+0x7d0/0x7d0 [ 437.747809][T24192] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 437.754207][T24192] ? netlink_unicast+0x7d0/0x7d0 [ 437.759148][T24192] sock_sendmsg+0xcf/0x120 [ 437.763586][T24192] ____sys_sendmsg+0x6e8/0x810 [ 437.768349][T24192] ? kernel_sendmsg+0x50/0x50 [ 437.773025][T24192] ? do_recvmmsg+0x6d0/0x6d0 [ 437.777610][T24192] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 437.783585][T24192] ? _parse_integer+0x132/0x180 [ 437.788436][T24192] ___sys_sendmsg+0xf3/0x170 [ 437.793020][T24192] ? sendmsg_copy_msghdr+0x160/0x160 [ 437.798300][T24192] ? __fget_files+0x266/0x3d0 [ 437.802971][T24192] ? lock_downgrade+0x6e0/0x6e0 [ 437.807831][T24192] ? __fget_files+0x288/0x3d0 [ 437.812511][T24192] ? __fget_light+0xea/0x280 [ 437.817096][T24192] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 437.823376][T24192] __sys_sendmsg+0xe5/0x1b0 [ 437.827873][T24192] ? __sys_sendmsg_sock+0x30/0x30 [ 437.832902][T24192] ? syscall_enter_from_user_mode+0x27/0x70 [ 437.838797][T24192] do_syscall_64+0x2d/0x70 [ 437.843211][T24192] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 437.849101][T24192] RIP: 0033:0x466459 [ 437.852996][T24192] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 437.872599][T24192] RSP: 002b:00007f3769288188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 437.881007][T24192] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 437.888992][T24192] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 437.896957][T24192] RBP: 00007f37692881d0 R08: 0000000000000000 R09: 0000000000000000 09:13:18 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfsd\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x40000) [ 437.904921][T24192] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 437.912882][T24192] R13: 00007ffff7144b4f R14: 00007f3769288300 R15: 0000000000022000 [ 437.964118][T24206] loop1: detected capacity change from 0 to 264192 09:13:18 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x68000000}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:13:18 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0xffffff97, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) 09:13:18 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x4, &(0x7f0000003800)=[{0x0, 0x1020}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:13:18 executing program 3 (fault-call:3 fault-nth:13): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000005540)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, r1, 0xc09, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x4a}, @val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'syzkaller0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x58}}, 0x0) [ 438.067309][T24206] omfs: Invalid superblock (0) 09:13:18 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfsd\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000) [ 438.162392][T24219] loop0: detected capacity change from 0 to 4 09:13:18 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xf9fdffff00000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) [ 438.251056][T24224] loop5: detected capacity change from 0 to 1 [ 438.277367][T24231] FAULT_INJECTION: forcing a failure. [ 438.277367][T24231] name failslab, interval 1, probability 0, space 0, times 0 [ 438.291499][T24231] CPU: 1 PID: 24231 Comm: syz-executor.3 Not tainted 5.12.0-rc7-syzkaller #0 [ 438.300267][T24231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.310322][T24231] Call Trace: [ 438.313610][T24231] dump_stack+0x141/0x1d7 [ 438.317955][T24231] should_fail.cold+0x5/0xa [ 438.322472][T24231] ? ieee80211_mesh_init_sdata+0xe7/0x580 [ 438.328200][T24231] should_failslab+0x5/0x10 [ 438.332710][T24231] kmem_cache_alloc_trace+0x55/0x2a0 [ 438.338000][T24231] ? init_timer_key+0x150/0x340 [ 438.342861][T24231] ieee80211_mesh_init_sdata+0xe7/0x580 [ 438.348631][T24231] ieee80211_setup_sdata+0xab0/0xec0 [ 438.354027][T24231] ieee80211_if_add+0xd91/0x18f0 [ 438.358983][T24231] ieee80211_add_iface+0x99/0x160 [ 438.364026][T24231] ? ieee80211_rfkill_poll+0xb0/0xb0 [ 438.369335][T24231] nl80211_new_interface+0x541/0x1100 [ 438.374722][T24231] ? cfg80211_tdls_oper_request+0x780/0x780 [ 438.380634][T24231] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 438.386892][T24231] ? nl80211_pre_doit+0xa6/0x5c0 [ 438.391839][T24231] genl_family_rcv_msg_doit+0x228/0x320 [ 438.397397][T24231] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x290/0x290 [ 438.404770][T24231] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 438.411019][T24231] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 438.417255][T24231] ? ns_capable+0xde/0x100 [ 438.421673][T24231] genl_rcv_msg+0x328/0x580 [ 438.426173][T24231] ? genl_get_cmd+0x480/0x480 [ 438.430863][T24231] ? cfg80211_tdls_oper_request+0x780/0x780 [ 438.436753][T24231] ? lock_release+0x720/0x720 [ 438.441428][T24231] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 438.446719][T24231] netlink_rcv_skb+0x153/0x420 [ 438.451478][T24231] ? genl_get_cmd+0x480/0x480 [ 438.456147][T24231] ? netlink_ack+0xaa0/0xaa0 [ 438.460740][T24231] genl_rcv+0x24/0x40 [ 438.464713][T24231] netlink_unicast+0x533/0x7d0 [ 438.469476][T24231] ? netlink_attachskb+0x870/0x870 [ 438.474578][T24231] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 438.480813][T24231] ? __phys_addr_symbol+0x2c/0x70 [ 438.485830][T24231] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 438.491540][T24231] ? __check_object_size+0x171/0x3f0 [ 438.496828][T24231] netlink_sendmsg+0x856/0xd90 [ 438.501588][T24231] ? netlink_unicast+0x7d0/0x7d0 [ 438.506526][T24231] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 438.512761][T24231] ? netlink_unicast+0x7d0/0x7d0 [ 438.517690][T24231] sock_sendmsg+0xcf/0x120 [ 438.522107][T24231] ____sys_sendmsg+0x6e8/0x810 [ 438.526888][T24231] ? kernel_sendmsg+0x50/0x50 [ 438.531557][T24231] ? do_recvmmsg+0x6d0/0x6d0 [ 438.536143][T24231] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 438.542117][T24231] ? _parse_integer+0x132/0x180 [ 438.546969][T24231] ___sys_sendmsg+0xf3/0x170 [ 438.551557][T24231] ? sendmsg_copy_msghdr+0x160/0x160 [ 438.556837][T24231] ? __fget_files+0x266/0x3d0 [ 438.561511][T24231] ? lock_downgrade+0x6e0/0x6e0 [ 438.566367][T24231] ? __fget_files+0x288/0x3d0 [ 438.571041][T24231] ? __fget_light+0xea/0x280 [ 438.575624][T24231] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 438.581865][T24231] __sys_sendmsg+0xe5/0x1b0 [ 438.586358][T24231] ? __sys_sendmsg_sock+0x30/0x30 [ 438.591385][T24231] ? syscall_enter_from_user_mode+0x27/0x70 [ 438.597279][T24231] do_syscall_64+0x2d/0x70 [ 438.601692][T24231] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 438.607578][T24231] RIP: 0033:0x466459 [ 438.611461][T24231] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 438.631059][T24231] RSP: 002b:00007f3769288188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 438.639464][T24231] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 438.647427][T24231] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 438.655392][T24231] RBP: 00007f37692881d0 R08: 0000000000000000 R09: 0000000000000000 [ 438.663362][T24231] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 438.671322][T24231] R13: 00007ffff7144b4f R14: 00007f3769288300 R15: 0000000000022000 09:13:18 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x6c000000}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) [ 438.722350][T24230] loop2: detected capacity change from 0 to 264192 [ 438.749255][T24235] loop1: detected capacity change from 0 to 264192 [ 438.756235][T24236] loop5: detected capacity change from 0 to 1 [ 438.773057][T24230] befs: Unrecognized mount option "{Ù" or missing value 09:13:19 executing program 3 (fault-call:3 fault-nth:14): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000005540)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, r1, 0xc09, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x4a}, @val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'syzkaller0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x58}}, 0x0) 09:13:19 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x4, &(0x7f0000003800)=[{0x0, 0x2000}, {0x0}, {&(0x7f0000000280), 0x0, 0x100}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {'system.posix_acl_access\x00'}, {}, {']\\\x00'}]}) 09:13:19 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfsd\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2000000) [ 438.879635][T24230] befs: (loop2): cannot parse mount options [ 438.892567][T24235] omfs: Invalid superblock (0) [ 438.932512][T24258] loop0: detected capacity change from 0 to 4 [ 438.940343][T24260] loop5: detected capacity change from 0 to 1 09:13:19 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0xfbffffff00000000, 0x0, &(0x7f0000003800), 0x0, &(0x7f0000003900)) 09:13:19 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$omfs(&(0x7f00000001c0)='omfs\x00', &(0x7f0000000200)='./file1\x00', 0x7b, 0x4, &(0x7f0000003800)=[{0x0, 0x0, 0x401}, {0x0, 0x74000000}, {0x0}, {0x0}], 0x0, &(0x7f0000003900)={[{'system.posix_acl_access\x00'}, {}, {'hugetlbfs\x00'}]}) 09:13:19 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$befs(&(0x7f00000000c0)='befs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffff6, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)="4583a581d381c09530d9d727e6d2264860a3e492363aed0af2383436e8950727811f72fe816c17b67fa9b599dc1a022b04f9b2eefc02c25614f2fc030b2e40ae5334c3aa6299", 0x46, 0x9}], 0x8, &(0x7f00000002c0)={[{'{\xd9'}], [{@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise='appraise'}]}) [ 439.102701][T24272] FAULT_INJECTION: forcing a failure. [ 439.102701][T24272] name failslab, interval 1, probability 0, space 0, times 0 [ 439.117488][T24271] loop5: detected capacity change from 0 to 1 [ 439.182123][T24272] CPU: 0 PID: 24272 Comm: syz-executor.3 Not tainted 5.12.0-rc7-syzkaller #0 [ 439.191016][T24272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.201073][T24272] Call Trace: [ 439.204352][T24272] dump_stack+0x141/0x1d7 [ 439.208699][T24272] should_fail.cold+0x5/0xa [ 439.213215][T24272] ? mesh_table_alloc+0x3d/0x170 [ 439.218158][T24272] should_failslab+0x5/0x10 [ 439.222670][T24272] kmem_cache_alloc_trace+0x55/0x2a0 [ 439.227966][T24272] mesh_table_alloc+0x3d/0x170 [ 439.232738][T24272] mesh_pathtbl_init+0x11/0xd0 [ 439.237512][T24272] ieee80211_mesh_init_sdata+0x29c/0x580 [ 439.243150][T24272] ieee80211_setup_sdata+0xab0/0xec0 [ 439.248448][T24272] ieee80211_if_add+0xd91/0x18f0 [ 439.253402][T24272] ieee80211_add_iface+0x99/0x160 [ 439.258436][T24272] ? ieee80211_rfkill_poll+0xb0/0xb0 [ 439.263740][T24272] nl80211_new_interface+0x541/0x1100 [ 439.269120][T24272] ? cfg80211_tdls_oper_request+0x780/0x780 [ 439.275023][T24272] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 439.281270][T24272] ? nl80211_pre_doit+0xa6/0x5c0 [ 439.286218][T24272] genl_family_rcv_msg_doit+0x228/0x320 [ 439.291769][T24272] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x290/0x290 [ 439.299150][T24272] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 439.305586][T24272] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 439.311842][T24272] ? ns_capable+0xde/0x100 [ 439.316280][T24272] genl_rcv_msg+0x328/0x580 [ 439.320796][T24272] ? genl_get_cmd+0x480/0x480 [ 439.325475][T24272] ? cfg80211_tdls_oper_request+0x780/0x780 [ 439.331384][T24272] ? lock_release+0x720/0x720 [ 439.336067][T24272] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 439.341367][T24272] netlink_rcv_skb+0x153/0x420 [ 439.346137][T24272] ? genl_get_cmd+0x480/0x480 [ 439.350816][T24272] ? netlink_ack+0xaa0/0xaa0 [ 439.355437][T24272] genl_rcv+0x24/0x40 [ 439.359427][T24272] netlink_unicast+0x533/0x7d0 [ 439.364202][T24272] ? netlink_attachskb+0x870/0x870 [ 439.369324][T24272] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 439.375574][T24272] ? __phys_addr_symbol+0x2c/0x70 [ 439.380605][T24272] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 439.386326][T24272] ? __check_object_size+0x171/0x3f0 [ 439.391628][T24272] netlink_sendmsg+0x856/0xd90 [ 439.396542][T24272] ? netlink_unicast+0x7d0/0x7d0 [ 439.401491][T24272] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 439.407769][T24272] ? netlink_unicast+0x7d0/0x7d0 [ 439.412714][T24272] sock_sendmsg+0xcf/0x120 [ 439.417147][T24272] ____sys_sendmsg+0x6e8/0x810 [ 439.421923][T24272] ? kernel_sendmsg+0x50/0x50 [ 439.426610][T24272] ? do_recvmmsg+0x6d0/0x6d0 [ 439.431206][T24272] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 439.437191][T24272] ? _parse_integer+0x132/0x180 [ 439.442058][T24272] ___sys_sendmsg+0xf3/0x170 [ 439.446650][T24272] ? sendmsg_copy_msghdr+0x160/0x160 [ 439.451941][T24272] ? __fget_files+0x266/0x3d0 [ 439.456627][T24272] ? lock_downgrade+0x6e0/0x6e0 [ 439.461492][T24272] ? __fget_files+0x288/0x3d0 [ 439.466178][T24272] ? __fget_light+0xea/0x280 [ 439.470772][T24272] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 439.477025][T24272] __sys_sendmsg+0xe5/0x1b0 [ 439.481529][T24272] ? __sys_sendmsg_sock+0x30/0x30 [ 439.486570][T24272] ? syscall_enter_from_user_mode+0x27/0x70 [ 439.492477][T24272] do_syscall_64+0x2d/0x70 [ 439.496899][T24272] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 439.502796][T24272] RIP: 0033:0x466459 [ 439.506692][T24272] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 439.526302][T24272] RSP: 002b:00007f3769288188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 439.534724][T24272] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 439.542697][T24272] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 439.550669][T24272] RBP: 00007f37692881d0 R08: 0000000000000000 R09: 0000000000000000 [ 439.558641][T24272] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 439.566613][T24272] R13: 00007ffff7144b4f R14: 00007f3769288300 R15: 0000000000022000 [ 439.584653][ T3239] ieee802154 phy0 wpan0: encryption failed: -22 [ 439.591025][ T3239] ieee802154 phy1 wpan1: encryption failed: -22 [ 439.595023][T24280] loop1: detected capacity change from 0 to 264192 [ 439.630770][T24280] omfs: Invalid superblock (0) [ 439.653293][ T9722] ================================================================== [ 439.661714][ T9722] BUG: KASAN: null-ptr-deref in try_to_grab_pending.part.0+0x26/0x770 [ 439.669879][ T9722] Write of size 8 at addr 0000000000000088 by task kworker/1:6/9722 [ 439.677855][ T9722] [ 439.680179][ T9722] CPU: 1 PID: 9722 Comm: kworker/1:6 Not tainted 5.12.0-rc7-syzkaller #0 [ 439.688591][ T9722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.698652][ T9722] Workqueue: events cfg80211_destroy_iface_wk [ 439.704736][ T9722] Call Trace: [ 439.708018][ T9722] dump_stack+0x141/0x1d7 [ 439.712363][ T9722] ? try_to_grab_pending.part.0+0x26/0x770 [ 439.718174][ T9722] kasan_report.cold+0x5f/0xd8 [ 439.722943][ T9722] ? try_to_grab_pending.part.0+0x26/0x770 [ 439.728759][ T9722] kasan_check_range+0x13d/0x180 [ 439.733707][ T9722] try_to_grab_pending.part.0+0x26/0x770 [ 439.739542][ T9722] ? lockdep_hardirqs_off+0x90/0xd0 [ 439.744761][ T9722] try_to_grab_pending+0xa1/0xd0 [ 439.749697][ T9722] __cancel_work_timer+0xa6/0x570 [ 439.754715][ T9722] ? try_to_grab_pending+0xd0/0xd0 [ 439.759825][ T9722] ? slab_free_freelist_hook+0x92/0x210 [ 439.765374][ T9722] rhashtable_free_and_destroy+0x2b/0x920 [ 439.771090][ T9722] ? mesh_path_free_rcu+0x440/0x440 [ 439.776294][ T9722] ? mesh_rmc_free+0x1ae/0x260 [ 439.781055][ T9722] mesh_pathtbl_unregister+0x42/0xa0 [ 439.786333][ T9722] ieee80211_teardown_sdata+0x216/0x2d0 [ 439.791869][ T9722] ? __local_bh_enable_ip+0xa0/0x120 [ 439.797145][ T9722] ? ieee80211_teardown_sdata+0x2d0/0x2d0 [ 439.802858][ T9722] unregister_netdevice_many+0xc4c/0x1760 [ 439.808576][ T9722] ? net_tx_action+0xbe0/0xbe0 [ 439.813328][ T9722] ? mutex_lock_io_nested+0xf70/0xf70 [ 439.818687][ T9722] ? netlink_broadcast_filtered+0x401/0xdc0 [ 439.824583][ T9722] unregister_netdevice_queue+0x2dd/0x3c0 [ 439.830293][ T9722] ? unregister_netdevice_many+0x1760/0x1760 [ 439.836273][ T9722] _cfg80211_unregister_wdev+0x485/0x740 [ 439.841906][ T9722] ieee80211_if_remove+0x1df/0x300 [ 439.847012][ T9722] ieee80211_del_iface+0x12/0x20 [ 439.851943][ T9722] cfg80211_destroy_ifaces+0x223/0x770 [ 439.857400][ T9722] cfg80211_destroy_iface_wk+0x2c/0x40 [ 439.862853][ T9722] process_one_work+0x98d/0x1600 [ 439.867790][ T9722] ? pwq_dec_nr_in_flight+0x320/0x320 [ 439.873158][ T9722] ? rwlock_bug.part.0+0x90/0x90 [ 439.878088][ T9722] ? _raw_spin_lock_irq+0x41/0x50 [ 439.883112][ T9722] worker_thread+0x64c/0x1120 [ 439.887788][ T9722] ? __kthread_parkme+0x13f/0x1e0 [ 439.892806][ T9722] ? process_one_work+0x1600/0x1600 [ 439.897996][ T9722] kthread+0x3b1/0x4a0 [ 439.902055][ T9722] ? __kthread_bind_mask+0xc0/0xc0 [ 439.907161][ T9722] ret_from_fork+0x1f/0x30 [ 439.911582][ T9722] ================================================================== [ 439.919621][ T9722] Disabling lock debugging due to kernel taint [ 439.925750][ T9722] Kernel panic - not syncing: panic_on_warn set ... [ 439.932310][ T9722] CPU: 1 PID: 9722 Comm: kworker/1:6 Tainted: G B 5.12.0-rc7-syzkaller #0 [ 439.942094][ T9722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.952134][ T9722] Workqueue: events cfg80211_destroy_iface_wk [ 439.958191][ T9722] Call Trace: [ 439.961453][ T9722] dump_stack+0x141/0x1d7 [ 439.965770][ T9722] panic+0x306/0x73d [ 439.969653][ T9722] ? __warn_printk+0xf3/0xf3 [ 439.974226][ T9722] ? try_to_grab_pending.part.0+0x26/0x770 [ 439.980016][ T9722] ? try_to_grab_pending.part.0+0x26/0x770 [ 439.985808][ T9722] end_report.cold+0x5a/0x5a [ 439.990398][ T9722] kasan_report.cold+0x6a/0xd8 [ 439.995147][ T9722] ? try_to_grab_pending.part.0+0x26/0x770 [ 440.000941][ T9722] kasan_check_range+0x13d/0x180 [ 440.005868][ T9722] try_to_grab_pending.part.0+0x26/0x770 [ 440.011486][ T9722] ? lockdep_hardirqs_off+0x90/0xd0 [ 440.016666][ T9722] try_to_grab_pending+0xa1/0xd0 [ 440.021588][ T9722] __cancel_work_timer+0xa6/0x570 [ 440.026598][ T9722] ? try_to_grab_pending+0xd0/0xd0 [ 440.031694][ T9722] ? slab_free_freelist_hook+0x92/0x210 [ 440.037229][ T9722] rhashtable_free_and_destroy+0x2b/0x920 [ 440.042934][ T9722] ? mesh_path_free_rcu+0x440/0x440 [ 440.048122][ T9722] ? mesh_rmc_free+0x1ae/0x260 [ 440.052873][ T9722] mesh_pathtbl_unregister+0x42/0xa0 [ 440.058341][ T9722] ieee80211_teardown_sdata+0x216/0x2d0 [ 440.063880][ T9722] ? __local_bh_enable_ip+0xa0/0x120 [ 440.069153][ T9722] ? ieee80211_teardown_sdata+0x2d0/0x2d0 [ 440.074859][ T9722] unregister_netdevice_many+0xc4c/0x1760 [ 440.080568][ T9722] ? net_tx_action+0xbe0/0xbe0 [ 440.085314][ T9722] ? mutex_lock_io_nested+0xf70/0xf70 [ 440.090670][ T9722] ? netlink_broadcast_filtered+0x401/0xdc0 [ 440.096549][ T9722] unregister_netdevice_queue+0x2dd/0x3c0 [ 440.102252][ T9722] ? unregister_netdevice_many+0x1760/0x1760 [ 440.108218][ T9722] _cfg80211_unregister_wdev+0x485/0x740 [ 440.113843][ T9722] ieee80211_if_remove+0x1df/0x300 [ 440.118951][ T9722] ieee80211_del_iface+0x12/0x20 [ 440.124247][ T9722] cfg80211_destroy_ifaces+0x223/0x770 [ 440.129700][ T9722] cfg80211_destroy_iface_wk+0x2c/0x40 [ 440.135147][ T9722] process_one_work+0x98d/0x1600 [ 440.140074][ T9722] ? pwq_dec_nr_in_flight+0x320/0x320 [ 440.145432][ T9722] ? rwlock_bug.part.0+0x90/0x90 [ 440.150356][ T9722] ? _raw_spin_lock_irq+0x41/0x50 [ 440.155366][ T9722] worker_thread+0x64c/0x1120 [ 440.160030][ T9722] ? __kthread_parkme+0x13f/0x1e0 [ 440.165040][ T9722] ? process_one_work+0x1600/0x1600 [ 440.170224][ T9722] kthread+0x3b1/0x4a0 [ 440.174281][ T9722] ? __kthread_bind_mask+0xc0/0xc0 [ 440.179396][ T9722] ret_from_fork+0x1f/0x30 [ 440.187782][ T9722] Kernel Offset: disabled [ 440.192537][ T9722] Rebooting in 86400 seconds..