x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x3, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:48 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x2a, 0x0, 0x0) [ 635.754028] (syz-executor.0,19484,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 635.754028] " or missing value [ 635.768206] (syz-executor.0,19484,0):ocfs2_fill_super:1225 ERROR: status = -22 10:31:49 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r1, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) splice(r0, 0x0, r1, 0x0, 0x10003, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f00000001c0)=r2) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/stat\x00', 0x0, 0x0) sendto$x25(r3, &(0x7f00000000c0)="e3d9a3543f5c3d2b20037284aae1", 0xe, 0x20040844, &(0x7f0000000140), 0x12) open(&(0x7f0000000040)='./file0\x00', 0x200001, 0x1) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) pipe(&(0x7f0000000140)) (async) socket$inet_tcp(0x2, 0x1, 0x0) (async) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) (async) setsockopt$sock_timeval(r1, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) (async) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) (async) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) (async) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) (async) splice(r0, 0x0, r1, 0x0, 0x10003, 0x0) (async) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) (async) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f00000001c0)=r2) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/stat\x00', 0x0, 0x0) (async) sendto$x25(r3, &(0x7f00000000c0)="e3d9a3543f5c3d2b20037284aae1", 0xe, 0x20040844, &(0x7f0000000140), 0x12) (async) open(&(0x7f0000000040)='./file0\x00', 0x200001, 0x1) (async) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) (async) 10:31:49 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\x8d&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:49 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x2b, 0x0, 0x0) 10:31:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000020000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000024a0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:49 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:49 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x2c, 0x0, 0x0) 10:31:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000004c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000030000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 636.351041] (syz-executor.0,19507,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 636.351041] " or missing value [ 636.379899] (syz-executor.1,19505,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 636.379899] " or missing value 10:31:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) syz_mount_image$pvfs2(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x9, 0x7, &(0x7f0000001500)=[{&(0x7f00000000c0)="96403e6eba3bf0a8fe1e3a1a4a92006172905cb345322542c9eaa6a53b5cb050477b0a49b64f249c1ecce0362637fd0751b3fdf7c48ded36", 0x38, 0x81}, {&(0x7f0000000140)="b62111d028fa1b4f081b3f5dd7c1270a979a7ab8dd1afda40eb0f2bfd326ed9527c1fc1bae6e8a5893372319c903401562614b8224bb64be8aa3fd8d8f27fd5530ed4b81aeacb9c41c06171c738821bc44c0cc2407d9c08c07d5b51a8995e9710723d7e12501f8abc95f55f5ff9873fc2dd4ebaa11e037830b3ff33034b9db1de08419a2a3500f748b1c37a82af3142d657471967f76006f0b546251277131c4da445f77c02ca7765cd147f0ea018ef5cdbabfe485c6182411702320de7fa5b186b8302e58cae68c9cb4d5630a38db57397c7ad8bab89730c46c9e7aced0e28dde7af102d94b5afb829136a67fcdc7290c03c6d4668f753d2f01a2d09faf15529eb03cb08592fe19ba1832ecb219b23ca65db9a0ebc8f37463571cd66d7141db1247f5c6820b78e86fd6bcc7c62be2ba014e7d29de7c8a4fb92b431839628274653d9525ec392b91c74557db51e043a898cc5423dbc346f8b95ec8f8ef50c90287d1166c52796afd0ade6861548aee80b8b80f32719f12361abb274ff0e4d98051753cc97d686c1201a41d5e9c6b66413c35db38c7eb3432f989b39dae9de6109c8486d3030999907ab2aefe668ea334bd6124227171a9f6cf5f48694bb311c70a9cf5a26301ea40b289444629435bb424ee4c1d0fc4b584aeee186e46e8f834e25664c780067c7846dd8de904502ee5d68125a504ef3daa982d484af38109db7874b7cdfae99fe47ddd21a823294fba2a2267ce2cba89e735d25f7f50eaaff27b1418f59193c711af7da1afd6cfe3d138c68c28ebc5d5628f1512197717735dc54b05cc4d7b9b5630f0517a1540b436725c012213228d0d372b605db60015fac9aa9c7d1ef7124e14f8bb9fb9175a609d018af3874f1e79aefd9e3b8741201542b4d3bea0fcf8a66e3dd4f05231f93be19cf76085e226f6b5ff31ac869ac0962e87b789e580b0513911a62725cf5a2ad169a98dacc396a0652fcd379450ffab5794424a24691c725624554701bfaf3f9cf54607829b84f580a5b9780005613c383d90f06e1e3840a0e59643625b165ea854ece43d807587cca92eb55b3615082935f8e6d2ac659a7ce01d324c8176d69538593c94130eb054a1fe0028c8dbd5735b50bf991347259b0a3669b72c42e86ef5ecd3ad29c48c7e4df7707fb95cc24c29c9667346c057f4c5bc91e73f417f618b1f6b5cc3b9ca57d2c1f12a2b9352e6af0d87b5113b47256a181376683cbb58834b8845116b75a530cf2910fbf26da793c80dff00388e506bc4656669fc2264bfdeb23b2b4bb1d1b1550d53d4a65e7877c1e499b074ed3b0dda828dca43596382ab924c2b7969af01099578eed2e2fce8d6fb0717c1a17fcd9022c282d1b76467c7b4e936a0372e7d73452cdb3f00b4d8bfc46feead86999d0456e366469d72137658dba25132c9548245e0486cb2e22f27f0eed711ef3a7ba79543fe6bd26a4e586a577ba334f9c44968e55d4981728bdabc3d7f54c03a98e82743837cffc3bf785f834f97f513b4797d52b060243fd3bc6dd929a10b690c36fcc0ae9e324372cfce55b1f059843c10af12f01ab9f418591a55fba737a8797be41b7ae5bd754d7e39423ef8701a84e969fe265bb7d07178dc1c0c231af347e0a5f8f4cc2b3434bbb3d2d463c7a462843c7cd9c7c16d698c2c2dd6817ba1232c6b4e070b18bb7a99d50626bdac199c6a9082a2c40d0300ffc9895f7a8d626ba0c3acd24f6fe487db5d4b2591709e1d091763e397136c372668b0e2dc0e74026dc6762517209dac3944a696e56385cb4a8af1a4fd7425299d5bd98bf38a43707ba8153b733e1c8bbcd4b48477771f07b33be542aac267ad987cd474eef9594e0c4b27949ce577b9925c58c275d465f411e82da5bfb53d54b0e77ebc9037dbaaf7dbd8680e09782cb7faee4eb16eb497c19133d5b6c8673c59a17abb4b6c3aa26e5c3189c7b0f14d54ee2e63acfcd8a679a3adf64f5918c50d174c8964937b50eea195400fc9acbd442505e099a168eab7605e54b61955fd9a2ffa932c578d60f36c7bbd59284d8dd5e8efe6a1d94e63155796e15af1c7c8014ee6426ee31631afe1f9bf5d1d904f8945dbf5d51fbe3194b1be9f40f603ac94db5d83b4e1dc63826f816005fcd34bea6193fc93aebfca10c09b1c8490975e90d2f51b842070604ed75435fd61f7d0bbe98652f5a38c4d05f397e71d7026f286c4ec7626f744af2975bdb6fa0e2a2e6182b274ab1c77cd943826669551be367d014b06480f726a4bf54f734332c9b3ac8b89d0ef598c5eefd824441af138a01da5d1ff3eebe95b2d04909ea82116c0a7b01d1ef04431830a54ba7a0b3a3bcc0a926d8223e695c0cebd272af6131991259167e47e7748f4cd4052f6644e9c692a1d4fa7eb02ad9fe7780efd87fa8b25cbf0e0eaecb1949d10065d96774d40a6a72ae3961d4953c94730d17c9ecf3f4501438ddeb38968009bad0754762e8f082ba552fe0fc8679ed68da58bcb742abe5f66afc04b5843619ffe49482172655f771738157835d2eb355ec8a6353f0a313397f9b3c79dbddbf0d17a19420161f79a454801df570e2c11b2c6e65701f7024fd2ea7de7c4144dc78d5955ca6746509711648f82201fe5930b5d3e8732fdf77b24983069cddabdf43c994de8685b660f85177d5a33ca070604139883377cf574d22949765ef39c9712473b610fcfaf3c7b250b174a933dcf32e9576082f3cd296254e25789daa6a9fb62e7e03468c978a44ef71c5a223fcfa6a860ffdd7a5464186c00159f996e301a4ec4c5ef37e4c746ac2c57265303fa418f2446699a9495d58d9092f6f0cd6df52721d5b6954c5d4ecdf1722eda56a230ed171d23ebd32d3186eba078b31ffe35e15ca52071c5ee59fadc18d8b937cd1bbca2706eff3b4766fed9efc698e742cc3f2397fc080c801ad96896decf6cbde990d837d250eb3c763a1d209e88a3decf5206dd5aad8bddad569e5ec32897bd49ed5e529db230b22b0ef83e42eb30a62e28e2ce1f918eca713f1c51da2d2895497196aedf39175096d80c20e680cffb9eec3008a92903b960485041bb0d1d1255c9414a8b3e3032eeefd1288f172775f6987ea81eb970cf74689cf1caf3259cf96fa519a9e8155502743d51a8b81218f4ebc352377d98f93518abecfefbc772c1b8f6e6dcafde95e4649c7189aa5e57b5bc9b5e8135a4270258b07628b7be8a941f1d35ee48badec4334b69bb22a897f4275265ba8c15f17cd871ed4d179a970c33685631453cb6cf44e68dad76c93d2ab133f0b015a7652bfd1c234390e0171348def3d74209500df98cf2fede6a1ac53e0606c6db7b908e754ae6883c5f30835b1d7b08190df28d6da1f7a224c79607910fd1b7fd2a48ea40862e102d208e6fd45d22d951c525c42407ba0fb51ef90f63b49710d6d45c9997b8642f139182c184433200ab79d5a4de30155509d5aa6bab94a990dcd542977e72f14774aa32d33420b1a616359468a5d26acb87e8623546570e7410f79a6d7fcf701bb0bf172b8c6eface2df26a237f8e09df9b92d9b9fc1905b58ceb59bbf07be604c67990400c1c1e514f5e077be5af3a51ce61baed7bff529db8c05e2cbc4fa68bfaf24e4055272fe00ef12e5e7dee1187bc48b4e6d1f8588e150d8262fc9c0de1b1700bcc4ff79d8a45aa7df2bb90121310fdd53e351e958823a0581dff6bbacc55809b07dc5c2af19a09ad167915c299a73b9412e0003eeccd0866ec6a8679b0d9f2e353aa027dd0f2449146c3304cc6f770edce926c5a2ae6d1dffe2cbbe5897b730889e79a87e8fb134a96b7b856ecd3f161d4c8629edf8c89262b423cf43dedc71e98c9fd315cc18e00508fbcb4dc771bd95ab5033f4235e0a6d484f7ac98f41c32d4ccf537478c618d737aa0b5f1ebab5d035c951824d1e653b373c04a17fdade8a3fb46a544e6beda498c180bfe2c3b7029bfb53bd7c21fd36f17d6792e776a5a299394a93ab20dc2d2690df85e9e13e63a03a75fac780826460a69ec0d4e2f096ddcb8d5076cabf1e6ff6d25b83f0825c768ad79d22f6dacd5a332b8cad29a91f55c6a0ddd4202648c696826dc75ec75c3594116b7078c8686886762da333f48c77b3731842984d7abd3f733f079161d94869ab3927858708e62e773dca70f8436ad85439d3336dfd88b1fb9c3f495384690ed6162648ca1bfe19d40934b0375bcf2436ab8ec7f1794cc3ade190583ceb0a79ab42e860a7841d6bdcce2fd068aaeb8d7dd90075aa5cbdb3e0762b6ed2b958864050e1be8fa252bdecfc9836d6de2478e96c49da78a31e3881653eda8199337a5d78119285558bb7e5f80a95f0ea449705c520d5787794281a20116d9a0a081a109ba314d7b41a1da28a81eb53e73a9fe758c9fe32ba6d41349889f28e90587e26d62f2c567e162e672ec32d04932e486ffc93136e89285de84872b8c870cf4ae08c59da12e20dc0ff421cfc42ccaea892225a835ea03749aee1f22e82519c0d3c54791ace6d347e1d9e46084e36c8b2424f83cf54b2c1f75fa83d97c4db954420e673d8c54de4446ec0f44909d14a2badffb6b11a31bd4a436e8cee01655bd303038c0536b811a46eab70be8d679b2246ba77317503c712384c452ebd51c1b1301c362e759d186c0c882d5bf77122f0f4c0121667fb1dd81caa3bbe4413644e66e224dc3d2cd6dd7c6041a0c40e3906901980f1a79e515705bd79b83bac4a888b39133b42b0c71ee19971d49ae6c95b8e9951bbfc0f5e257cb13547bb89b09c1224773f2969f671f2a463688cce44c2c265320cc0ff3fa6ee49e27a2f909e8205dc2e905a60069ff0cfbf285b51ba19ee8bad36073982ed46e9235b5fe307249369b2ecf7bf46d61a73c4e2b5502d296da31f38293e5416d9919ed864c4b1a05f65366e9cbef5fd83fcc1e6b72aa24621f5169a118bd476b2361fbb954f756b971e687f1972b82377e692816a7918deeb459bc98ff3f784e3664ce287c5d1365b7e300e4a6b323e5002bd3d62182a25fb035fa41bfe4f14084bd180e0507009072b08dc226604f1e1415a631a1347aaf9e5ba164579f074cf0cb88e9bce87e459887a2885b50a3e15259dd2631729c8519bbebd87f074b7851d08449de37d19bc6057d16e5ecd3b2214e81c15e002a9f85bfeefe247a277e7218ee4f1b048a23ad407c7625ca725aee8dfd3647427a44726b19717fe8810b0123d5922636bcaa581a084ea21573567d8c477429a72ee7d5d57e59755008b6e947653730dde43ff8cdf75a64f5ccb359cce937b930d11ace288a4e7b51cde35f6a59a67766582c28bdf298c2f5cd3b8cf22528843e8078df191b72f40cc67056a0524d30686552364505a36c4620523297e9b1950881385ef4d94b10c6291e69d9a8219076c4b0c6edc24e20032add4fc84eb522a8c1df8cddc230defb048506e3f6bd875e64aae75fae0de571e6f204fcb35e626f0deaed0c9ff3c5cd7327a6a444b3434d859d497ca245aa06c713fb268ffb5c0e471d9ce86bfdc8c26e9d55dc33c3f8a3e698c2d382c1cb9252ed828d242f33ab6d8bbcbd5af65c3a3acd318a10b8fbefcb2dd5a51f457df0d69ba21f6c84ffbcefa53f74dac944846d3e6ad108000f3269502f48c815f8dd6f33fd1fcf311c7c090b93199a064e5e63b052816ee240a1512fdcb72d304ee451d9df51f00ec1180541e6fb1e6630f1c93bcec2a72358f688b6140de99667616d6dada5cba75002ff3f8429c89988adb4ba6b201e35fdaf0e788bc4", 0x1000, 0x5}, {&(0x7f0000001140)="87441acbb4d9e401308fdb0b676f4d3e4b81a2ac796233c514cf595c603282ee2ef99e4e144d1804a4f7ad4d5ec01d56d22530bc75d4c4ceedf046a7e8b27353797b6635e5ac35d344bd62299b474bd1143595025d9fb9ce2aaa915e17e082b3fc0dd4f7725285f36438da60d3de43b90a77e018b1f106135f45b646ff1c8d260fb0422a9775e4e9c17d9f4cc869286c27684abbd057b6aabd8bbfb517368e8dec93670139d2ef0f1d47ec8f205be24bec6fea35a6a0b74c1090bfd1c0b9523e50b8b624bbe5c39af529ac18d0f052fcb4e416457ec35e5bef4ac07ba34847c81636d1cb87dd5e8c92675f", 0xeb, 0x3}, {&(0x7f0000001240)="fc853542f70c7b842d8e54610e875458d766cec9dca1161359f60853fed3442ebc8123e001a2f4c951d0d9a3fb40637405e12df1414de186c46622d08922407c2a06b366845e0a4763f46eb0f3b43f84bb393ead33b8a739010dd0071b4dfb9a0bdcfa9673239592de66547896131fc9573ec43c2b97905b888d629ce766aab994335b1c3ae4a2711d4b47c5e23f6d69d94f259bde12b3520a83b927c2316bc2f38fb035bf608c0628a613dc644ffc22c55902eef49e16ba548223b58c6bc0af8b0ae7d294c292df127ee20ddd6f6f1ba296a3315c74a706ecfa0c8d", 0xdc, 0xe37}, {&(0x7f0000001340)="ba3ba69def6c93716938e3d2352302d336b88e45e9e2b218d117450335d70da754a85f3c56a216758344f9798e40d610a782d28cf205b38ff6379979b7fda694ce46613e48e23250c353efd58665c7fcc05afa439a1472bee887cdfc69e3064f3677ed26d3907e2fee", 0x69, 0xfffffffffffffff8}, {&(0x7f00000013c0)="a3d010a9281c13d374816a47b739f8964d7471ac38f2a3921666bfb6de98a4b2719e46d5a2b7", 0x26, 0x5}, {&(0x7f0000001400)="023f66eab7e9bfe58b16604808a8817420dfdb50be7c0b641cb5659d264f24ea69cc03faf9f3362d7a3cacd1f8d83ce608031eee30c3ed5fad7984912522f8bbbc1e48a8186c63a669887895a6fe5c6dc6f8fa6c3fe65d25c7e8e64f335387aa45bbb95d4cec1699b4fa8c91334b1bd4d27de75a876f0617d8bbd9b3f4b42aebcec05ef56da57c77709eac38187fd524e72bee41387f9838ed02e46e7a9f19458de6a06654924545430448ac5b545e7b989cbd7b5f312e9adfe734d9996d98e5c0b64780d69e8be1dd88f4b95354d9c76f98b6955e5d3e2944910bea6d016ffd00663153322572b7b0716baada4f342458500bef447dc4aa", 0xf8, 0x1fab0c60}], 0x800, &(0x7f00000015c0)={[{}], [{@fsname={'fsname', 0x3d, 'btrfs\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'btrfs\x00'}}, {@uid_gt={'uid>', 0xee01}}]}) 10:31:49 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x2d, 0x0, 0x0) 10:31:49 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x2e, 0x0, 0x0) [ 636.405565] (syz-executor.0,19507,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 636.426350] (syz-executor.1,19505,1):ocfs2_fill_super:1225 ERROR: status = -22 10:31:49 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x8, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:49 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t\t6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000003540000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000040000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:49 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x2f, 0x0, 0x0) 10:31:49 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x30, 0x0, 0x0) 10:31:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) (async) syz_mount_image$pvfs2(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x9, 0x7, &(0x7f0000001500)=[{&(0x7f00000000c0)="96403e6eba3bf0a8fe1e3a1a4a92006172905cb345322542c9eaa6a53b5cb050477b0a49b64f249c1ecce0362637fd0751b3fdf7c48ded36", 0x38, 0x81}, {&(0x7f0000000140)="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", 0x1000, 0x5}, {&(0x7f0000001140)="87441acbb4d9e401308fdb0b676f4d3e4b81a2ac796233c514cf595c603282ee2ef99e4e144d1804a4f7ad4d5ec01d56d22530bc75d4c4ceedf046a7e8b27353797b6635e5ac35d344bd62299b474bd1143595025d9fb9ce2aaa915e17e082b3fc0dd4f7725285f36438da60d3de43b90a77e018b1f106135f45b646ff1c8d260fb0422a9775e4e9c17d9f4cc869286c27684abbd057b6aabd8bbfb517368e8dec93670139d2ef0f1d47ec8f205be24bec6fea35a6a0b74c1090bfd1c0b9523e50b8b624bbe5c39af529ac18d0f052fcb4e416457ec35e5bef4ac07ba34847c81636d1cb87dd5e8c92675f", 0xeb, 0x3}, {&(0x7f0000001240)="fc853542f70c7b842d8e54610e875458d766cec9dca1161359f60853fed3442ebc8123e001a2f4c951d0d9a3fb40637405e12df1414de186c46622d08922407c2a06b366845e0a4763f46eb0f3b43f84bb393ead33b8a739010dd0071b4dfb9a0bdcfa9673239592de66547896131fc9573ec43c2b97905b888d629ce766aab994335b1c3ae4a2711d4b47c5e23f6d69d94f259bde12b3520a83b927c2316bc2f38fb035bf608c0628a613dc644ffc22c55902eef49e16ba548223b58c6bc0af8b0ae7d294c292df127ee20ddd6f6f1ba296a3315c74a706ecfa0c8d", 0xdc, 0xe37}, {&(0x7f0000001340)="ba3ba69def6c93716938e3d2352302d336b88e45e9e2b218d117450335d70da754a85f3c56a216758344f9798e40d610a782d28cf205b38ff6379979b7fda694ce46613e48e23250c353efd58665c7fcc05afa439a1472bee887cdfc69e3064f3677ed26d3907e2fee", 0x69, 0xfffffffffffffff8}, {&(0x7f00000013c0)="a3d010a9281c13d374816a47b739f8964d7471ac38f2a3921666bfb6de98a4b2719e46d5a2b7", 0x26, 0x5}, {&(0x7f0000001400)="023f66eab7e9bfe58b16604808a8817420dfdb50be7c0b641cb5659d264f24ea69cc03faf9f3362d7a3cacd1f8d83ce608031eee30c3ed5fad7984912522f8bbbc1e48a8186c63a669887895a6fe5c6dc6f8fa6c3fe65d25c7e8e64f335387aa45bbb95d4cec1699b4fa8c91334b1bd4d27de75a876f0617d8bbd9b3f4b42aebcec05ef56da57c77709eac38187fd524e72bee41387f9838ed02e46e7a9f19458de6a06654924545430448ac5b545e7b989cbd7b5f312e9adfe734d9996d98e5c0b64780d69e8be1dd88f4b95354d9c76f98b6955e5d3e2944910bea6d016ffd00663153322572b7b0716baada4f342458500bef447dc4aa", 0xf8, 0x1fab0c60}], 0x800, &(0x7f00000015c0)={[{}], [{@fsname={'fsname', 0x3d, 'btrfs\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'btrfs\x00'}}, {@uid_gt={'uid>', 0xee01}}]}) 10:31:49 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x31, 0x0, 0x0) 10:31:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000050000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 636.747068] (syz-executor.0,19566,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 636.747068] " or missing value [ 636.761236] (syz-executor.1,19579,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu 6 [ 636.761236] " or missing value [ 636.761322] (syz-executor.1,19579,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 636.783200] (syz-executor.0,19566,1):ocfs2_fill_super:1225 ERROR: status = -22 10:31:49 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t\n6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:49 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x32, 0x0, 0x0) 10:31:49 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000002560000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:49 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x33, 0x0, 0x0) 10:31:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000060000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) (async) syz_mount_image$pvfs2(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x9, 0x7, &(0x7f0000001500)=[{&(0x7f00000000c0)="96403e6eba3bf0a8fe1e3a1a4a92006172905cb345322542c9eaa6a53b5cb050477b0a49b64f249c1ecce0362637fd0751b3fdf7c48ded36", 0x38, 0x81}, {&(0x7f0000000140)="b62111d028fa1b4f081b3f5dd7c1270a979a7ab8dd1afda40eb0f2bfd326ed9527c1fc1bae6e8a5893372319c903401562614b8224bb64be8aa3fd8d8f27fd5530ed4b81aeacb9c41c06171c738821bc44c0cc2407d9c08c07d5b51a8995e9710723d7e12501f8abc95f55f5ff9873fc2dd4ebaa11e037830b3ff33034b9db1de08419a2a3500f748b1c37a82af3142d657471967f76006f0b546251277131c4da445f77c02ca7765cd147f0ea018ef5cdbabfe485c6182411702320de7fa5b186b8302e58cae68c9cb4d5630a38db57397c7ad8bab89730c46c9e7aced0e28dde7af102d94b5afb829136a67fcdc7290c03c6d4668f753d2f01a2d09faf15529eb03cb08592fe19ba1832ecb219b23ca65db9a0ebc8f37463571cd66d7141db1247f5c6820b78e86fd6bcc7c62be2ba014e7d29de7c8a4fb92b431839628274653d9525ec392b91c74557db51e043a898cc5423dbc346f8b95ec8f8ef50c90287d1166c52796afd0ade6861548aee80b8b80f32719f12361abb274ff0e4d98051753cc97d686c1201a41d5e9c6b66413c35db38c7eb3432f989b39dae9de6109c8486d3030999907ab2aefe668ea334bd6124227171a9f6cf5f48694bb311c70a9cf5a26301ea40b289444629435bb424ee4c1d0fc4b584aeee186e46e8f834e25664c780067c7846dd8de904502ee5d68125a504ef3daa982d484af38109db7874b7cdfae99fe47ddd21a823294fba2a2267ce2cba89e735d25f7f50eaaff27b1418f59193c711af7da1afd6cfe3d138c68c28ebc5d5628f1512197717735dc54b05cc4d7b9b5630f0517a1540b436725c012213228d0d372b605db60015fac9aa9c7d1ef7124e14f8bb9fb9175a609d018af3874f1e79aefd9e3b8741201542b4d3bea0fcf8a66e3dd4f05231f93be19cf76085e226f6b5ff31ac869ac0962e87b789e580b0513911a62725cf5a2ad169a98dacc396a0652fcd379450ffab5794424a24691c725624554701bfaf3f9cf54607829b84f580a5b9780005613c383d90f06e1e3840a0e59643625b165ea854ece43d807587cca92eb55b3615082935f8e6d2ac659a7ce01d324c8176d69538593c94130eb054a1fe0028c8dbd5735b50bf991347259b0a3669b72c42e86ef5ecd3ad29c48c7e4df7707fb95cc24c29c9667346c057f4c5bc91e73f417f618b1f6b5cc3b9ca57d2c1f12a2b9352e6af0d87b5113b47256a181376683cbb58834b8845116b75a530cf2910fbf26da793c80dff00388e506bc4656669fc2264bfdeb23b2b4bb1d1b1550d53d4a65e7877c1e499b074ed3b0dda828dca43596382ab924c2b7969af01099578eed2e2fce8d6fb0717c1a17fcd9022c282d1b76467c7b4e936a0372e7d73452cdb3f00b4d8bfc46feead86999d0456e366469d72137658dba25132c9548245e0486cb2e22f27f0eed711ef3a7ba79543fe6bd26a4e586a577ba334f9c44968e55d4981728bdabc3d7f54c03a98e82743837cffc3bf785f834f97f513b4797d52b060243fd3bc6dd929a10b690c36fcc0ae9e324372cfce55b1f059843c10af12f01ab9f418591a55fba737a8797be41b7ae5bd754d7e39423ef8701a84e969fe265bb7d07178dc1c0c231af347e0a5f8f4cc2b3434bbb3d2d463c7a462843c7cd9c7c16d698c2c2dd6817ba1232c6b4e070b18bb7a99d50626bdac199c6a9082a2c40d0300ffc9895f7a8d626ba0c3acd24f6fe487db5d4b2591709e1d091763e397136c372668b0e2dc0e74026dc6762517209dac3944a696e56385cb4a8af1a4fd7425299d5bd98bf38a43707ba8153b733e1c8bbcd4b48477771f07b33be542aac267ad987cd474eef9594e0c4b27949ce577b9925c58c275d465f411e82da5bfb53d54b0e77ebc9037dbaaf7dbd8680e09782cb7faee4eb16eb497c19133d5b6c8673c59a17abb4b6c3aa26e5c3189c7b0f14d54ee2e63acfcd8a679a3adf64f5918c50d174c8964937b50eea195400fc9acbd442505e099a168eab7605e54b61955fd9a2ffa932c578d60f36c7bbd59284d8dd5e8efe6a1d94e63155796e15af1c7c8014ee6426ee31631afe1f9bf5d1d904f8945dbf5d51fbe3194b1be9f40f603ac94db5d83b4e1dc63826f816005fcd34bea6193fc93aebfca10c09b1c8490975e90d2f51b842070604ed75435fd61f7d0bbe98652f5a38c4d05f397e71d7026f286c4ec7626f744af2975bdb6fa0e2a2e6182b274ab1c77cd943826669551be367d014b06480f726a4bf54f734332c9b3ac8b89d0ef598c5eefd824441af138a01da5d1ff3eebe95b2d04909ea82116c0a7b01d1ef04431830a54ba7a0b3a3bcc0a926d8223e695c0cebd272af6131991259167e47e7748f4cd4052f6644e9c692a1d4fa7eb02ad9fe7780efd87fa8b25cbf0e0eaecb1949d10065d96774d40a6a72ae3961d4953c94730d17c9ecf3f4501438ddeb38968009bad0754762e8f082ba552fe0fc8679ed68da58bcb742abe5f66afc04b5843619ffe49482172655f771738157835d2eb355ec8a6353f0a313397f9b3c79dbddbf0d17a19420161f79a454801df570e2c11b2c6e65701f7024fd2ea7de7c4144dc78d5955ca6746509711648f82201fe5930b5d3e8732fdf77b24983069cddabdf43c994de8685b660f85177d5a33ca070604139883377cf574d22949765ef39c9712473b610fcfaf3c7b250b174a933dcf32e9576082f3cd296254e25789daa6a9fb62e7e03468c978a44ef71c5a223fcfa6a860ffdd7a5464186c00159f996e301a4ec4c5ef37e4c746ac2c57265303fa418f2446699a9495d58d9092f6f0cd6df52721d5b6954c5d4ecdf1722eda56a230ed171d23ebd32d3186eba078b31ffe35e15ca52071c5ee59fadc18d8b937cd1bbca2706eff3b4766fed9efc698e742cc3f2397fc080c801ad96896decf6cbde990d837d250eb3c763a1d209e88a3decf5206dd5aad8bddad569e5ec32897bd49ed5e529db230b22b0ef83e42eb30a62e28e2ce1f918eca713f1c51da2d2895497196aedf39175096d80c20e680cffb9eec3008a92903b960485041bb0d1d1255c9414a8b3e3032eeefd1288f172775f6987ea81eb970cf74689cf1caf3259cf96fa519a9e8155502743d51a8b81218f4ebc352377d98f93518abecfefbc772c1b8f6e6dcafde95e4649c7189aa5e57b5bc9b5e8135a4270258b07628b7be8a941f1d35ee48badec4334b69bb22a897f4275265ba8c15f17cd871ed4d179a970c33685631453cb6cf44e68dad76c93d2ab133f0b015a7652bfd1c234390e0171348def3d74209500df98cf2fede6a1ac53e0606c6db7b908e754ae6883c5f30835b1d7b08190df28d6da1f7a224c79607910fd1b7fd2a48ea40862e102d208e6fd45d22d951c525c42407ba0fb51ef90f63b49710d6d45c9997b8642f139182c184433200ab79d5a4de30155509d5aa6bab94a990dcd542977e72f14774aa32d33420b1a616359468a5d26acb87e8623546570e7410f79a6d7fcf701bb0bf172b8c6eface2df26a237f8e09df9b92d9b9fc1905b58ceb59bbf07be604c67990400c1c1e514f5e077be5af3a51ce61baed7bff529db8c05e2cbc4fa68bfaf24e4055272fe00ef12e5e7dee1187bc48b4e6d1f8588e150d8262fc9c0de1b1700bcc4ff79d8a45aa7df2bb90121310fdd53e351e958823a0581dff6bbacc55809b07dc5c2af19a09ad167915c299a73b9412e0003eeccd0866ec6a8679b0d9f2e353aa027dd0f2449146c3304cc6f770edce926c5a2ae6d1dffe2cbbe5897b730889e79a87e8fb134a96b7b856ecd3f161d4c8629edf8c89262b423cf43dedc71e98c9fd315cc18e00508fbcb4dc771bd95ab5033f4235e0a6d484f7ac98f41c32d4ccf537478c618d737aa0b5f1ebab5d035c951824d1e653b373c04a17fdade8a3fb46a544e6beda498c180bfe2c3b7029bfb53bd7c21fd36f17d6792e776a5a299394a93ab20dc2d2690df85e9e13e63a03a75fac780826460a69ec0d4e2f096ddcb8d5076cabf1e6ff6d25b83f0825c768ad79d22f6dacd5a332b8cad29a91f55c6a0ddd4202648c696826dc75ec75c3594116b7078c8686886762da333f48c77b3731842984d7abd3f733f079161d94869ab3927858708e62e773dca70f8436ad85439d3336dfd88b1fb9c3f495384690ed6162648ca1bfe19d40934b0375bcf2436ab8ec7f1794cc3ade190583ceb0a79ab42e860a7841d6bdcce2fd068aaeb8d7dd90075aa5cbdb3e0762b6ed2b958864050e1be8fa252bdecfc9836d6de2478e96c49da78a31e3881653eda8199337a5d78119285558bb7e5f80a95f0ea449705c520d5787794281a20116d9a0a081a109ba314d7b41a1da28a81eb53e73a9fe758c9fe32ba6d41349889f28e90587e26d62f2c567e162e672ec32d04932e486ffc93136e89285de84872b8c870cf4ae08c59da12e20dc0ff421cfc42ccaea892225a835ea03749aee1f22e82519c0d3c54791ace6d347e1d9e46084e36c8b2424f83cf54b2c1f75fa83d97c4db954420e673d8c54de4446ec0f44909d14a2badffb6b11a31bd4a436e8cee01655bd303038c0536b811a46eab70be8d679b2246ba77317503c712384c452ebd51c1b1301c362e759d186c0c882d5bf77122f0f4c0121667fb1dd81caa3bbe4413644e66e224dc3d2cd6dd7c6041a0c40e3906901980f1a79e515705bd79b83bac4a888b39133b42b0c71ee19971d49ae6c95b8e9951bbfc0f5e257cb13547bb89b09c1224773f2969f671f2a463688cce44c2c265320cc0ff3fa6ee49e27a2f909e8205dc2e905a60069ff0cfbf285b51ba19ee8bad36073982ed46e9235b5fe307249369b2ecf7bf46d61a73c4e2b5502d296da31f38293e5416d9919ed864c4b1a05f65366e9cbef5fd83fcc1e6b72aa24621f5169a118bd476b2361fbb954f756b971e687f1972b82377e692816a7918deeb459bc98ff3f784e3664ce287c5d1365b7e300e4a6b323e5002bd3d62182a25fb035fa41bfe4f14084bd180e0507009072b08dc226604f1e1415a631a1347aaf9e5ba164579f074cf0cb88e9bce87e459887a2885b50a3e15259dd2631729c8519bbebd87f074b7851d08449de37d19bc6057d16e5ecd3b2214e81c15e002a9f85bfeefe247a277e7218ee4f1b048a23ad407c7625ca725aee8dfd3647427a44726b19717fe8810b0123d5922636bcaa581a084ea21573567d8c477429a72ee7d5d57e59755008b6e947653730dde43ff8cdf75a64f5ccb359cce937b930d11ace288a4e7b51cde35f6a59a67766582c28bdf298c2f5cd3b8cf22528843e8078df191b72f40cc67056a0524d30686552364505a36c4620523297e9b1950881385ef4d94b10c6291e69d9a8219076c4b0c6edc24e20032add4fc84eb522a8c1df8cddc230defb048506e3f6bd875e64aae75fae0de571e6f204fcb35e626f0deaed0c9ff3c5cd7327a6a444b3434d859d497ca245aa06c713fb268ffb5c0e471d9ce86bfdc8c26e9d55dc33c3f8a3e698c2d382c1cb9252ed828d242f33ab6d8bbcbd5af65c3a3acd318a10b8fbefcb2dd5a51f457df0d69ba21f6c84ffbcefa53f74dac944846d3e6ad108000f3269502f48c815f8dd6f33fd1fcf311c7c090b93199a064e5e63b052816ee240a1512fdcb72d304ee451d9df51f00ec1180541e6fb1e6630f1c93bcec2a72358f688b6140de99667616d6dada5cba75002ff3f8429c89988adb4ba6b201e35fdaf0e788bc4", 0x1000, 0x5}, {&(0x7f0000001140)="87441acbb4d9e401308fdb0b676f4d3e4b81a2ac796233c514cf595c603282ee2ef99e4e144d1804a4f7ad4d5ec01d56d22530bc75d4c4ceedf046a7e8b27353797b6635e5ac35d344bd62299b474bd1143595025d9fb9ce2aaa915e17e082b3fc0dd4f7725285f36438da60d3de43b90a77e018b1f106135f45b646ff1c8d260fb0422a9775e4e9c17d9f4cc869286c27684abbd057b6aabd8bbfb517368e8dec93670139d2ef0f1d47ec8f205be24bec6fea35a6a0b74c1090bfd1c0b9523e50b8b624bbe5c39af529ac18d0f052fcb4e416457ec35e5bef4ac07ba34847c81636d1cb87dd5e8c92675f", 0xeb, 0x3}, {&(0x7f0000001240)="fc853542f70c7b842d8e54610e875458d766cec9dca1161359f60853fed3442ebc8123e001a2f4c951d0d9a3fb40637405e12df1414de186c46622d08922407c2a06b366845e0a4763f46eb0f3b43f84bb393ead33b8a739010dd0071b4dfb9a0bdcfa9673239592de66547896131fc9573ec43c2b97905b888d629ce766aab994335b1c3ae4a2711d4b47c5e23f6d69d94f259bde12b3520a83b927c2316bc2f38fb035bf608c0628a613dc644ffc22c55902eef49e16ba548223b58c6bc0af8b0ae7d294c292df127ee20ddd6f6f1ba296a3315c74a706ecfa0c8d", 0xdc, 0xe37}, {&(0x7f0000001340)="ba3ba69def6c93716938e3d2352302d336b88e45e9e2b218d117450335d70da754a85f3c56a216758344f9798e40d610a782d28cf205b38ff6379979b7fda694ce46613e48e23250c353efd58665c7fcc05afa439a1472bee887cdfc69e3064f3677ed26d3907e2fee", 0x69, 0xfffffffffffffff8}, {&(0x7f00000013c0)="a3d010a9281c13d374816a47b739f8964d7471ac38f2a3921666bfb6de98a4b2719e46d5a2b7", 0x26, 0x5}, {&(0x7f0000001400)="023f66eab7e9bfe58b16604808a8817420dfdb50be7c0b641cb5659d264f24ea69cc03faf9f3362d7a3cacd1f8d83ce608031eee30c3ed5fad7984912522f8bbbc1e48a8186c63a669887895a6fe5c6dc6f8fa6c3fe65d25c7e8e64f335387aa45bbb95d4cec1699b4fa8c91334b1bd4d27de75a876f0617d8bbd9b3f4b42aebcec05ef56da57c77709eac38187fd524e72bee41387f9838ed02e46e7a9f19458de6a06654924545430448ac5b545e7b989cbd7b5f312e9adfe734d9996d98e5c0b64780d69e8be1dd88f4b95354d9c76f98b6955e5d3e2944910bea6d016ffd00663153322572b7b0716baada4f342458500bef447dc4aa", 0xf8, 0x1fab0c60}], 0x800, &(0x7f00000015c0)={[{}], [{@fsname={'fsname', 0x3d, 'btrfs\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'btrfs\x00'}}, {@uid_gt={'uid>', 0xee01}}]}) [ 637.030696] (syz-executor.1,19610,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu [ 637.030696] 6 [ 637.030696] " or missing value [ 637.039804] (syz-executor.0,19613,1):ocfs2_parse_options:1513 ERROR: Invalid heartbeat mount options 10:31:50 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x34, 0x0, 0x0) 10:31:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000002580000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 637.083744] (syz-executor.1,19610,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 637.086516] (syz-executor.0,19613,1):ocfs2_fill_super:1225 ERROR: status = -22 10:31:50 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x35, 0x0, 0x0) 10:31:50 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\tc6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:50 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x36, 0x0, 0x0) 10:31:50 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x14, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:50 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000070000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:50 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x37, 0x0, 0x0) 10:31:50 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000080000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 637.364059] (syz-executor.1,19651,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu c6 [ 637.364059] " or missing value [ 637.383787] (syz-executor.1,19651,1):ocfs2_fill_super:1225 ERROR: status = -22 10:31:50 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x38, 0x0, 0x0) 10:31:50 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t\x8d6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 637.509735] (syz-executor.0,19659,1):ocfs2_parse_options:1513 ERROR: Invalid heartbeat mount options [ 637.535288] (syz-executor.0,19659,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 637.641742] (syz-executor.1,19686,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu 6 [ 637.641742] " or missing value [ 637.654872] (syz-executor.1,19686,1):ocfs2_fill_super:1225 ERROR: status = -22 10:31:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000080)=[{&(0x7f0000000040)="cafa527a76d7b7", 0x7, 0xffffffff}], 0x0, &(0x7f0000000740)=ANY=[]) lsetxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8, 0x0) syz_mount_image$bfs(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', 0x1, 0xa, &(0x7f0000001880)=[{&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000001240)="43e33e497b178b00e675a6b2ae4f6f980c8b23af1618a799e3218e8247f6e3b66a99f7660411f1efbd1e390def654d492111a5e4b504c1c1f64f3a5c0954c1c1a577db49c8fc2b005bd080a9fddcaa1f87eeb22072cf4382343283d7b81be7afcc7d", 0x62, 0xecd9}, {&(0x7f00000012c0)="b2ee858e3496eb90e91e370ee3b6fd76effef6731f655d49c78186aa6fb0be44440de564ccfad8551659f6e450353372b540d3092b8121cfdb2f3fd711c46c774e4c27523838cc58bc979f0c5078a5c17b7f3930db928ffbac69dede7d0ad363ba6e4672ff6d8daee65636b81319ab0491e4bda20fe10e5ceaab5b3a7147a5e1785dd61756d9337d19939d135cb6fb8adaea25b75cbfe9775f16bd6667aa94a594a35085a75af1c4f172dc5130032a7b41d51a2fdfe8549dac474480cb126b1c22199491b21f2cc51f", 0xc9, 0x8}, {&(0x7f00000013c0)="a0b9f0620a71bb09aa23804214b5f7e21447768a62ab6c67500bd2c91b66a8d9e836c780a8e9214f78c9b32c78611dcb6c3268dc30d3a56f10a79efc4266983f1e9114b0926e51c76b68dbe04edf4967786e7be3f73ecf24d88d7a3ff820bfaccb1f8d06118bd91c9e6fa26cf1330f8ed504e332b376a5f4184e86f2c312d4abf2a7248d9a7a87677e17556f2410b68e9415e598983f315309d1e663a58a5b4ba2db23a856ed71849c34c3e96f74f38fdaaaf4d3801f1a9d0578b19d3793763e26d71bf3", 0xc4, 0x7ff}, {&(0x7f00000014c0)="28df5e4b5f73cea2b16bae779c59c0a24cc1c3dc315a4e8228a9fb7756c754f3666b581b8694f7dc91835260040b86d6ac014efc5825ef46fcdb42ea6ea8547396a14fd4431dbd5853254c35f0f9ad7b6cfdd96a778b59c9ab2683f250f1486fcd14f749814353a357003af711add5bbfba814ae229c02d496d7b7600064", 0x7e, 0xfffffffffffffffc}, {&(0x7f0000001540)="2655772355892c5f2a1babe89d283a14f2be4106cc50d8e84bbfa11e9b57eba77cb832fda86021a3d4efc8ec2b7684d160169a917304e7404fd153db869a78355823850a7086b62539262287a58c8b8804fdf589f9d5907b561364cf9f58873ff0a22e4287dd9318131fa3e7a8d0adb41f54a1eff5cc454fc261a40bc48a4e2a532c62586ec7de487b7e23ea5add848f4e6132ac1817567ad7cb76af7c3222a45abc0fd79051ad0edb6d9f6afc3cd929a3d9", 0xb2, 0x6}, {&(0x7f0000001600)="cd7b8e7aacd36f7cc8797af4d68882040b6f217b3af9fa7a7d42ca8563f25660570f11917cbbfc32b3ba7017f6cea2224b994956cd63b0223cf8f5ad823b9278e72617cb2d43b34f21005bf646cf5747d39c14f6b87ec9bd981180cd79096f74e0128efde59ec4769e2ba857d823a103b1687b06d11e6b4f66da8275", 0x7c, 0x8}, {&(0x7f0000001680)="585edf610133bc09a21ba3e382b56a93f917ae28c8c7754d75d9619674186f89ff14086e8042cd1a61874fd07376d3109abee58e517b7b4be0f77fff0a472e32bcadb3e06796fa950744523713d4354ffd6bafdbc5cdb3cad7851c4e6d8c34b17e70c31d278e9385b6e9feb9206126c1515855cafa472d9473c415967d50612f45a731aca9c2f388f3e6af58771043bab552c7c7", 0x94, 0x10001}, {&(0x7f0000001740), 0x0, 0x4}, {&(0x7f0000001780)="9d2ce8f04121bcb3f9ac19d3edc3d60a7f5b5db5e76dbd229588b7f164dd615b8db4bf4a55b18dc26824e87514235332fa4bfd434664ee23cade75ece839d63c2210bd5db5be72b7eae0ddebf87471f88d22c4af9ba7c96b11d1c660c48714710fa7661579871fe80918de21437bfae236970a736aa2806118d20b692161cad47e3feacad7a1388cb21f010db23928fa2dc2499a6a3a709b8f15956e6786656247847924ab029b54efd2335aa8417e13f601276d9aee84a10966b0bce976a108ff4bd824508dab55", 0xc8, 0x1}], 0x11800, &(0x7f0000001980)={[{'!)!'}, {}, {'$$\xba'}, {'trusted.overlay.redirect\x00'}, {'\xf3.\'+.,)\'~'}, {'(@:&&$(,$%'}], [{@uid_gt={'uid>', 0xee00}}]}) 10:31:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000015a0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:50 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x39, 0x0, 0x0) 10:31:50 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000090000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:50 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x52, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:50 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&\n\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 637.939565] orangefs_mount: mount request failed with -4 10:31:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000600000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:51 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3a, 0x0, 0x0) 10:31:51 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3b, 0x0, 0x0) [ 638.158828] (syz-executor.1,19713,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu & [ 638.158828] [ 638.158828] " or missing value [ 638.180162] (syz-executor.1,19713,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 638.195581] (syz-executor.0,19712,1):ocfs2_parse_options:1513 ERROR: Invalid heartbeat mount options 10:31:51 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3c, 0x0, 0x0) 10:31:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000100000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:51 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&#\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 638.218737] (syz-executor.0,19712,1):ocfs2_fill_super:1225 ERROR: status = -22 10:31:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000080)=[{&(0x7f0000000040)="cafa527a76d7b7", 0x7, 0xffffffff}], 0x0, &(0x7f0000000740)=ANY=[]) (async) lsetxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8, 0x0) (async) syz_mount_image$bfs(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', 0x1, 0xa, &(0x7f0000001880)=[{&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000001240)="43e33e497b178b00e675a6b2ae4f6f980c8b23af1618a799e3218e8247f6e3b66a99f7660411f1efbd1e390def654d492111a5e4b504c1c1f64f3a5c0954c1c1a577db49c8fc2b005bd080a9fddcaa1f87eeb22072cf4382343283d7b81be7afcc7d", 0x62, 0xecd9}, {&(0x7f00000012c0)="b2ee858e3496eb90e91e370ee3b6fd76effef6731f655d49c78186aa6fb0be44440de564ccfad8551659f6e450353372b540d3092b8121cfdb2f3fd711c46c774e4c27523838cc58bc979f0c5078a5c17b7f3930db928ffbac69dede7d0ad363ba6e4672ff6d8daee65636b81319ab0491e4bda20fe10e5ceaab5b3a7147a5e1785dd61756d9337d19939d135cb6fb8adaea25b75cbfe9775f16bd6667aa94a594a35085a75af1c4f172dc5130032a7b41d51a2fdfe8549dac474480cb126b1c22199491b21f2cc51f", 0xc9, 0x8}, {&(0x7f00000013c0)="a0b9f0620a71bb09aa23804214b5f7e21447768a62ab6c67500bd2c91b66a8d9e836c780a8e9214f78c9b32c78611dcb6c3268dc30d3a56f10a79efc4266983f1e9114b0926e51c76b68dbe04edf4967786e7be3f73ecf24d88d7a3ff820bfaccb1f8d06118bd91c9e6fa26cf1330f8ed504e332b376a5f4184e86f2c312d4abf2a7248d9a7a87677e17556f2410b68e9415e598983f315309d1e663a58a5b4ba2db23a856ed71849c34c3e96f74f38fdaaaf4d3801f1a9d0578b19d3793763e26d71bf3", 0xc4, 0x7ff}, {&(0x7f00000014c0)="28df5e4b5f73cea2b16bae779c59c0a24cc1c3dc315a4e8228a9fb7756c754f3666b581b8694f7dc91835260040b86d6ac014efc5825ef46fcdb42ea6ea8547396a14fd4431dbd5853254c35f0f9ad7b6cfdd96a778b59c9ab2683f250f1486fcd14f749814353a357003af711add5bbfba814ae229c02d496d7b7600064", 0x7e, 0xfffffffffffffffc}, {&(0x7f0000001540)="2655772355892c5f2a1babe89d283a14f2be4106cc50d8e84bbfa11e9b57eba77cb832fda86021a3d4efc8ec2b7684d160169a917304e7404fd153db869a78355823850a7086b62539262287a58c8b8804fdf589f9d5907b561364cf9f58873ff0a22e4287dd9318131fa3e7a8d0adb41f54a1eff5cc454fc261a40bc48a4e2a532c62586ec7de487b7e23ea5add848f4e6132ac1817567ad7cb76af7c3222a45abc0fd79051ad0edb6d9f6afc3cd929a3d9", 0xb2, 0x6}, {&(0x7f0000001600)="cd7b8e7aacd36f7cc8797af4d68882040b6f217b3af9fa7a7d42ca8563f25660570f11917cbbfc32b3ba7017f6cea2224b994956cd63b0223cf8f5ad823b9278e72617cb2d43b34f21005bf646cf5747d39c14f6b87ec9bd981180cd79096f74e0128efde59ec4769e2ba857d823a103b1687b06d11e6b4f66da8275", 0x7c, 0x8}, {&(0x7f0000001680)="585edf610133bc09a21ba3e382b56a93f917ae28c8c7754d75d9619674186f89ff14086e8042cd1a61874fd07376d3109abee58e517b7b4be0f77fff0a472e32bcadb3e06796fa950744523713d4354ffd6bafdbc5cdb3cad7851c4e6d8c34b17e70c31d278e9385b6e9feb9206126c1515855cafa472d9473c415967d50612f45a731aca9c2f388f3e6af58771043bab552c7c7", 0x94, 0x10001}, {&(0x7f0000001740), 0x0, 0x4}, {&(0x7f0000001780)="9d2ce8f04121bcb3f9ac19d3edc3d60a7f5b5db5e76dbd229588b7f164dd615b8db4bf4a55b18dc26824e87514235332fa4bfd434664ee23cade75ece839d63c2210bd5db5be72b7eae0ddebf87471f88d22c4af9ba7c96b11d1c660c48714710fa7661579871fe80918de21437bfae236970a736aa2806118d20b692161cad47e3feacad7a1388cb21f010db23928fa2dc2499a6a3a709b8f15956e6786656247847924ab029b54efd2335aa8417e13f601276d9aee84a10966b0bce976a108ff4bd824508dab55", 0xc8, 0x1}], 0x11800, &(0x7f0000001980)={[{'!)!'}, {}, {'$$\xba'}, {'trusted.overlay.redirect\x00'}, {'\xf3.\'+.,)\'~'}, {'(@:&&$(,$%'}], [{@uid_gt={'uid>', 0xee00}}]}) 10:31:51 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3d, 0x0, 0x0) 10:31:51 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x8d, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000680000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:51 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3e, 0x0, 0x0) 10:31:51 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x41, 0x0, 0x0) 10:31:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000003690000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 638.488499] (syz-executor.1,19749,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &# [ 638.488499] " or missing value [ 638.527497] (syz-executor.0,19769,0):ocfs2_parse_options:1513 ERROR: Invalid heartbeat mount options 10:31:51 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x42, 0x0, 0x0) 10:31:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000080)=[{&(0x7f0000000040)="cafa527a76d7b7", 0x7, 0xffffffff}], 0x0, &(0x7f0000000740)=ANY=[]) (async) lsetxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8, 0x0) (async) syz_mount_image$bfs(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', 0x1, 0xa, &(0x7f0000001880)=[{&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000001240)="43e33e497b178b00e675a6b2ae4f6f980c8b23af1618a799e3218e8247f6e3b66a99f7660411f1efbd1e390def654d492111a5e4b504c1c1f64f3a5c0954c1c1a577db49c8fc2b005bd080a9fddcaa1f87eeb22072cf4382343283d7b81be7afcc7d", 0x62, 0xecd9}, {&(0x7f00000012c0)="b2ee858e3496eb90e91e370ee3b6fd76effef6731f655d49c78186aa6fb0be44440de564ccfad8551659f6e450353372b540d3092b8121cfdb2f3fd711c46c774e4c27523838cc58bc979f0c5078a5c17b7f3930db928ffbac69dede7d0ad363ba6e4672ff6d8daee65636b81319ab0491e4bda20fe10e5ceaab5b3a7147a5e1785dd61756d9337d19939d135cb6fb8adaea25b75cbfe9775f16bd6667aa94a594a35085a75af1c4f172dc5130032a7b41d51a2fdfe8549dac474480cb126b1c22199491b21f2cc51f", 0xc9, 0x8}, {&(0x7f00000013c0)="a0b9f0620a71bb09aa23804214b5f7e21447768a62ab6c67500bd2c91b66a8d9e836c780a8e9214f78c9b32c78611dcb6c3268dc30d3a56f10a79efc4266983f1e9114b0926e51c76b68dbe04edf4967786e7be3f73ecf24d88d7a3ff820bfaccb1f8d06118bd91c9e6fa26cf1330f8ed504e332b376a5f4184e86f2c312d4abf2a7248d9a7a87677e17556f2410b68e9415e598983f315309d1e663a58a5b4ba2db23a856ed71849c34c3e96f74f38fdaaaf4d3801f1a9d0578b19d3793763e26d71bf3", 0xc4, 0x7ff}, {&(0x7f00000014c0)="28df5e4b5f73cea2b16bae779c59c0a24cc1c3dc315a4e8228a9fb7756c754f3666b581b8694f7dc91835260040b86d6ac014efc5825ef46fcdb42ea6ea8547396a14fd4431dbd5853254c35f0f9ad7b6cfdd96a778b59c9ab2683f250f1486fcd14f749814353a357003af711add5bbfba814ae229c02d496d7b7600064", 0x7e, 0xfffffffffffffffc}, {&(0x7f0000001540)="2655772355892c5f2a1babe89d283a14f2be4106cc50d8e84bbfa11e9b57eba77cb832fda86021a3d4efc8ec2b7684d160169a917304e7404fd153db869a78355823850a7086b62539262287a58c8b8804fdf589f9d5907b561364cf9f58873ff0a22e4287dd9318131fa3e7a8d0adb41f54a1eff5cc454fc261a40bc48a4e2a532c62586ec7de487b7e23ea5add848f4e6132ac1817567ad7cb76af7c3222a45abc0fd79051ad0edb6d9f6afc3cd929a3d9", 0xb2, 0x6}, {&(0x7f0000001600)="cd7b8e7aacd36f7cc8797af4d68882040b6f217b3af9fa7a7d42ca8563f25660570f11917cbbfc32b3ba7017f6cea2224b994956cd63b0223cf8f5ad823b9278e72617cb2d43b34f21005bf646cf5747d39c14f6b87ec9bd981180cd79096f74e0128efde59ec4769e2ba857d823a103b1687b06d11e6b4f66da8275", 0x7c, 0x8}, {&(0x7f0000001680)="585edf610133bc09a21ba3e382b56a93f917ae28c8c7754d75d9619674186f89ff14086e8042cd1a61874fd07376d3109abee58e517b7b4be0f77fff0a472e32bcadb3e06796fa950744523713d4354ffd6bafdbc5cdb3cad7851c4e6d8c34b17e70c31d278e9385b6e9feb9206126c1515855cafa472d9473c415967d50612f45a731aca9c2f388f3e6af58771043bab552c7c7", 0x94, 0x10001}, {&(0x7f0000001740), 0x0, 0x4}, {&(0x7f0000001780)="9d2ce8f04121bcb3f9ac19d3edc3d60a7f5b5db5e76dbd229588b7f164dd615b8db4bf4a55b18dc26824e87514235332fa4bfd434664ee23cade75ece839d63c2210bd5db5be72b7eae0ddebf87471f88d22c4af9ba7c96b11d1c660c48714710fa7661579871fe80918de21437bfae236970a736aa2806118d20b692161cad47e3feacad7a1388cb21f010db23928fa2dc2499a6a3a709b8f15956e6786656247847924ab029b54efd2335aa8417e13f601276d9aee84a10966b0bce976a108ff4bd824508dab55", 0xc8, 0x1}], 0x11800, &(0x7f0000001980)={[{'!)!'}, {}, {'$$\xba'}, {'trusted.overlay.redirect\x00'}, {'\xf3.\'+.,)\'~'}, {'(@:&&$(,$%'}], [{@uid_gt={'uid>', 0xee00}}]}) [ 638.529212] (syz-executor.1,19749,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 638.552945] (syz-executor.0,19769,0):ocfs2_fill_super:1225 ERROR: status = -22 10:31:51 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x43, 0x0, 0x0) 10:31:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000000000001f0000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:51 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&+\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:51 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x3c7, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000006c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:51 executing program 3: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x2, 0x36c, [0x20000140, 0x0, 0x0, 0x20000306, 0x20000336], 0x0, &(0x7f0000000040), &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{0x5, 0x40, 0xfbfb, 'dummy0\x00', 'ip6erspan0\x00', 'wg2\x00', 'bridge_slave_0\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x25}, [0x0, 0xff, 0x0, 0xff, 0x0, 0xff], 0x12e, 0x15e, 0x196, [@physdev={{'physdev\x00', 0x0, 0x48}, {{'hsr0\x00', {}, 'macsec0\x00', {0xff}, 0x5}}}, @ipvs={{'ipvs\x00', 0x0, 0x28}, {{@ipv6=@ipv4={'\x00', '\xff\xff', @remote}, [0xff, 0x0, 0xff000000, 0xffffffff], 0x4e22, 0x11, 0x3, 0x4e20, 0x4, 0x1}}}], [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x8}}}], @arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{0x11, 0x32, 0xf7, 'netdevsim0\x00', 'veth0_to_hsr\x00', 'gretap0\x00', 'veth1_to_bridge\x00', @random="4a638de0756f", [0x0, 0xff, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0x0, 0x0, 0xff], 0x6e, 0xde, 0x116, [], [@arpreply={'arpreply\x00', 0x10, {{@empty, 0xfffffffffffffffd}}}, @snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}], @snat={'snat\x00', 0x10, {{@random="a858d0691eaa", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}]}, 0x3e4) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) 10:31:51 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x44, 0x0, 0x0) 10:31:51 executing program 3: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x2, 0x36c, [0x20000140, 0x0, 0x0, 0x20000306, 0x20000336], 0x0, &(0x7f0000000040), &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{0x5, 0x40, 0xfbfb, 'dummy0\x00', 'ip6erspan0\x00', 'wg2\x00', 'bridge_slave_0\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x25}, [0x0, 0xff, 0x0, 0xff, 0x0, 0xff], 0x12e, 0x15e, 0x196, [@physdev={{'physdev\x00', 0x0, 0x48}, {{'hsr0\x00', {}, 'macsec0\x00', {0xff}, 0x5}}}, @ipvs={{'ipvs\x00', 0x0, 0x28}, {{@ipv6=@ipv4={'\x00', '\xff\xff', @remote}, [0xff, 0x0, 0xff000000, 0xffffffff], 0x4e22, 0x11, 0x3, 0x4e20, 0x4, 0x1}}}], [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x8}}}], @arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{0x11, 0x32, 0xf7, 'netdevsim0\x00', 'veth0_to_hsr\x00', 'gretap0\x00', 'veth1_to_bridge\x00', @random="4a638de0756f", [0x0, 0xff, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0x0, 0x0, 0xff], 0x6e, 0xde, 0x116, [], [@arpreply={'arpreply\x00', 0x10, {{@empty, 0xfffffffffffffffd}}}, @snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}], @snat={'snat\x00', 0x10, {{@random="a858d0691eaa", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}]}, 0x3e4) (async) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) 10:31:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000200000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:51 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x45, 0x0, 0x0) 10:31:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000700000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:51 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x46, 0x0, 0x0) [ 639.011836] (syz-executor.0,19811,0):ocfs2_parse_options:1513 ERROR: Invalid heartbeat mount options [ 639.046230] (syz-executor.0,19811,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 639.047121] (syz-executor.1,19818,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &+ [ 639.047121] " or missing value 10:31:52 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x47, 0x0, 0x0) 10:31:52 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x4800, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 639.093801] (syz-executor.1,19818,1):ocfs2_fill_super:1225 ERROR: status = -22 10:31:52 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&-\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000230000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:52 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x48, 0x0, 0x0) 10:31:52 executing program 3: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x2, 0x36c, [0x20000140, 0x0, 0x0, 0x20000306, 0x20000336], 0x0, &(0x7f0000000040), &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{0x5, 0x40, 0xfbfb, 'dummy0\x00', 'ip6erspan0\x00', 'wg2\x00', 'bridge_slave_0\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x25}, [0x0, 0xff, 0x0, 0xff, 0x0, 0xff], 0x12e, 0x15e, 0x196, [@physdev={{'physdev\x00', 0x0, 0x48}, {{'hsr0\x00', {}, 'macsec0\x00', {0xff}, 0x5}}}, @ipvs={{'ipvs\x00', 0x0, 0x28}, {{@ipv6=@ipv4={'\x00', '\xff\xff', @remote}, [0xff, 0x0, 0xff000000, 0xffffffff], 0x4e22, 0x11, 0x3, 0x4e20, 0x4, 0x1}}}], [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x8}}}], @arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{0x11, 0x32, 0xf7, 'netdevsim0\x00', 'veth0_to_hsr\x00', 'gretap0\x00', 'veth1_to_bridge\x00', @random="4a638de0756f", [0x0, 0xff, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0x0, 0x0, 0xff], 0x6e, 0xde, 0x116, [], [@arpreply={'arpreply\x00', 0x10, {{@empty, 0xfffffffffffffffd}}}, @snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}], @snat={'snat\x00', 0x10, {{@random="a858d0691eaa", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}]}, 0x3e4) (async) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) 10:31:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000720000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:52 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x49, 0x0, 0x0) 10:31:52 executing program 3: r0 = syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8755604932133e704997d7b9bff1e8752043d8894e54bb598ad4027c9bcba7eddc9c84ccc450aee51054fddbd6cdb522b4e126b5816caf63cc2f4f5748ea82363bebdca6e7225bafcd6724dbdc2afb1069ec761e224035e11f99dcb046e0affda10af4cd9e0b85acc55642322c8da2893c9327c7a4cb008c414fbb1ba826a4ff1a6b8c28c556952380e964c39f53e2293ea7f953eaa4c0e79755c3a2ac8710595917b32fa253105480b16b3a7643f2651c7b216893ff28efbaa7c194", @ANYRES64, @ANYRES64=r0, @ANYRES32=r1], 0xff01) statx(r1, &(0x7f0000000040)='./file0\x00', 0x400, 0x2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x22, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@afid={'afid', 0x3d, 0xffff}}, {@noextend}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@afid={'afid', 0x3d, 0x6}}, {@cache_none}, {@aname={'aname', 0x3d, '&/:\x8d'}}, {@uname={'uname', 0x3d, '$!8'}}, {@access_any}], [{@fowner_eq={'fowner', 0x3d, r2}}, {@audit}, {@subj_type={'subj_type', 0x3d, '!['}}, {@obj_user={'obj_user', 0x3d, '.\'U!'}}, {@subj_role={'subj_role', 0x3d, 'btrfs\x00'}}, {@appraise_type}]}}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, &(0x7f0000002400)=ANY=[], 0xff01) utimensat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0) 10:31:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000000000003f0000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:52 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x4a, 0x0, 0x0) 10:31:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000740000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 639.493296] (syz-executor.1,19869,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &- [ 639.493296] " or missing value 10:31:52 executing program 3: r0 = syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8755604932133e704997d7b9bff1e8752043d8894e54bb598ad4027c9bcba7eddc9c84ccc450aee51054fddbd6cdb522b4e126b5816caf63cc2f4f5748ea82363bebdca6e7225bafcd6724dbdc2afb1069ec761e224035e11f99dcb046e0affda10af4cd9e0b85acc55642322c8da2893c9327c7a4cb008c414fbb1ba826a4ff1a6b8c28c556952380e964c39f53e2293ea7f953eaa4c0e79755c3a2ac8710595917b32fa253105480b16b3a7643f2651c7b216893ff28efbaa7c194", @ANYRES64, @ANYRES64=r0, @ANYRES32=r1], 0xff01) statx(r1, &(0x7f0000000040)='./file0\x00', 0x400, 0x2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x22, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@afid={'afid', 0x3d, 0xffff}}, {@noextend}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@afid={'afid', 0x3d, 0x6}}, {@cache_none}, {@aname={'aname', 0x3d, '&/:\x8d'}}, {@uname={'uname', 0x3d, '$!8'}}, {@access_any}], [{@fowner_eq={'fowner', 0x3d, r2}}, {@audit}, {@subj_type={'subj_type', 0x3d, '!['}}, {@obj_user={'obj_user', 0x3d, '.\'U!'}}, {@subj_role={'subj_role', 0x3d, 'btrfs\x00'}}, {@appraise_type}]}}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, &(0x7f0000002400)=ANY=[], 0xff01) (async, rerun: 32) utimensat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0) (rerun: 32) [ 639.563884] (syz-executor.1,19869,0):ocfs2_fill_super:1225 ERROR: status = -22 10:31:53 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x72dfdc67, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:53 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x4b, 0x0, 0x0) 10:31:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000480000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:53 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&0\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000007a0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000001800000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:53 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x4c, 0x0, 0x0) 10:31:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000000000004c0000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 640.279335] (syz-executor.1,19936,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &0 [ 640.279335] " or missing value 10:31:53 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x4d, 0x0, 0x0) [ 640.360808] (syz-executor.1,19936,0):ocfs2_fill_super:1225 ERROR: status = -22 10:31:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ecb3cb8a0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000005f42485266535f4d0000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:53 executing program 3: r0 = syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8755604932133e704997d7b9bff1e8752043d8894e54bb598ad4027c9bcba7eddc9c84ccc450aee51054fddbd6cdb522b4e126b5816caf63cc2f4f5748ea82363bebdca6e7225bafcd6724dbdc2afb1069ec761e224035e11f99dcb046e0affda10af4cd9e0b85acc55642322c8da2893c9327c7a4cb008c414fbb1ba826a4ff1a6b8c28c556952380e964c39f53e2293ea7f953eaa4c0e79755c3a2ac8710595917b32fa253105480b16b3a7643f2651c7b216893ff28efbaa7c194", @ANYRES64, @ANYRES64=r0, @ANYRES32=r1], 0xff01) statx(r1, &(0x7f0000000040)='./file0\x00', 0x400, 0x2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x22, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@afid={'afid', 0x3d, 0xffff}}, {@noextend}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@afid={'afid', 0x3d, 0x6}}, {@cache_none}, {@aname={'aname', 0x3d, '&/:\x8d'}}, {@uname={'uname', 0x3d, '$!8'}}, {@access_any}], [{@fowner_eq={'fowner', 0x3d, r2}}, {@audit}, {@subj_type={'subj_type', 0x3d, '!['}}, {@obj_user={'obj_user', 0x3d, '.\'U!'}}, {@subj_role={'subj_role', 0x3d, 'btrfs\x00'}}, {@appraise_type}]}}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, &(0x7f0000002400)=ANY=[], 0xff01) utimensat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) (async) pipe(&(0x7f0000000140)) (async) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8755604932133e704997d7b9bff1e8752043d8894e54bb598ad4027c9bcba7eddc9c84ccc450aee51054fddbd6cdb522b4e126b5816caf63cc2f4f5748ea82363bebdca6e7225bafcd6724dbdc2afb1069ec761e224035e11f99dcb046e0affda10af4cd9e0b85acc55642322c8da2893c9327c7a4cb008c414fbb1ba826a4ff1a6b8c28c556952380e964c39f53e2293ea7f953eaa4c0e79755c3a2ac8710595917b32fa253105480b16b3a7643f2651c7b216893ff28efbaa7c194", @ANYRES64, @ANYRES64=r0, @ANYRES32=r1], 0xff01) (async) statx(r1, &(0x7f0000000040)='./file0\x00', 0x400, 0x2, &(0x7f0000000140)) (async) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x22, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@afid={'afid', 0x3d, 0xffff}}, {@noextend}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@afid={'afid', 0x3d, 0x6}}, {@cache_none}, {@aname={'aname', 0x3d, '&/:\x8d'}}, {@uname={'uname', 0x3d, '$!8'}}, {@access_any}], [{@fowner_eq={'fowner', 0x3d, r2}}, {@audit}, {@subj_type={'subj_type', 0x3d, '!['}}, {@obj_user={'obj_user', 0x3d, '.\'U!'}}, {@subj_role={'subj_role', 0x3d, 'btrfs\x00'}}, {@appraise_type}]}}) (async) pipe(&(0x7f0000000140)) (async) write$binfmt_misc(r4, &(0x7f0000002400)=ANY=[], 0xff01) (async) utimensat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0) (async) 10:31:53 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x72dfdcd2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:53 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&\x8d\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:53 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x4e, 0x0, 0x0) 10:31:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000004d5f53665248425f0000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040), 0x400000, 0x0) r1 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) sendfile(r0, r1, 0x0, 0x2d) 10:31:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000038d0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:54 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x4f, 0x0, 0x0) [ 641.120571] (syz-executor.1,20009,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu & [ 641.120571] " or missing value [ 641.144120] (syz-executor.1,20009,0):ocfs2_fill_super:1225 ERROR: status = -22 10:31:54 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x50, 0x0, 0x0) 10:31:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000680000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) (async) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040), 0x400000, 0x0) r1 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) sendfile(r0, r1, 0x0, 0x2d) 10:31:54 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\x14\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 641.499825] (syz-executor.1,20041,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6" or missing value [ 641.521863] (syz-executor.1,20041,0):ocfs2_fill_super:1225 ERROR: status = -22 10:31:54 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='\n?,', 0x3}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000002900000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:54 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x51, 0x0, 0x0) 10:31:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000000000006c0000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040), 0x400000, 0x0) (async, rerun: 64) r1 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (rerun: 64) sendfile(r0, r1, 0x0, 0x2d) 10:31:54 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\x16\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000740000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:54 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x52, 0x0, 0x0) 10:31:54 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000002400)=ANY=[], 0xff01) ioctl$UI_DEV_CREATE(r0, 0x5501) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) [ 642.017873] (syz-executor.1,20077,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6" or missing value [ 642.032900] (syz-executor.1,20077,0):ocfs2_fill_super:1225 ERROR: status = -22 10:31:55 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6%\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:55 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x53, 0x0, 0x0) [ 642.097235] (syz-executor.0,20078,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 642.097235] " or missing value 10:31:55 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x54, 0x0, 0x0) [ 642.138185] (syz-executor.0,20078,0):ocfs2_fill_super:1225 ERROR: status = -22 10:31:55 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='%?,', 0x3}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000910000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000000000007a0000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:55 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000002400)=ANY=[], 0xff01) (async) ioctl$UI_DEV_CREATE(r0, 0x5501) (async, rerun: 32) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) (rerun: 32) [ 642.285330] (syz-executor.1,20110,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6%" or missing value 10:31:55 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x55, 0x0, 0x0) 10:31:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000ecb3cb8a0000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 642.334838] (syz-executor.1,20110,1):ocfs2_fill_super:1225 ERROR: status = -22 10:31:55 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x56, 0x0, 0x0) 10:31:55 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6R\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:55 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x57, 0x0, 0x0) 10:31:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000002920000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 642.480369] (syz-executor.0,20127,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 642.480369] " or missing value [ 642.517703] (syz-executor.0,20127,1):ocfs2_fill_super:1225 ERROR: status = -22 10:31:55 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x58, 0x0, 0x0) 10:31:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000ffffff8c0000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:55 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)="8d3f2c", 0x3}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:55 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x59, 0x0, 0x0) [ 642.660175] (syz-executor.1,20155,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6R" or missing value [ 642.671949] (syz-executor.1,20155,0):ocfs2_fill_super:1225 ERROR: status = -22 10:31:55 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\x8d\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 642.928736] (syz-executor.0,20188,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 642.928736] " or missing value [ 642.942368] (syz-executor.0,20188,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 642.967472] (syz-executor.1,20185,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6" or missing value [ 642.988042] (syz-executor.1,20185,1):ocfs2_fill_super:1225 ERROR: status = -22 10:31:56 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000002400)=ANY=[], 0xff01) (async) ioctl$UI_DEV_CREATE(r0, 0x5501) (async) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) 10:31:56 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x5a, 0x0, 0x0) 10:31:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff970000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000ffffff970000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:56 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a<,', 0x3}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:56 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\x8f\x01\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:56 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x5b, 0x0, 0x0) 10:31:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000fffffff50000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000039b0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:56 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='nr0\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) splice(r0, 0x0, r1, 0x0, 0x10003, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f0000000040)={0x477c, 0x200, 0x3e586adf3ef1d142, 0x1}) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$gfs2meta(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x18000000000000, 0x3, &(0x7f0000000500)=[{&(0x7f0000000280)="6bbe0ae22112109227580b69917314e361586578c5eb8e7ae7f53871d7fdf9092b54c82da9425a82771b948b77f6605f411e771d8590b77608a6232283ac12bf4402f8c397a36836bf70b4bbe1ac3d2b77cb9483", 0x54, 0x10001}, {&(0x7f0000000300)="4a4dada4e11795c937c4ba0a982aae1cf71c7e326cc3015a7af900a8defd040974ad6dd2f3053b10a94d33a3a32136591614621ca3673d5dc266ffcfedf5b401a0b8c8a3a1a65f14245a88c16ced9ffa154e91394f76e0d87fe9067b200a3767aceb6c62fc60c595b5ab2e6b526a16773598cc4deb5c0b53bbd5b4c67481d1b1da42c9c408b70547785e435b970e85d2f751bf763dd50058eb31bf841b0a8eb0ca7936935f39c9fb0a0726ac94c6faa928532786c5be2349ef94335a3a65b414fa915ba005fdc15217abc823e59f0d0525d886f234adb7cd546b16d2d6b8f0e5f5bb3f48", 0xe4, 0x7fffffff}, {&(0x7f0000000400)="bcfe9f3786763475818cec57e2536d85a4208f25bbfe0baac1ba1d7c1daf88722e603b6b70a4e5d70930d4a907ccdaed6637edd82a18ff8ae4b6c1929cac8965f8c0cfbbb0e97a8be85cab93abda563f99a17909add1cee127787e75ec5586ad056c5a07cc05cc9482a5da32c360d9964288757957f39e8b1637843125b426cc4bb1d949843ccb15e4787eb7f3e0b7af96d130f2147f6d79b19df9d566338c0247e75ed4d745ef4c9da0da3e23159636bd5383acb78c31d15096b2a62cf3cc2f57596b0834f9a57c0ca73e13f69832804f46", 0xd2, 0x5b0cd53b}], 0x24, &(0x7f0000000580)={[{'\\&&^'}], [{@hash}]}) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) splice(r2, 0x0, r3, 0x0, 0x10003, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="00000000000010002e2f66696c653000"]) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000001c0)={0x6, 0x1, 0x4005, 0xd04, 0x2}, 0x14) 10:31:56 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x5c, 0x0, 0x0) [ 643.390381] (syz-executor.1,20231,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6" or missing value [ 643.423700] (syz-executor.1,20231,1):ocfs2_fill_super:1225 ERROR: status = -22 10:31:56 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\xc9\x04\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 643.518119] (syz-executor.0,20235,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 643.518119] " or missing value [ 643.531742] (syz-executor.0,20235,0):ocfs2_fill_super:1225 ERROR: status = -22 10:31:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000fffffff60000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:56 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x5d, 0x0, 0x0) 10:31:56 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='aR,', 0x3}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:56 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x5e, 0x0, 0x0) [ 643.748176] (syz-executor.1,20277,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6" or missing value [ 643.760414] (syz-executor.1,20277,1):ocfs2_fill_super:1225 ERROR: status = -22 10:31:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000009f0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:56 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x5f, 0x0, 0x0) 10:31:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000fffffdfc0000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:56 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\xdb\x05\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:56 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x60, 0x0, 0x0) [ 643.938810] (syz-executor.0,20297,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 643.938810] " or missing value [ 643.955734] (syz-executor.0,20297,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 644.111462] (syz-executor.1,20323,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6" or missing value [ 644.199204] (syz-executor.1,20323,0):ocfs2_fill_super:1225 ERROR: status = -22 10:31:57 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff}) (async) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) (async, rerun: 32) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='nr0\x00', 0x10) (async, rerun: 32) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) (async) splice(r0, 0x0, r1, 0x0, 0x10003, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f0000000040)={0x477c, 0x200, 0x3e586adf3ef1d142, 0x1}) (async) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff}) (async) r3 = socket$inet_tcp(0x2, 0x1, 0x0) (async) syz_mount_image$gfs2meta(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x18000000000000, 0x3, &(0x7f0000000500)=[{&(0x7f0000000280)="6bbe0ae22112109227580b69917314e361586578c5eb8e7ae7f53871d7fdf9092b54c82da9425a82771b948b77f6605f411e771d8590b77608a6232283ac12bf4402f8c397a36836bf70b4bbe1ac3d2b77cb9483", 0x54, 0x10001}, {&(0x7f0000000300)="4a4dada4e11795c937c4ba0a982aae1cf71c7e326cc3015a7af900a8defd040974ad6dd2f3053b10a94d33a3a32136591614621ca3673d5dc266ffcfedf5b401a0b8c8a3a1a65f14245a88c16ced9ffa154e91394f76e0d87fe9067b200a3767aceb6c62fc60c595b5ab2e6b526a16773598cc4deb5c0b53bbd5b4c67481d1b1da42c9c408b70547785e435b970e85d2f751bf763dd50058eb31bf841b0a8eb0ca7936935f39c9fb0a0726ac94c6faa928532786c5be2349ef94335a3a65b414fa915ba005fdc15217abc823e59f0d0525d886f234adb7cd546b16d2d6b8f0e5f5bb3f48", 0xe4, 0x7fffffff}, {&(0x7f0000000400)="bcfe9f3786763475818cec57e2536d85a4208f25bbfe0baac1ba1d7c1daf88722e603b6b70a4e5d70930d4a907ccdaed6637edd82a18ff8ae4b6c1929cac8965f8c0cfbbb0e97a8be85cab93abda563f99a17909add1cee127787e75ec5586ad056c5a07cc05cc9482a5da32c360d9964288757957f39e8b1637843125b426cc4bb1d949843ccb15e4787eb7f3e0b7af96d130f2147f6d79b19df9d566338c0247e75ed4d745ef4c9da0da3e23159636bd5383acb78c31d15096b2a62cf3cc2f57596b0834f9a57c0ca73e13f69832804f46", 0xd2, 0x5b0cd53b}], 0x24, &(0x7f0000000580)={[{'\\&&^'}], [{@hash}]}) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) (async) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) (async) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) (async) splice(r2, 0x0, r3, 0x0, 0x10003, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="00000000000010002e2f66696c653000"]) (async) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000001c0)={0x6, 0x1, 0x4005, 0xd04, 0x2}, 0x14) 10:31:57 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x61, 0x0, 0x0) 10:31:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000001a00000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000fffffdfd0000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:57 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)="618d2c", 0x3}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:57 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\xbcv\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:57 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x62, 0x0, 0x0) 10:31:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000fffffffd0000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:57 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x63, 0x0, 0x0) [ 644.569669] (syz-executor.1,20347,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6v" or missing value [ 644.583010] (syz-executor.1,20347,1):ocfs2_fill_super:1225 ERROR: status = -22 10:31:57 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) (async) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='nr0\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) (async) splice(r0, 0x0, r1, 0x0, 0x10003, 0x0) (async) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f0000000040)={0x477c, 0x200, 0x3e586adf3ef1d142, 0x1}) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) (async, rerun: 32) pipe(&(0x7f0000000140)={0xffffffffffffffff}) (rerun: 32) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$gfs2meta(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x18000000000000, 0x3, &(0x7f0000000500)=[{&(0x7f0000000280)="6bbe0ae22112109227580b69917314e361586578c5eb8e7ae7f53871d7fdf9092b54c82da9425a82771b948b77f6605f411e771d8590b77608a6232283ac12bf4402f8c397a36836bf70b4bbe1ac3d2b77cb9483", 0x54, 0x10001}, {&(0x7f0000000300)="4a4dada4e11795c937c4ba0a982aae1cf71c7e326cc3015a7af900a8defd040974ad6dd2f3053b10a94d33a3a32136591614621ca3673d5dc266ffcfedf5b401a0b8c8a3a1a65f14245a88c16ced9ffa154e91394f76e0d87fe9067b200a3767aceb6c62fc60c595b5ab2e6b526a16773598cc4deb5c0b53bbd5b4c67481d1b1da42c9c408b70547785e435b970e85d2f751bf763dd50058eb31bf841b0a8eb0ca7936935f39c9fb0a0726ac94c6faa928532786c5be2349ef94335a3a65b414fa915ba005fdc15217abc823e59f0d0525d886f234adb7cd546b16d2d6b8f0e5f5bb3f48", 0xe4, 0x7fffffff}, {&(0x7f0000000400)="bcfe9f3786763475818cec57e2536d85a4208f25bbfe0baac1ba1d7c1daf88722e603b6b70a4e5d70930d4a907ccdaed6637edd82a18ff8ae4b6c1929cac8965f8c0cfbbb0e97a8be85cab93abda563f99a17909add1cee127787e75ec5586ad056c5a07cc05cc9482a5da32c360d9964288757957f39e8b1637843125b426cc4bb1d949843ccb15e4787eb7f3e0b7af96d130f2147f6d79b19df9d566338c0247e75ed4d745ef4c9da0da3e23159636bd5383acb78c31d15096b2a62cf3cc2f57596b0834f9a57c0ca73e13f69832804f46", 0xd2, 0x5b0cd53b}], 0x24, &(0x7f0000000580)={[{'\\&&^'}], [{@hash}]}) (async) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) (async) setsockopt$sock_timeval(r3, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) (async) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) (async) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) splice(r2, 0x0, r3, 0x0, 0x10003, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="00000000000010002e2f66696c653000"]) (async) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000001c0)={0x6, 0x1, 0x4005, 0xd04, 0x2}, 0x14) [ 644.676961] (syz-executor.0,20348,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 644.676961] " or missing value [ 644.689785] (syz-executor.0,20348,1):ocfs2_fill_super:1225 ERROR: status = -22 10:31:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000a10000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:57 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x64, 0x0, 0x0) 10:31:57 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?\n', 0x3}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:57 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x02\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000000fff0000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000001fffff0000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000ba0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:58 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x65, 0x0, 0x0) 10:31:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[]) [ 645.361979] (syz-executor.0,20398,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 645.361979] " or missing value [ 645.380491] (syz-executor.1,20406,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 645.380491] " or missing value 10:31:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000ffffffff0000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 645.409335] (syz-executor.0,20398,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 645.418281] (syz-executor.1,20406,1):ocfs2_fill_super:1225 ERROR: status = -22 10:31:58 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x66, 0x0, 0x0) 10:31:58 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?%', 0x3}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:58 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x03\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000023fc10000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:58 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x67, 0x0, 0x0) 10:31:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[]) 10:31:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000020000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:58 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x68, 0x0, 0x0) [ 645.692347] (syz-executor.0,20454,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 645.692347] " or missing value [ 645.713583] (syz-executor.0,20454,0):ocfs2_fill_super:1225 ERROR: status = -22 10:31:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000023fc20000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:58 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?R', 0x3}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000030000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:58 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x69, 0x0, 0x0) [ 645.828270] (syz-executor.1,20455,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 645.828270] " or missing value [ 645.855111] (syz-executor.1,20455,0):ocfs2_fill_super:1225 ERROR: status = -22 10:31:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[]) 10:31:58 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x04\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:59 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x6a, 0x0, 0x0) 10:31:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000023fc30000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000040000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 646.106833] (syz-executor.0,20490,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 646.106833] " or missing value 10:31:59 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x6b, 0x0, 0x0) 10:31:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) accept4(0xffffffffffffffff, &(0x7f0000000340)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, &(0x7f00000003c0)=0x80, 0x0) setuid(r1) syz_mount_image$cramfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f00000000c0)="5211920f84e9b6a8b571e6e32a4cdc9eeccdf903445e8092f7895f618c71b27e32cd9324d0552586b7562fd050f422cceb9684d9e6efe844553022d5b60f5f", 0x3f, 0x7fff}, {&(0x7f0000000140)="9d7ae795abb1c434c6e48184d5b868d13df0dca7b22915", 0x17, 0x8000}, {&(0x7f0000000180)="7496f50642a15dea4261eb9c97c77b09874df66b3ca2acd514fbca16ddecb2af1d1fc5feed97188eac3bba64135f27f45fb5c53758d73065edc8df008fd9918926b1c5d67b433f7f35ad4fd753d4feef8e12b7f362a192", 0x57, 0xffffffff}, {&(0x7f0000000200)="ffaa225433759e517519ea44cde92a36bb67cfa565d207dd45fe55a05f5ed4e98d806e30fe", 0x25, 0x7}, {&(0x7f0000000240)="ac27b3f359b06a6d003bd7e26737f0", 0xf, 0x4}], 0x201c44c, &(0x7f0000000300)={[{'btrfs\x00'}, {'btrfs\x00'}], [{@euid_eq={'euid', 0x3d, r1}}]}) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) [ 646.192504] (syz-executor.0,20490,0):ocfs2_fill_super:1225 ERROR: status = -22 10:31:59 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x6c, 0x0, 0x0) 10:31:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000023fc40000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:59 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)="613f8d", 0x3}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) accept4(0xffffffffffffffff, &(0x7f0000000340)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, &(0x7f00000003c0)=0x80, 0x0) setuid(r1) syz_mount_image$cramfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f00000000c0)="5211920f84e9b6a8b571e6e32a4cdc9eeccdf903445e8092f7895f618c71b27e32cd9324d0552586b7562fd050f422cceb9684d9e6efe844553022d5b60f5f", 0x3f, 0x7fff}, {&(0x7f0000000140)="9d7ae795abb1c434c6e48184d5b868d13df0dca7b22915", 0x17, 0x8000}, {&(0x7f0000000180)="7496f50642a15dea4261eb9c97c77b09874df66b3ca2acd514fbca16ddecb2af1d1fc5feed97188eac3bba64135f27f45fb5c53758d73065edc8df008fd9918926b1c5d67b433f7f35ad4fd753d4feef8e12b7f362a192", 0x57, 0xffffffff}, {&(0x7f0000000200)="ffaa225433759e517519ea44cde92a36bb67cfa565d207dd45fe55a05f5ed4e98d806e30fe", 0x25, 0x7}, {&(0x7f0000000240)="ac27b3f359b06a6d003bd7e26737f0", 0xf, 0x4}], 0x201c44c, &(0x7f0000000300)={[{'btrfs\x00'}, {'btrfs\x00'}], [{@euid_eq={'euid', 0x3d, r1}}]}) (async) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) 10:31:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000050000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 646.327683] (syz-executor.1,20511,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 646.327683] " or missing value 10:31:59 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x6d, 0x0, 0x0) [ 646.382858] (syz-executor.1,20511,1):ocfs2_fill_super:1225 ERROR: status = -22 10:31:59 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x05\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:59 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x6e, 0x0, 0x0) 10:31:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000060000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000002c50000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) accept4(0xffffffffffffffff, &(0x7f0000000340)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, &(0x7f00000003c0)=0x80, 0x0) (async) setuid(r1) (async) syz_mount_image$cramfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f00000000c0)="5211920f84e9b6a8b571e6e32a4cdc9eeccdf903445e8092f7895f618c71b27e32cd9324d0552586b7562fd050f422cceb9684d9e6efe844553022d5b60f5f", 0x3f, 0x7fff}, {&(0x7f0000000140)="9d7ae795abb1c434c6e48184d5b868d13df0dca7b22915", 0x17, 0x8000}, {&(0x7f0000000180)="7496f50642a15dea4261eb9c97c77b09874df66b3ca2acd514fbca16ddecb2af1d1fc5feed97188eac3bba64135f27f45fb5c53758d73065edc8df008fd9918926b1c5d67b433f7f35ad4fd753d4feef8e12b7f362a192", 0x57, 0xffffffff}, {&(0x7f0000000200)="ffaa225433759e517519ea44cde92a36bb67cfa565d207dd45fe55a05f5ed4e98d806e30fe", 0x25, 0x7}, {&(0x7f0000000240)="ac27b3f359b06a6d003bd7e26737f0", 0xf, 0x4}], 0x201c44c, &(0x7f0000000300)={[{'btrfs\x00'}, {'btrfs\x00'}], [{@euid_eq={'euid', 0x3d, r1}}]}) (async) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) [ 646.595685] (syz-executor.0,20550,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 646.595685] " or missing value 10:31:59 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x6f, 0x0, 0x0) [ 646.654272] (syz-executor.0,20550,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 646.677185] (syz-executor.1,20566,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 646.677185] " or missing value 10:31:59 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x2}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 646.729526] (syz-executor.1,20566,1):ocfs2_fill_super:1225 ERROR: status = -22 10:31:59 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x70, 0x0, 0x0) 10:31:59 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x06\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:31:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x20, 0x1f, 0x7, 0x5b, 0x0, 0x5, 0x20000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x55500ab6f1748030, @perf_config_ext={0x4, 0xfff}, 0x10002, 0x10001, 0x4, 0x9, 0x1, 0x3f, 0x3000, 0x0, 0x101, 0x0, 0x9}, 0x0, 0xd, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x51, 0x28, &(0x7f0000000140)="6530ec02dd250b7a65568d0426e7f4d9d54eb8661721cf8df76093fbb3f9dc7d1ada10f41d14ef6f4d38e8315a297392cde3846f96a8a876be302981038800d7beddefdaeb36bb9d05b337ef366a1d8458", &(0x7f00000000c0)=""/40, 0x3ff, 0x0, 0xe7, 0xf2, &(0x7f00000001c0)="9d681ceb41b1d4a07523b474a170c0d65362e4a331549fad825571f4ad07644bae8d161ad786a764067de23229519f312c7f46924594bd023f33bc8b513471fc8c7faceb1257c06edacd07622fc8ed6d60285a3e605c31c002bfff1dac7e2797413204f36c51eabdd8e0a57c2ad67a697e05b52c4463a3e6279775cac62ab6c09ed02be925c306ffa2230d59f842bf1bfe5779340e8e88dff84f3c4536dac18c90254b92500787cf232d99c33bf87bc64e51065fec16b01f067626d08a5128835214cf019d205fde52bb245b03279cd6ea8bbbabfae55fe6543c0948c58031fe6fa25a4dfac33d", &(0x7f00000002c0)="c5b6d34bd895c2486c8bff7345865e1e8b2c9e5996d14c5de9fb0d69845a61abbe70bd119b54def8732e572c57d4816fc619e3bf9a9a46cd43d81cc275f40d3d7aa1857c3504be01edca0b7a8e6601eba4b9a96a47b026fa44b17913a272369deb56310be12185ebbaa140dfbcf152606609d37af8e02b3a919d19300f91652f8c13c763f4b65b08087d4f2e879fb73268a3073ea5800aadcfaa8872aa34bcb4889f730bc6c383f04a27618e8b057b05156210861cbd446364496967047fb607bc4c8c3a9626e80aab93c8d1dfd7a727ae5119db3ac42477214348b1122fb97386f3967abca1d58e1eaaeb9e638290ed33a8", 0x1, 0x4}, 0x48) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000440)=0x18) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) 10:31:59 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x71, 0x0, 0x0) 10:31:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000023fc50000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:31:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000070000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 646.947785] (syz-executor.0,20595,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 646.947785] " or missing value 10:31:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x20, 0x1f, 0x7, 0x5b, 0x0, 0x5, 0x20000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x55500ab6f1748030, @perf_config_ext={0x4, 0xfff}, 0x10002, 0x10001, 0x4, 0x9, 0x1, 0x3f, 0x3000, 0x0, 0x101, 0x0, 0x9}, 0x0, 0xd, 0xffffffffffffffff, 0x8) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x51, 0x28, &(0x7f0000000140)="6530ec02dd250b7a65568d0426e7f4d9d54eb8661721cf8df76093fbb3f9dc7d1ada10f41d14ef6f4d38e8315a297392cde3846f96a8a876be302981038800d7beddefdaeb36bb9d05b337ef366a1d8458", &(0x7f00000000c0)=""/40, 0x3ff, 0x0, 0xe7, 0xf2, &(0x7f00000001c0)="9d681ceb41b1d4a07523b474a170c0d65362e4a331549fad825571f4ad07644bae8d161ad786a764067de23229519f312c7f46924594bd023f33bc8b513471fc8c7faceb1257c06edacd07622fc8ed6d60285a3e605c31c002bfff1dac7e2797413204f36c51eabdd8e0a57c2ad67a697e05b52c4463a3e6279775cac62ab6c09ed02be925c306ffa2230d59f842bf1bfe5779340e8e88dff84f3c4536dac18c90254b92500787cf232d99c33bf87bc64e51065fec16b01f067626d08a5128835214cf019d205fde52bb245b03279cd6ea8bbbabfae55fe6543c0948c58031fe6fa25a4dfac33d", &(0x7f00000002c0)="c5b6d34bd895c2486c8bff7345865e1e8b2c9e5996d14c5de9fb0d69845a61abbe70bd119b54def8732e572c57d4816fc619e3bf9a9a46cd43d81cc275f40d3d7aa1857c3504be01edca0b7a8e6601eba4b9a96a47b026fa44b17913a272369deb56310be12185ebbaa140dfbcf152606609d37af8e02b3a919d19300f91652f8c13c763f4b65b08087d4f2e879fb73268a3073ea5800aadcfaa8872aa34bcb4889f730bc6c383f04a27618e8b057b05156210861cbd446364496967047fb607bc4c8c3a9626e80aab93c8d1dfd7a727ae5119db3ac42477214348b1122fb97386f3967abca1d58e1eaaeb9e638290ed33a8", 0x1, 0x4}, 0x48) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000440)=0x18) (async) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) [ 647.005327] (syz-executor.0,20595,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 647.026041] (syz-executor.1,20607,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 647.026041] " or missing value 10:32:00 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x72, 0x0, 0x0) 10:32:00 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x4}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 647.073654] (syz-executor.1,20607,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000023fc60000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:00 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x73, 0x0, 0x0) 10:32:00 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\a\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x20, 0x1f, 0x7, 0x5b, 0x0, 0x5, 0x20000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x55500ab6f1748030, @perf_config_ext={0x4, 0xfff}, 0x10002, 0x10001, 0x4, 0x9, 0x1, 0x3f, 0x3000, 0x0, 0x101, 0x0, 0x9}, 0x0, 0xd, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x51, 0x28, &(0x7f0000000140)="6530ec02dd250b7a65568d0426e7f4d9d54eb8661721cf8df76093fbb3f9dc7d1ada10f41d14ef6f4d38e8315a297392cde3846f96a8a876be302981038800d7beddefdaeb36bb9d05b337ef366a1d8458", &(0x7f00000000c0)=""/40, 0x3ff, 0x0, 0xe7, 0xf2, &(0x7f00000001c0)="9d681ceb41b1d4a07523b474a170c0d65362e4a331549fad825571f4ad07644bae8d161ad786a764067de23229519f312c7f46924594bd023f33bc8b513471fc8c7faceb1257c06edacd07622fc8ed6d60285a3e605c31c002bfff1dac7e2797413204f36c51eabdd8e0a57c2ad67a697e05b52c4463a3e6279775cac62ab6c09ed02be925c306ffa2230d59f842bf1bfe5779340e8e88dff84f3c4536dac18c90254b92500787cf232d99c33bf87bc64e51065fec16b01f067626d08a5128835214cf019d205fde52bb245b03279cd6ea8bbbabfae55fe6543c0948c58031fe6fa25a4dfac33d", &(0x7f00000002c0)="c5b6d34bd895c2486c8bff7345865e1e8b2c9e5996d14c5de9fb0d69845a61abbe70bd119b54def8732e572c57d4816fc619e3bf9a9a46cd43d81cc275f40d3d7aa1857c3504be01edca0b7a8e6601eba4b9a96a47b026fa44b17913a272369deb56310be12185ebbaa140dfbcf152606609d37af8e02b3a919d19300f91652f8c13c763f4b65b08087d4f2e879fb73268a3073ea5800aadcfaa8872aa34bcb4889f730bc6c383f04a27618e8b057b05156210861cbd446364496967047fb607bc4c8c3a9626e80aab93c8d1dfd7a727ae5119db3ac42477214348b1122fb97386f3967abca1d58e1eaaeb9e638290ed33a8", 0x1, 0x4}, 0x48) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000440)=0x18) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x20, 0x1f, 0x7, 0x5b, 0x0, 0x5, 0x20000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x55500ab6f1748030, @perf_config_ext={0x4, 0xfff}, 0x10002, 0x10001, 0x4, 0x9, 0x1, 0x3f, 0x3000, 0x0, 0x101, 0x0, 0x9}, 0x0, 0xd, 0xffffffffffffffff, 0x8) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x51, 0x28, &(0x7f0000000140)="6530ec02dd250b7a65568d0426e7f4d9d54eb8661721cf8df76093fbb3f9dc7d1ada10f41d14ef6f4d38e8315a297392cde3846f96a8a876be302981038800d7beddefdaeb36bb9d05b337ef366a1d8458", &(0x7f00000000c0)=""/40, 0x3ff, 0x0, 0xe7, 0xf2, &(0x7f00000001c0)="9d681ceb41b1d4a07523b474a170c0d65362e4a331549fad825571f4ad07644bae8d161ad786a764067de23229519f312c7f46924594bd023f33bc8b513471fc8c7faceb1257c06edacd07622fc8ed6d60285a3e605c31c002bfff1dac7e2797413204f36c51eabdd8e0a57c2ad67a697e05b52c4463a3e6279775cac62ab6c09ed02be925c306ffa2230d59f842bf1bfe5779340e8e88dff84f3c4536dac18c90254b92500787cf232d99c33bf87bc64e51065fec16b01f067626d08a5128835214cf019d205fde52bb245b03279cd6ea8bbbabfae55fe6543c0948c58031fe6fa25a4dfac33d", &(0x7f00000002c0)="c5b6d34bd895c2486c8bff7345865e1e8b2c9e5996d14c5de9fb0d69845a61abbe70bd119b54def8732e572c57d4816fc619e3bf9a9a46cd43d81cc275f40d3d7aa1857c3504be01edca0b7a8e6601eba4b9a96a47b026fa44b17913a272369deb56310be12185ebbaa140dfbcf152606609d37af8e02b3a919d19300f91652f8c13c763f4b65b08087d4f2e879fb73268a3073ea5800aadcfaa8872aa34bcb4889f730bc6c383f04a27618e8b057b05156210861cbd446364496967047fb607bc4c8c3a9626e80aab93c8d1dfd7a727ae5119db3ac42477214348b1122fb97386f3967abca1d58e1eaaeb9e638290ed33a8", 0x1, 0x4}, 0x48) (async) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000440)=0x18) (async) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) (async) 10:32:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000080000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000003c70000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:00 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x74, 0x0, 0x0) [ 647.368821] (syz-executor.0,20643,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 647.368821] " or missing value 10:32:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000090000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:00 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x75, 0x0, 0x0) [ 647.409549] (syz-executor.0,20643,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:00 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x7}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 647.502468] (syz-executor.1,20669,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 647.502468] " or missing value [ 647.521277] (syz-executor.1,20669,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000023fc70000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:00 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\b\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:00 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x76, 0x0, 0x0) 10:32:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) open(&(0x7f00000000c0)='./file0\x00', 0x101000, 0x10) syz_mount_image$romfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x9, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="3e4c496cc3f1bdfe01141ac40dd89a275d8c581d9d84fcabca0780be0595c0cbb9e665c4219ef057f098a0b2ceab5288ffa2d74deada1b94d279f27e89a2d6fb521580311407d4087a93514b430f", 0x4e, 0x5}, {&(0x7f00000001c0)="d7233a1a2caea2447222e004f7928d1c9a6491f4a66fd2ff503f143e4674e9677940dad4e507524330dc5c7e22fd65d38368442bfef37de69fa1c4a59b27063fb62469cbb3d2d859edfe18e4b38fb7b74da3d9289445b8cadaa466a7ec983ac62f3e4d1e4c3a5a720078446ef29d06a69e472ceb60bf0f7fe2f17a2901083fc87c3fbd6a0c79fad5096938d3284c8e24f9a6fcfc1e41279fb2739ab3272157e1b8a90e32e226d2939627d0571453d3604e4ba546a18fae20ec070d349d339da8cc39837e32138a66682695eb9ae35510633ad0f6a39d42067120bf3fff6dc4e2acca8eb0876aed", 0xe7, 0xc9c}, {&(0x7f00000002c0)="4bd8a56ecdd177fcd02e27aaea01a1da20b7c7152e971987e8fb8567adebcf6278a9b650316ca4323c2e5a925d9478c0530efc3c5796cc4301b928e1b8ab8753cf71e5b5078d3efed11d3c3b1350c6398d3cbf23de1eb8783cbbf4b42c8d36cbc9eccdbf6a2ee0616b4d466b5247e920f0ab18ce144f6699842dd8512055ef4fcfb159e410be4bbc28d9d3faf7180cbb0057b3071e0473e42b5be12d81be4684c9ccf801336205819c", 0xa9, 0x9}], 0x291050, &(0x7f0000000400)={[{'btrfs\x00'}, {':,\x94\x00'}, {}, {'btrfs\x00'}], [{@appraise_type}, {@appraise_type}, {@appraise_type}, {@smackfshat={'smackfshat', 0x3d, 'btrfs\x00'}}, {@fowner_eq}, {@uid_gt={'uid>', 0xee00}}]}) 10:32:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000100000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:00 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x77, 0x0, 0x0) 10:32:00 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x78, 0x0, 0x0) 10:32:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000230000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000023fc80000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 647.903775] (syz-executor.1,20706,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 647.903775] " or missing value 10:32:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) (async) open(&(0x7f00000000c0)='./file0\x00', 0x101000, 0x10) (async) syz_mount_image$romfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x9, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="3e4c496cc3f1bdfe01141ac40dd89a275d8c581d9d84fcabca0780be0595c0cbb9e665c4219ef057f098a0b2ceab5288ffa2d74deada1b94d279f27e89a2d6fb521580311407d4087a93514b430f", 0x4e, 0x5}, {&(0x7f00000001c0)="d7233a1a2caea2447222e004f7928d1c9a6491f4a66fd2ff503f143e4674e9677940dad4e507524330dc5c7e22fd65d38368442bfef37de69fa1c4a59b27063fb62469cbb3d2d859edfe18e4b38fb7b74da3d9289445b8cadaa466a7ec983ac62f3e4d1e4c3a5a720078446ef29d06a69e472ceb60bf0f7fe2f17a2901083fc87c3fbd6a0c79fad5096938d3284c8e24f9a6fcfc1e41279fb2739ab3272157e1b8a90e32e226d2939627d0571453d3604e4ba546a18fae20ec070d349d339da8cc39837e32138a66682695eb9ae35510633ad0f6a39d42067120bf3fff6dc4e2acca8eb0876aed", 0xe7, 0xc9c}, {&(0x7f00000002c0)="4bd8a56ecdd177fcd02e27aaea01a1da20b7c7152e971987e8fb8567adebcf6278a9b650316ca4323c2e5a925d9478c0530efc3c5796cc4301b928e1b8ab8753cf71e5b5078d3efed11d3c3b1350c6398d3cbf23de1eb8783cbbf4b42c8d36cbc9eccdbf6a2ee0616b4d466b5247e920f0ab18ce144f6699842dd8512055ef4fcfb159e410be4bbc28d9d3faf7180cbb0057b3071e0473e42b5be12d81be4684c9ccf801336205819c", 0xa9, 0x9}], 0x291050, &(0x7f0000000400)={[{'btrfs\x00'}, {':,\x94\x00'}, {}, {'btrfs\x00'}], [{@appraise_type}, {@appraise_type}, {@appraise_type}, {@smackfshat={'smackfshat', 0x3d, 'btrfs\x00'}}, {@fowner_eq}, {@uid_gt={'uid>', 0xee00}}]}) [ 647.954304] (syz-executor.1,20706,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 647.974941] (syz-executor.0,20714,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 647.974941] " or missing value 10:32:00 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x79, 0x0, 0x0) [ 648.021969] (syz-executor.0,20714,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:01 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x14}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:01 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\nH\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000480000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000023fc90000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:01 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x7a, 0x0, 0x0) 10:32:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000740)=ANY=[]) open(&(0x7f00000000c0)='./file0\x00', 0x101000, 0x10) (async, rerun: 32) syz_mount_image$romfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x9, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="3e4c496cc3f1bdfe01141ac40dd89a275d8c581d9d84fcabca0780be0595c0cbb9e665c4219ef057f098a0b2ceab5288ffa2d74deada1b94d279f27e89a2d6fb521580311407d4087a93514b430f", 0x4e, 0x5}, {&(0x7f00000001c0)="d7233a1a2caea2447222e004f7928d1c9a6491f4a66fd2ff503f143e4674e9677940dad4e507524330dc5c7e22fd65d38368442bfef37de69fa1c4a59b27063fb62469cbb3d2d859edfe18e4b38fb7b74da3d9289445b8cadaa466a7ec983ac62f3e4d1e4c3a5a720078446ef29d06a69e472ceb60bf0f7fe2f17a2901083fc87c3fbd6a0c79fad5096938d3284c8e24f9a6fcfc1e41279fb2739ab3272157e1b8a90e32e226d2939627d0571453d3604e4ba546a18fae20ec070d349d339da8cc39837e32138a66682695eb9ae35510633ad0f6a39d42067120bf3fff6dc4e2acca8eb0876aed", 0xe7, 0xc9c}, {&(0x7f00000002c0)="4bd8a56ecdd177fcd02e27aaea01a1da20b7c7152e971987e8fb8567adebcf6278a9b650316ca4323c2e5a925d9478c0530efc3c5796cc4301b928e1b8ab8753cf71e5b5078d3efed11d3c3b1350c6398d3cbf23de1eb8783cbbf4b42c8d36cbc9eccdbf6a2ee0616b4d466b5247e920f0ab18ce144f6699842dd8512055ef4fcfb159e410be4bbc28d9d3faf7180cbb0057b3071e0473e42b5be12d81be4684c9ccf801336205819c", 0xa9, 0x9}], 0x291050, &(0x7f0000000400)={[{'btrfs\x00'}, {':,\x94\x00'}, {}, {'btrfs\x00'}], [{@appraise_type}, {@appraise_type}, {@appraise_type}, {@smackfshat={'smackfshat', 0x3d, 'btrfs\x00'}}, {@fowner_eq}, {@uid_gt={'uid>', 0xee00}}]}) (rerun: 32) 10:32:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000004c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 648.294656] (syz-executor.0,20771,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 648.294656] " or missing value [ 648.309357] (syz-executor.1,20765,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 648.309357] H" or missing value [ 648.342644] (syz-executor.0,20771,0):ocfs2_fill_super:1225 ERROR: status = -22 10:32:01 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x7b, 0x0, 0x0) [ 648.387284] (syz-executor.1,20765,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:01 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x52}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:01 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\nL\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000680000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:01 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x7c, 0x0, 0x0) 10:32:01 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x7d, 0x0, 0x0) 10:32:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000023fca0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000006c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 648.700602] (syz-executor.0,20814,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 648.700602] " or missing value 10:32:01 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x7e, 0x0, 0x0) [ 648.748732] (syz-executor.0,20814,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 648.817231] (syz-executor.1,20817,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 648.817231] L" or missing value [ 648.831239] (syz-executor.1,20817,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:01 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x8d}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:02 executing program 3: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x6f, 0x0, 0x0) 10:32:02 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n`\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:02 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x82, 0x0, 0x0) 10:32:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000023fcb0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000740000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 649.174608] (syz-executor.0,20860,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 649.174608] " or missing value [ 649.214088] (syz-executor.0,20860,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:02 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x2}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:02 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x83, 0x0, 0x0) 10:32:02 executing program 3: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x68, 0x0, 0x0) 10:32:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000007a0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000023fcc0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:02 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x84, 0x0, 0x0) [ 649.531563] (syz-executor.1,20893,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 649.531563] `" or missing value [ 649.549117] (syz-executor.1,20893,0):ocfs2_fill_super:1225 ERROR: status = -22 10:32:02 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\nh\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:02 executing program 3: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\x8f\x01\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000023fcd0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:02 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x85, 0x0, 0x0) 10:32:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000300000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 649.708015] (syz-executor.0,20903,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 649.708015] " or missing value [ 649.789065] (syz-executor.0,20903,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:02 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x86, 0x0, 0x0) 10:32:02 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x3}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000500000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:02 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x87, 0x0, 0x0) 10:32:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000023fce0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 649.937416] (syz-executor.1,20929,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 649.937416] h" or missing value [ 649.968946] (syz-executor.3,20934,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6" or missing value [ 650.001971] (syz-executor.1,20929,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 650.044543] (syz-executor.3,20934,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:03 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\nl\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:03 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x88, 0x0, 0x0) 10:32:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000003d40000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:03 executing program 3: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x3c7, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:03 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x89, 0x0, 0x0) [ 650.190200] (syz-executor.0,20954,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 650.190200] " or missing value [ 650.210748] (syz-executor.0,20954,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:03 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x8a, 0x0, 0x0) 10:32:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000600000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:03 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x4}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000001d60000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 650.398781] (syz-executor.1,20978,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 650.398781] l" or missing value 10:32:03 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x8b, 0x0, 0x0) [ 650.459879] (syz-executor.1,20978,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000700000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:03 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x8c, 0x0, 0x0) 10:32:03 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\nt\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 650.563999] (syz-executor.3,20992,0):ocfs2_parse_options:1513 ERROR: Invalid heartbeat mount options [ 650.582549] (syz-executor.3,20992,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 650.659897] (syz-executor.0,21003,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 650.659897] " or missing value 10:32:03 executing program 3: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x8a, 0x0, 0x0) 10:32:03 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x8d, 0x0, 0x0) [ 650.702771] (syz-executor.0,21003,0):ocfs2_fill_super:1225 ERROR: status = -22 10:32:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000002e20000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:03 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x5}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000900000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:03 executing program 3: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\x14&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 650.877642] (syz-executor.1,21024,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 650.877642] t" or missing value 10:32:03 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x8e, 0x0, 0x0) [ 650.919351] (syz-executor.1,21024,0):ocfs2_fill_super:1225 ERROR: status = -22 10:32:03 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\nz\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffffe40000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 651.082364] (syz-executor.3,21050,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 651.082364] " or missing value [ 651.089335] (syz-executor.0,21049,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 651.089335] " or missing value [ 651.123296] (syz-executor.3,21050,0):ocfs2_fill_super:1225 ERROR: status = -22 10:32:04 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x8f, 0x0, 0x0) 10:32:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000001f00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 651.133146] (syz-executor.0,21049,0):ocfs2_fill_super:1225 ERROR: status = -22 10:32:04 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x6}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:04 executing program 3: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x3c7, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:04 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x90, 0x0, 0x0) [ 651.208067] (syz-executor.1,21064,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 651.208067] z" or missing value [ 651.245325] (syz-executor.1,21064,0):ocfs2_fill_super:1225 ERROR: status = -22 10:32:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000002000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85fffffffffffffff40000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:04 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x02\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:04 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x91, 0x0, 0x0) [ 651.325334] (syz-executor.0,21085,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 651.325334] " or missing value [ 651.363329] (syz-executor.0,21085,0):ocfs2_fill_super:1225 ERROR: status = -22 10:32:04 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x7}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:04 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x92, 0x0, 0x0) [ 651.486727] (syz-executor.3,21089,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 651.486727] " or missing value [ 651.502452] (syz-executor.3,21089,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 651.526233] (syz-executor.1,21107,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 10:32:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000002300000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 651.526233] " or missing value 10:32:04 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x93, 0x0, 0x0) 10:32:04 executing program 3: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\nz\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 651.563733] (syz-executor.1,21107,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:04 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x03\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:04 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x94, 0x0, 0x0) 10:32:04 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x95, 0x0, 0x0) 10:32:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000fffffff50000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000003f00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 651.723868] (syz-executor.0,21125,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 651.723868] " or missing value [ 651.739417] (syz-executor.3,21136,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 651.739417] z" or missing value [ 651.758980] (syz-executor.0,21125,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 651.766123] (syz-executor.3,21136,0):ocfs2_fill_super:1225 ERROR: status = -22 10:32:04 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x96, 0x0, 0x0) 10:32:04 executing program 3: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x02\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 651.785143] (syz-executor.1,21144,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 651.785143] " or missing value [ 651.799564] (syz-executor.1,21144,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:04 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x8}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:04 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x97, 0x0, 0x0) 10:32:04 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x04\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:04 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x98, 0x0, 0x0) 10:32:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000fffffff60000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000004800000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 652.034414] (syz-executor.3,21171,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 652.034414] " or missing value 10:32:05 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x99, 0x0, 0x0) [ 652.083499] (syz-executor.3,21171,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:05 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x9a, 0x0, 0x0) 10:32:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000fffffffb0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:05 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x9b, 0x0, 0x0) [ 652.178588] (syz-executor.1,21187,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 652.178588] " or missing value [ 652.193278] (syz-executor.0,21179,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 652.193278] " or missing value [ 652.208320] (syz-executor.1,21187,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 652.208570] (syz-executor.0,21179,0):ocfs2_fill_super:1225 ERROR: status = -22 10:32:05 executing program 3: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x15, 0x0, 0x0) 10:32:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000003fc0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:05 executing program 3: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x3, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:05 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x05\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000004c00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:05 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0xa}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000fffffffd0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:05 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x9c, 0x0, 0x0) 10:32:05 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x9d, 0x0, 0x0) [ 652.511069] (syz-executor.3,21234,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 652.511069] " or missing value [ 652.528621] (syz-executor.3,21234,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 652.533108] (syz-executor.1,21236,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 652.533108] " or missing value [ 652.549948] (syz-executor.1,21236,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000006800000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:05 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x9e, 0x0, 0x0) [ 652.568271] (syz-executor.0,21237,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 652.568271] " or missing value [ 652.589224] (syz-executor.0,21237,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:05 executing program 3: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\a&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:05 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x06\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000fffffffe0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:05 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x9f, 0x0, 0x0) 10:32:05 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x48}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:05 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xa0, 0x0, 0x0) [ 652.809172] (syz-executor.1,21272,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 652.809172] " or missing value [ 652.822352] (syz-executor.1,21272,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000006c00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:05 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xa1, 0x0, 0x0) [ 652.859643] (syz-executor.0,21283,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 652.859643] " or missing value [ 652.883887] (syz-executor.0,21283,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:05 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\a\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:05 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x4c}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 652.919328] (syz-executor.3,21274,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 652.919328] " or missing value [ 652.933602] (syz-executor.3,21274,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:05 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xa2, 0x0, 0x0) 10:32:06 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xa3, 0x0, 0x0) [ 653.144219] (syz-executor.0,21311,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 653.144219] " or missing value [ 653.174318] (syz-executor.1,21308,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 653.174318] " or missing value 10:32:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 1) 10:32:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000007400000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000fff0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:06 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xa4, 0x0, 0x0) [ 653.214244] (syz-executor.1,21308,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 653.247041] (syz-executor.0,21311,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 653.251203] FAULT_INJECTION: forcing a failure. [ 653.251203] name failslab, interval 1, probability 0, space 0, times 0 [ 653.278549] CPU: 1 PID: 21329 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 653.286461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 653.295821] Call Trace: [ 653.298426] dump_stack+0x1fc/0x2ef [ 653.302071] should_fail.cold+0xa/0xf [ 653.305883] ? setup_fault_attr+0x200/0x200 [ 653.310208] ? lock_acquire+0x170/0x3c0 [ 653.314224] __should_failslab+0x115/0x180 [ 653.318444] should_failslab+0x5/0x10 [ 653.322225] __kmalloc+0x2ab/0x3c0 [ 653.325747] ? __se_sys_memfd_create+0xf8/0x440 [ 653.330398] __se_sys_memfd_create+0xf8/0x440 [ 653.334875] ? memfd_file_seals_ptr+0x150/0x150 [ 653.339534] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 653.344884] ? trace_hardirqs_off_caller+0x6e/0x210 [ 653.349885] ? do_syscall_64+0x21/0x620 [ 653.353843] do_syscall_64+0xf9/0x620 [ 653.357652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 653.362827] RIP: 0033:0x7f85e0293109 [ 653.366527] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 653.385512] RSP: 002b:00007f85dec07f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 653.393205] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e0293109 [ 653.400457] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f85e02ec1ee [ 653.407708] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007f85dec081d0 10:32:06 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\b\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 2) 10:32:06 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x60}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 653.414958] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 653.422210] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020000740 10:32:06 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xa5, 0x0, 0x0) 10:32:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000007a00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000001fffff0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 653.549601] FAULT_INJECTION: forcing a failure. [ 653.549601] name failslab, interval 1, probability 0, space 0, times 0 [ 653.566420] CPU: 1 PID: 21351 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 653.574345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 653.574351] Call Trace: 10:32:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 3) [ 653.574371] dump_stack+0x1fc/0x2ef [ 653.574392] should_fail.cold+0xa/0xf [ 653.574411] ? setup_fault_attr+0x200/0x200 [ 653.574427] ? lock_acquire+0x170/0x3c0 [ 653.574447] __should_failslab+0x115/0x180 [ 653.574464] should_failslab+0x5/0x10 [ 653.574476] kmem_cache_alloc+0x277/0x370 [ 653.574491] ? shmem_destroy_callback+0xb0/0xb0 [ 653.574506] shmem_alloc_inode+0x18/0x40 [ 653.574519] ? shmem_destroy_callback+0xb0/0xb0 [ 653.574531] alloc_inode+0x5d/0x180 [ 653.574541] new_inode+0x1d/0xf0 [ 653.574555] shmem_get_inode+0x96/0x8d0 [ 653.574575] __shmem_file_setup.part.0+0x7a/0x2b0 [ 653.574593] shmem_file_setup+0x61/0x90 [ 653.574615] __se_sys_memfd_create+0x26b/0x440 [ 653.574632] ? memfd_file_seals_ptr+0x150/0x150 [ 653.574649] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 653.574664] ? trace_hardirqs_off_caller+0x6e/0x210 [ 653.574678] ? do_syscall_64+0x21/0x620 [ 653.574694] do_syscall_64+0xf9/0x620 [ 653.574711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 653.574723] RIP: 0033:0x7f85e0293109 [ 653.574736] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 653.574743] RSP: 002b:00007f85dec07f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 653.574757] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e0293109 [ 653.574765] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f85e02ec1ee [ 653.574772] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007f85dec081d0 10:32:06 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xa6, 0x0, 0x0) [ 653.574779] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 653.574787] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020000740 [ 653.605820] (syz-executor.1,21344,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 653.605820] " or missing value [ 653.781138] (syz-executor.1,21344,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 653.818646] FAULT_INJECTION: forcing a failure. [ 653.818646] name failslab, interval 1, probability 0, space 0, times 0 [ 653.830182] CPU: 1 PID: 21371 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 653.838069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 653.847410] Call Trace: [ 653.849991] dump_stack+0x1fc/0x2ef [ 653.853617] should_fail.cold+0xa/0xf [ 653.857410] ? setup_fault_attr+0x200/0x200 [ 653.861735] ? lock_acquire+0x170/0x3c0 [ 653.865707] __should_failslab+0x115/0x180 [ 653.869932] should_failslab+0x5/0x10 [ 653.873721] kmem_cache_alloc+0x277/0x370 [ 653.877873] __d_alloc+0x2b/0xa10 [ 653.881329] d_alloc_pseudo+0x19/0x70 [ 653.885120] alloc_file_pseudo+0xc6/0x250 [ 653.889270] ? alloc_file+0x4d0/0x4d0 [ 653.893064] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 653.898680] ? shmem_get_inode+0x44c/0x8d0 [ 653.902921] __shmem_file_setup.part.0+0x102/0x2b0 [ 653.907872] shmem_file_setup+0x61/0x90 [ 653.911836] __se_sys_memfd_create+0x26b/0x440 [ 653.916404] ? memfd_file_seals_ptr+0x150/0x150 [ 653.921063] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 653.926414] ? trace_hardirqs_off_caller+0x6e/0x210 [ 653.931416] ? do_syscall_64+0x21/0x620 [ 653.935375] do_syscall_64+0xf9/0x620 [ 653.939164] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 653.944430] RIP: 0033:0x7f85e0293109 [ 653.948135] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 653.967032] RSP: 002b:00007f85dec07f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 653.974733] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e0293109 [ 653.981991] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f85e02ec1ee [ 653.989245] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007f85dec081d0 [ 653.996498] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 654.003752] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020000740 10:32:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 4) 10:32:07 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xffH\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000c0ed00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 654.021096] (syz-executor.0,21350,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 654.021096] " or missing value [ 654.057084] (syz-executor.0,21350,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000007fffffff0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 654.089406] FAULT_INJECTION: forcing a failure. [ 654.089406] name failslab, interval 1, probability 0, space 0, times 0 [ 654.107464] CPU: 1 PID: 21380 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 654.115383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 654.115389] Call Trace: [ 654.115412] dump_stack+0x1fc/0x2ef [ 654.115432] should_fail.cold+0xa/0xf [ 654.115452] ? setup_fault_attr+0x200/0x200 [ 654.139136] ? lock_acquire+0x170/0x3c0 [ 654.143115] __should_failslab+0x115/0x180 [ 654.147350] should_failslab+0x5/0x10 [ 654.151137] kmem_cache_alloc+0x277/0x370 [ 654.155270] __alloc_file+0x21/0x340 [ 654.158970] alloc_empty_file+0x6d/0x170 [ 654.163014] alloc_file+0x5e/0x4d0 [ 654.166559] alloc_file_pseudo+0x165/0x250 [ 654.170788] ? alloc_file+0x4d0/0x4d0 [ 654.174572] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 654.180179] ? shmem_get_inode+0x44c/0x8d0 [ 654.184398] __shmem_file_setup.part.0+0x102/0x2b0 [ 654.189312] shmem_file_setup+0x61/0x90 [ 654.193280] __se_sys_memfd_create+0x26b/0x440 [ 654.197852] ? memfd_file_seals_ptr+0x150/0x150 [ 654.202505] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 654.207857] ? trace_hardirqs_off_caller+0x6e/0x210 [ 654.212865] ? do_syscall_64+0x21/0x620 [ 654.216832] do_syscall_64+0xf9/0x620 [ 654.220621] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 654.225789] RIP: 0033:0x7f85e0293109 [ 654.229483] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 654.248364] RSP: 002b:00007f85dec07f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 654.256056] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e0293109 [ 654.263308] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f85e02ec1ee [ 654.270572] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007f85dec081d0 [ 654.277821] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 10:32:07 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xa7, 0x0, 0x0) 10:32:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 5) [ 654.285073] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020000740 10:32:07 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x68}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 654.368860] FAULT_INJECTION: forcing a failure. [ 654.368860] name failslab, interval 1, probability 0, space 0, times 0 [ 654.380463] CPU: 0 PID: 21398 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 654.388356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 654.397714] Call Trace: [ 654.400313] dump_stack+0x1fc/0x2ef [ 654.403956] should_fail.cold+0xa/0xf [ 654.407770] ? setup_fault_attr+0x200/0x200 [ 654.412122] ? lock_acquire+0x170/0x3c0 [ 654.412143] __should_failslab+0x115/0x180 [ 654.412163] should_failslab+0x5/0x10 [ 654.424150] kmem_cache_alloc_trace+0x284/0x380 [ 654.424172] apparmor_file_alloc_security+0x394/0xad0 [ 654.434016] ? apparmor_file_receive+0x160/0x160 [ 654.438780] ? __alloc_file+0x21/0x340 [ 654.442681] security_file_alloc+0x40/0x90 [ 654.446916] __alloc_file+0xd8/0x340 [ 654.450647] alloc_empty_file+0x6d/0x170 [ 654.454706] alloc_file+0x5e/0x4d0 [ 654.458242] alloc_file_pseudo+0x165/0x250 [ 654.462464] ? alloc_file+0x4d0/0x4d0 [ 654.466266] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 654.471901] ? shmem_get_inode+0x44c/0x8d0 [ 654.476146] __shmem_file_setup.part.0+0x102/0x2b0 [ 654.481071] shmem_file_setup+0x61/0x90 [ 654.485043] __se_sys_memfd_create+0x26b/0x440 [ 654.489618] ? memfd_file_seals_ptr+0x150/0x150 [ 654.494281] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 654.494296] ? trace_hardirqs_off_caller+0x6e/0x210 [ 654.494312] ? do_syscall_64+0x21/0x620 [ 654.494327] do_syscall_64+0xf9/0x620 [ 654.494344] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 654.494356] RIP: 0033:0x7f85e0293109 [ 654.494369] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 654.494377] RSP: 002b:00007f85dec07f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 654.494388] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e0293109 [ 654.494406] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f85e02ec1ee [ 654.562546] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007f85dec081d0 10:32:07 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xa8, 0x0, 0x0) 10:32:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 6) [ 654.569810] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 654.577081] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020000740 10:32:07 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xa9, 0x0, 0x0) 10:32:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000fff00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 654.616226] (syz-executor.1,21383,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 654.616226] " or missing value [ 654.630454] (syz-executor.0,21390,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 654.630454] " or missing value [ 654.638219] (syz-executor.1,21383,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 654.685484] FAULT_INJECTION: forcing a failure. [ 654.685484] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 654.694825] (syz-executor.0,21390,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 654.701978] CPU: 0 PID: 21410 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 654.712767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 654.712772] Call Trace: [ 654.712794] dump_stack+0x1fc/0x2ef [ 654.712815] should_fail.cold+0xa/0xf [ 654.712832] ? lock_acquire+0x170/0x3c0 [ 654.712848] ? setup_fault_attr+0x200/0x200 [ 654.712877] __alloc_pages_nodemask+0x239/0x2890 [ 654.712894] ? __lock_acquire+0x6de/0x3ff0 [ 654.749492] ? static_obj+0x50/0x50 [ 654.749515] ? __lock_acquire+0x6de/0x3ff0 [ 654.749529] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 654.749546] ? __lock_acquire+0x6de/0x3ff0 [ 654.766438] ? mark_held_locks+0xf0/0xf0 [ 654.770504] ? unwind_next_frame+0xeee/0x1400 [ 654.774985] ? mark_held_locks+0xf0/0xf0 [ 654.779032] ? deref_stack_reg+0x134/0x1d0 [ 654.783343] ? get_reg+0x176/0x1f0 [ 654.786890] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 654.792769] alloc_pages_vma+0xf2/0x780 [ 654.796735] shmem_alloc_page+0x11c/0x1f0 [ 654.800868] ? shmem_swapin+0x220/0x220 [ 654.804851] ? percpu_counter_add_batch+0x126/0x180 [ 654.809870] ? __vm_enough_memory+0x316/0x650 [ 654.814510] shmem_alloc_and_acct_page+0x15a/0x850 [ 654.819451] shmem_getpage_gfp+0x4e9/0x37f0 [ 654.823773] ? shmem_alloc_and_acct_page+0x850/0x850 [ 654.828874] ? mark_held_locks+0xa6/0xf0 [ 654.832931] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 654.838118] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 654.843303] shmem_write_begin+0xff/0x1e0 [ 654.847462] generic_perform_write+0x1f8/0x4d0 [ 654.852045] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 654.856711] ? current_time+0x1c0/0x1c0 [ 654.860675] ? lock_acquire+0x170/0x3c0 [ 654.864650] __generic_file_write_iter+0x24b/0x610 [ 654.869592] generic_file_write_iter+0x3f8/0x730 [ 654.874347] __vfs_write+0x51b/0x770 [ 654.878056] ? kernel_read+0x110/0x110 [ 654.882064] ? check_preemption_disabled+0x41/0x280 [ 654.887091] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 654.892129] vfs_write+0x1f3/0x540 [ 654.895673] __x64_sys_pwrite64+0x1f7/0x250 [ 654.899985] ? ksys_pwrite64+0x1a0/0x1a0 [ 654.904146] ? trace_hardirqs_off_caller+0x6e/0x210 [ 654.909171] ? do_syscall_64+0x21/0x620 [ 654.913145] do_syscall_64+0xf9/0x620 [ 654.916943] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 654.922125] RIP: 0033:0x7f85e02460d7 [ 654.925845] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 654.944745] RSP: 002b:00007f85dec07f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 654.952449] RAX: ffffffffffffffda RBX: 00007f85e02dca20 RCX: 00007f85e02460d7 [ 654.959718] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000004 [ 654.966988] RBP: 0000000000000001 R08: 0000000000000000 R09: 00007f85dec081d0 [ 654.974334] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 10:32:07 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xaa, 0x0, 0x0) [ 654.981609] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 10:32:08 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xffL\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:08 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x6c}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:08 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xab, 0x0, 0x0) 10:32:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffffff0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 7) 10:32:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000002000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:08 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xac, 0x0, 0x0) [ 655.159505] (syz-executor.1,21427,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 655.159505] " or missing value [ 655.169700] (syz-executor.0,21435,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 655.169700] " or missing value [ 655.194582] (syz-executor.0,21435,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 655.218114] FAULT_INJECTION: forcing a failure. [ 655.218114] name failslab, interval 1, probability 0, space 0, times 0 [ 655.227650] (syz-executor.1,21427,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 655.229754] CPU: 1 PID: 21443 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 655.229796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 655.229805] Call Trace: [ 655.257465] dump_stack+0x1fc/0x2ef [ 655.257486] should_fail.cold+0xa/0xf [ 655.257506] ? setup_fault_attr+0x200/0x200 [ 655.257525] ? __lock_acquire+0x6de/0x3ff0 [ 655.257543] __should_failslab+0x115/0x180 [ 655.257561] should_failslab+0x5/0x10 [ 655.257575] kmem_cache_alloc+0x3f/0x370 [ 655.257593] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 655.257611] __radix_tree_create+0x314/0x540 [ 655.257632] __radix_tree_insert+0xbb/0x5f0 [ 655.257651] ? __radix_tree_create+0x540/0x540 [ 655.257666] ? lock_acquire+0x170/0x3c0 [ 655.257682] ? shmem_add_to_page_cache+0x306/0xbb0 [ 655.257705] shmem_add_to_page_cache+0x616/0xbb0 [ 655.257724] ? shmem_recalc_inode+0x310/0x310 [ 655.257740] ? __radix_tree_preload+0x1fe/0x280 [ 655.257763] shmem_getpage_gfp+0x2004/0x37f0 [ 655.257794] ? shmem_alloc_and_acct_page+0x850/0x850 [ 655.257810] ? mark_held_locks+0xa6/0xf0 10:32:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000004000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:08 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff`\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:08 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x74}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 655.257824] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 655.257847] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 655.257868] shmem_write_begin+0xff/0x1e0 [ 655.257890] generic_perform_write+0x1f8/0x4d0 [ 655.257914] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 655.257928] ? current_time+0x1c0/0x1c0 [ 655.257946] ? lock_acquire+0x170/0x3c0 10:32:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500006088ffffffff0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 655.257963] __generic_file_write_iter+0x24b/0x610 [ 655.257982] generic_file_write_iter+0x3f8/0x730 [ 655.258003] __vfs_write+0x51b/0x770 [ 655.258017] ? kernel_read+0x110/0x110 [ 655.258041] ? check_preemption_disabled+0x41/0x280 [ 655.258061] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 655.258078] vfs_write+0x1f3/0x540 [ 655.258096] __x64_sys_pwrite64+0x1f7/0x250 [ 655.258112] ? ksys_pwrite64+0x1a0/0x1a0 [ 655.258128] ? trace_hardirqs_off_caller+0x6e/0x210 [ 655.258141] ? do_syscall_64+0x21/0x620 [ 655.258157] do_syscall_64+0xf9/0x620 10:32:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 8) [ 655.258176] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 655.258187] RIP: 0033:0x7f85e02460d7 [ 655.258201] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 655.258208] RSP: 002b:00007f85dec07f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 655.258222] RAX: ffffffffffffffda RBX: 00007f85e02dca20 RCX: 00007f85e02460d7 [ 655.258230] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000004 [ 655.258238] RBP: 0000000000000001 R08: 0000000000000000 R09: 00007f85dec081d0 [ 655.258245] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 655.258252] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 655.594695] (syz-executor.1,21467,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 655.594695] " or missing value 10:32:08 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xad, 0x0, 0x0) 10:32:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000010000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 655.620733] (syz-executor.0,21468,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 655.620733] " or missing value [ 655.620998] (syz-executor.1,21467,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 655.635078] (syz-executor.0,21468,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 655.664947] FAULT_INJECTION: forcing a failure. [ 655.664947] name failslab, interval 1, probability 0, space 0, times 0 [ 655.676392] CPU: 1 PID: 21487 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 655.684281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 655.693643] Call Trace: [ 655.693664] dump_stack+0x1fc/0x2ef [ 655.693683] should_fail.cold+0xa/0xf [ 655.703673] ? setup_fault_attr+0x200/0x200 [ 655.708010] ? lock_acquire+0x170/0x3c0 [ 655.708031] __should_failslab+0x115/0x180 [ 655.708049] should_failslab+0x5/0x10 [ 655.720108] kmem_cache_alloc+0x277/0x370 [ 655.724256] getname_flags+0xce/0x590 [ 655.728042] do_sys_open+0x26c/0x520 [ 655.731748] ? filp_open+0x70/0x70 [ 655.735290] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 655.740648] ? trace_hardirqs_off_caller+0x6e/0x210 [ 655.745651] ? do_syscall_64+0x21/0x620 [ 655.749699] do_syscall_64+0xf9/0x620 [ 655.753488] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 655.758658] RIP: 0033:0x7f85e0246024 [ 655.762355] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 655.781238] RSP: 002b:00007f85dec07eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 655.788927] RAX: ffffffffffffffda RBX: 00007f85e02dca20 RCX: 00007f85e0246024 [ 655.796178] RDX: 0000000000000002 RSI: 00007f85dec07fe0 RDI: 00000000ffffff9c [ 655.803428] RBP: 00007f85dec07fe0 R08: 0000000000000000 R09: 00007f85dec081d0 [ 655.810677] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 10:32:08 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xae, 0x0, 0x0) 10:32:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850007ffffffffffff0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 9) [ 655.817925] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 10:32:08 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xaf, 0x0, 0x0) 10:32:08 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xffh\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 655.927204] FAULT_INJECTION: forcing a failure. [ 655.927204] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 655.939032] CPU: 1 PID: 21500 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 655.946909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 655.956254] Call Trace: [ 655.958843] dump_stack+0x1fc/0x2ef [ 655.962470] should_fail.cold+0xa/0xf [ 655.966272] ? setup_fault_attr+0x200/0x200 [ 655.970589] ? do_writepages+0x290/0x290 [ 655.974646] ? unlock_page+0x13d/0x230 [ 655.978521] __alloc_pages_nodemask+0x239/0x2890 [ 655.983261] ? generic_perform_write+0x36c/0x4d0 [ 655.988037] ? __lock_acquire+0x6de/0x3ff0 [ 655.992268] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 655.997095] ? lock_downgrade+0x720/0x720 [ 656.001225] ? lock_acquire+0x170/0x3c0 [ 656.005187] ? up_write+0x18/0x150 [ 656.008722] ? generic_file_write_iter+0x381/0x730 [ 656.013642] cache_grow_begin+0xa4/0x8a0 [ 656.017708] ? setup_fault_attr+0x200/0x200 [ 656.022014] ? lock_acquire+0x170/0x3c0 [ 656.025974] cache_alloc_refill+0x273/0x340 [ 656.030285] kmem_cache_alloc+0x346/0x370 [ 656.034428] getname_flags+0xce/0x590 [ 656.038215] do_sys_open+0x26c/0x520 [ 656.041919] ? filp_open+0x70/0x70 [ 656.045446] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 656.050794] ? trace_hardirqs_off_caller+0x6e/0x210 [ 656.055795] ? do_syscall_64+0x21/0x620 [ 656.059756] do_syscall_64+0xf9/0x620 [ 656.063567] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 656.068738] RIP: 0033:0x7f85e0246024 [ 656.072437] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 656.091319] RSP: 002b:00007f85dec07eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 656.099011] RAX: ffffffffffffffda RBX: 00007f85e02dca20 RCX: 00007f85e0246024 [ 656.106264] RDX: 0000000000000002 RSI: 00007f85dec07fe0 RDI: 00000000ffffff9c [ 656.113522] RBP: 00007f85dec07fe0 R08: 0000000000000000 R09: 00007f85dec081d0 [ 656.120782] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 10:32:09 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x7a}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e857fffffffffffffff0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:09 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xb0, 0x0, 0x0) [ 656.128037] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 10:32:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000ffff1f000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 10) [ 656.285923] (syz-executor.1,21514,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 656.285923] " or missing value [ 656.293015] FAULT_INJECTION: forcing a failure. [ 656.293015] name failslab, interval 1, probability 0, space 0, times 0 [ 656.325271] (syz-executor.0,21516,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 10:32:09 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xb1, 0x0, 0x0) [ 656.325271] " or missing value [ 656.339397] (syz-executor.1,21514,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 656.348212] (syz-executor.0,21516,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 656.356601] CPU: 1 PID: 21530 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 656.364495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 656.373850] Call Trace: [ 656.376450] dump_stack+0x1fc/0x2ef [ 656.380093] should_fail.cold+0xa/0xf [ 656.383915] ? setup_fault_attr+0x200/0x200 [ 656.383933] ? lock_acquire+0x170/0x3c0 [ 656.383956] __should_failslab+0x115/0x180 [ 656.396476] should_failslab+0x5/0x10 [ 656.396491] kmem_cache_alloc+0x277/0x370 [ 656.396510] __alloc_file+0x21/0x340 [ 656.408154] alloc_empty_file+0x6d/0x170 [ 656.412226] path_openat+0xe9/0x2df0 [ 656.415952] ? __lock_acquire+0x6de/0x3ff0 [ 656.420186] ? path_lookupat+0x8d0/0x8d0 [ 656.424246] ? mark_held_locks+0xf0/0xf0 [ 656.428303] do_filp_open+0x18c/0x3f0 [ 656.432085] ? may_open_dev+0xf0/0xf0 [ 656.435870] ? __alloc_fd+0x28d/0x570 [ 656.439660] ? lock_downgrade+0x720/0x720 [ 656.443803] ? lock_acquire+0x170/0x3c0 [ 656.447777] ? __alloc_fd+0x34/0x570 [ 656.451484] ? do_raw_spin_unlock+0x171/0x230 [ 656.455979] ? _raw_spin_unlock+0x29/0x40 [ 656.460112] ? __alloc_fd+0x28d/0x570 [ 656.463905] do_sys_open+0x3b3/0x520 [ 656.467623] ? filp_open+0x70/0x70 [ 656.471149] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 656.476499] ? trace_hardirqs_off_caller+0x6e/0x210 [ 656.481498] ? do_syscall_64+0x21/0x620 10:32:09 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xb2, 0x0, 0x0) [ 656.485458] do_syscall_64+0xf9/0x620 [ 656.489248] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 656.494422] RIP: 0033:0x7f85e0246024 [ 656.498145] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 656.517127] RSP: 002b:00007f85dec07eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 656.524828] RAX: ffffffffffffffda RBX: 00007f85e02dca20 RCX: 00007f85e0246024 10:32:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 11) 10:32:09 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xffl\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 656.532084] RDX: 0000000000000002 RSI: 00007f85dec07fe0 RDI: 00000000ffffff9c [ 656.539340] RBP: 00007f85dec07fe0 R08: 0000000000000000 R09: 00007f85dec081d0 [ 656.546600] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 656.553864] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 10:32:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85f4ffffffffffffff0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:09 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x300}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:09 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xb3, 0x0, 0x0) [ 656.646412] FAULT_INJECTION: forcing a failure. [ 656.646412] name failslab, interval 1, probability 0, space 0, times 0 [ 656.659117] CPU: 1 PID: 21548 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 656.667138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 656.676475] Call Trace: [ 656.679048] dump_stack+0x1fc/0x2ef [ 656.682657] should_fail.cold+0xa/0xf [ 656.686443] ? setup_fault_attr+0x200/0x200 [ 656.690768] ? lock_acquire+0x170/0x3c0 [ 656.694728] __should_failslab+0x115/0x180 [ 656.698945] should_failslab+0x5/0x10 [ 656.702727] kmem_cache_alloc_trace+0x284/0x380 [ 656.707388] apparmor_file_alloc_security+0x394/0xad0 [ 656.712561] ? apparmor_file_receive+0x160/0x160 [ 656.717306] ? __alloc_file+0x21/0x340 [ 656.721183] security_file_alloc+0x40/0x90 [ 656.725400] __alloc_file+0xd8/0x340 [ 656.729094] alloc_empty_file+0x6d/0x170 [ 656.733137] path_openat+0xe9/0x2df0 [ 656.736832] ? __lock_acquire+0x6de/0x3ff0 [ 656.741050] ? path_lookupat+0x8d0/0x8d0 [ 656.745098] ? mark_held_locks+0xf0/0xf0 [ 656.749151] do_filp_open+0x18c/0x3f0 [ 656.752938] ? may_open_dev+0xf0/0xf0 [ 656.756723] ? __alloc_fd+0x28d/0x570 [ 656.760516] ? lock_downgrade+0x720/0x720 [ 656.764730] ? lock_acquire+0x170/0x3c0 [ 656.768697] ? __alloc_fd+0x34/0x570 [ 656.772400] ? do_raw_spin_unlock+0x171/0x230 [ 656.776882] ? _raw_spin_unlock+0x29/0x40 [ 656.781012] ? __alloc_fd+0x28d/0x570 [ 656.784810] do_sys_open+0x3b3/0x520 [ 656.788515] ? filp_open+0x70/0x70 [ 656.792039] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 656.797389] ? trace_hardirqs_off_caller+0x6e/0x210 [ 656.802388] ? do_syscall_64+0x21/0x620 [ 656.806344] do_syscall_64+0xf9/0x620 [ 656.810219] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 656.815389] RIP: 0033:0x7f85e0246024 [ 656.819258] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 656.838141] RSP: 002b:00007f85dec07eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 656.845835] RAX: ffffffffffffffda RBX: 00007f85e02dca20 RCX: 00007f85e0246024 [ 656.853086] RDX: 0000000000000002 RSI: 00007f85dec07fe0 RDI: 00000000ffffff9c [ 656.860353] RBP: 00007f85dec07fe0 R08: 0000000000000000 R09: 00007f85dec081d0 [ 656.867604] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 656.874942] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 10:32:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000010000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 12) 10:32:09 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xb4, 0x0, 0x0) [ 656.955843] (syz-executor.0,21557,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 656.955843] " or missing value [ 656.967863] (syz-executor.1,21549,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 656.967863] " or missing value 10:32:10 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xb5, 0x0, 0x0) [ 657.020160] (syz-executor.0,21557,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 657.027077] (syz-executor.1,21549,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:10 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xfft\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 657.131702] FAULT_INJECTION: forcing a failure. [ 657.131702] name failslab, interval 1, probability 0, space 0, times 0 [ 657.143504] CPU: 0 PID: 21574 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 657.151396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 657.160737] Call Trace: [ 657.163320] dump_stack+0x1fc/0x2ef [ 657.166939] should_fail.cold+0xa/0xf [ 657.170729] ? setup_fault_attr+0x200/0x200 [ 657.175052] ? lock_acquire+0x170/0x3c0 [ 657.179023] __should_failslab+0x115/0x180 [ 657.183244] should_failslab+0x5/0x10 [ 657.187025] kmem_cache_alloc_trace+0x284/0x380 [ 657.191677] ? loop_info64_to_compat+0x5e0/0x5e0 [ 657.196428] __kthread_create_on_node+0xd2/0x410 [ 657.201389] ? kthread_parkme+0xa0/0xa0 [ 657.205354] ? lock_acquire+0x170/0x3c0 [ 657.209315] ? lo_ioctl+0x1bb/0x20e0 [ 657.213024] ? __mutex_lock+0x368/0x1190 [ 657.217088] ? lock_downgrade+0x720/0x720 [ 657.221234] ? check_preemption_disabled+0x41/0x280 [ 657.226238] ? loop_info64_to_compat+0x5e0/0x5e0 [ 657.230986] kthread_create_on_node+0xbb/0xf0 [ 657.235475] ? __kthread_create_on_node+0x410/0x410 [ 657.240493] ? __fget+0x356/0x510 [ 657.243943] ? do_dup2+0x450/0x450 [ 657.247481] ? __lockdep_init_map+0x100/0x5a0 [ 657.252069] ? __lockdep_init_map+0x100/0x5a0 [ 657.256571] lo_ioctl+0xae5/0x20e0 [ 657.260113] ? loop_set_status64+0x110/0x110 [ 657.264505] blkdev_ioctl+0x5cb/0x1a80 [ 657.268408] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 657.273766] ? blkpg_ioctl+0x9d0/0x9d0 [ 657.277660] ? mark_held_locks+0xf0/0xf0 [ 657.281719] ? mark_held_locks+0xf0/0xf0 [ 657.285766] ? debug_check_no_obj_freed+0x201/0x490 [ 657.290785] ? lock_downgrade+0x720/0x720 [ 657.294935] block_ioctl+0xe9/0x130 [ 657.298560] ? blkdev_fallocate+0x3f0/0x3f0 [ 657.302876] do_vfs_ioctl+0xcdb/0x12e0 [ 657.306746] ? lock_downgrade+0x720/0x720 [ 657.310877] ? check_preemption_disabled+0x41/0x280 [ 657.315889] ? ioctl_preallocate+0x200/0x200 [ 657.320311] ? __fget+0x356/0x510 [ 657.323757] ? do_dup2+0x450/0x450 [ 657.327294] ? do_sys_open+0x2bf/0x520 [ 657.331166] ksys_ioctl+0x9b/0xc0 [ 657.334614] __x64_sys_ioctl+0x6f/0xb0 [ 657.338515] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 657.343095] do_syscall_64+0xf9/0x620 [ 657.346882] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 657.352056] RIP: 0033:0x7f85e0292ec7 [ 657.355764] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 657.374662] RSP: 002b:00007f85dec07f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 10:32:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500020000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:10 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xb6, 0x0, 0x0) [ 657.382366] RAX: ffffffffffffffda RBX: 00007f85e02dca20 RCX: 00007f85e0292ec7 [ 657.389622] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 657.396882] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f85dec081d0 [ 657.404147] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 657.411396] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 10:32:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 13) 10:32:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000020000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:10 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x500}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:10 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xb7, 0x0, 0x0) 10:32:10 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xb8, 0x0, 0x0) 10:32:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500030000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 657.582916] (syz-executor.1,21581,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 657.582916] " or missing value [ 657.612827] (syz-executor.1,21581,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 657.654369] FAULT_INJECTION: forcing a failure. [ 657.654369] name failslab, interval 1, probability 0, space 0, times 0 [ 657.668535] CPU: 1 PID: 21599 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 657.676495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 657.685842] Call Trace: [ 657.688418] dump_stack+0x1fc/0x2ef [ 657.692042] should_fail.cold+0xa/0xf [ 657.695837] ? setup_fault_attr+0x200/0x200 [ 657.700142] ? lock_acquire+0x170/0x3c0 [ 657.704114] __should_failslab+0x115/0x180 [ 657.708361] should_failslab+0x5/0x10 [ 657.712148] kmem_cache_alloc+0x277/0x370 [ 657.716295] __kernfs_new_node+0xd2/0x680 [ 657.720436] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 657.725184] ? kernfs_activate+0x2c/0x1d0 [ 657.729320] ? lock_downgrade+0x720/0x720 [ 657.733462] ? kernfs_add_one+0x51/0x4c0 [ 657.737510] ? mutex_trylock+0x1a0/0x1a0 [ 657.741560] ? __mutex_unlock_slowpath+0xea/0x610 [ 657.746388] kernfs_new_node+0x92/0x120 [ 657.750355] __kernfs_create_file+0x51/0x340 [ 657.754838] sysfs_add_file_mode_ns+0x226/0x540 [ 657.759510] internal_create_group+0x355/0xb20 [ 657.764081] ? sysfs_remove_link_from_group+0x70/0x70 [ 657.769254] ? lock_downgrade+0x720/0x720 [ 657.773389] lo_ioctl+0xf7c/0x20e0 [ 657.776982] ? loop_set_status64+0x110/0x110 [ 657.781373] blkdev_ioctl+0x5cb/0x1a80 [ 657.785246] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 657.790593] ? blkpg_ioctl+0x9d0/0x9d0 [ 657.794463] ? mark_held_locks+0xf0/0xf0 [ 657.798513] ? mark_held_locks+0xf0/0xf0 [ 657.802565] ? debug_check_no_obj_freed+0x201/0x490 [ 657.807570] ? lock_downgrade+0x720/0x720 [ 657.811704] block_ioctl+0xe9/0x130 [ 657.815313] ? blkdev_fallocate+0x3f0/0x3f0 [ 657.819617] do_vfs_ioctl+0xcdb/0x12e0 [ 657.823487] ? lock_downgrade+0x720/0x720 [ 657.827618] ? check_preemption_disabled+0x41/0x280 [ 657.832625] ? ioctl_preallocate+0x200/0x200 [ 657.837038] ? __fget+0x356/0x510 [ 657.840485] ? do_dup2+0x450/0x450 [ 657.844029] ? do_sys_open+0x2bf/0x520 [ 657.847901] ksys_ioctl+0x9b/0xc0 [ 657.851340] __x64_sys_ioctl+0x6f/0xb0 [ 657.855212] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 657.859787] do_syscall_64+0xf9/0x620 [ 657.863586] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 657.868765] RIP: 0033:0x7f85e0292ec7 [ 657.872469] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 657.891363] RSP: 002b:00007f85dec07f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 657.899055] RAX: ffffffffffffffda RBX: 00007f85e02dca20 RCX: 00007f85e0292ec7 [ 657.906319] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 657.913581] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f85dec081d0 [ 657.920852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 657.928124] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 10:32:10 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xffz\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000030000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:10 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xb9, 0x0, 0x0) 10:32:10 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x600}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 657.978884] (syz-executor.0,21601,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 657.978884] " or missing value [ 658.007517] (syz-executor.0,21601,0):ocfs2_fill_super:1225 ERROR: status = -22 10:32:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 14) 10:32:11 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xba, 0x0, 0x0) 10:32:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500040000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 658.183875] FAULT_INJECTION: forcing a failure. [ 658.183875] name failslab, interval 1, probability 0, space 0, times 0 [ 658.203111] CPU: 1 PID: 21637 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 658.211435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 658.211441] Call Trace: [ 658.211468] dump_stack+0x1fc/0x2ef [ 658.227041] should_fail.cold+0xa/0xf 10:32:11 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xbb, 0x0, 0x0) [ 658.227061] ? setup_fault_attr+0x200/0x200 [ 658.227082] ? lock_acquire+0x170/0x3c0 [ 658.239156] __should_failslab+0x115/0x180 [ 658.243414] should_failslab+0x5/0x10 [ 658.247219] kmem_cache_alloc+0x277/0x370 [ 658.251361] __kernfs_new_node+0xd2/0x680 [ 658.255613] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 658.260355] ? kernfs_activate+0x2c/0x1d0 [ 658.264487] ? lock_downgrade+0x720/0x720 [ 658.268624] ? kernfs_add_one+0x51/0x4c0 [ 658.272673] ? mutex_trylock+0x1a0/0x1a0 [ 658.276721] ? __mutex_unlock_slowpath+0xea/0x610 [ 658.281569] kernfs_new_node+0x92/0x120 [ 658.285528] __kernfs_create_file+0x51/0x340 [ 658.289921] sysfs_add_file_mode_ns+0x226/0x540 [ 658.294577] internal_create_group+0x355/0xb20 [ 658.299143] ? sysfs_remove_link_from_group+0x70/0x70 [ 658.304313] ? lock_downgrade+0x720/0x720 [ 658.308447] lo_ioctl+0xf7c/0x20e0 [ 658.311974] ? loop_set_status64+0x110/0x110 [ 658.316365] blkdev_ioctl+0x5cb/0x1a80 [ 658.320235] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 658.325580] ? blkpg_ioctl+0x9d0/0x9d0 [ 658.329463] ? mark_held_locks+0xf0/0xf0 [ 658.333527] ? mark_held_locks+0xf0/0xf0 [ 658.337583] ? debug_check_no_obj_freed+0x201/0x490 [ 658.342581] ? lock_downgrade+0x720/0x720 [ 658.346721] block_ioctl+0xe9/0x130 [ 658.350341] ? blkdev_fallocate+0x3f0/0x3f0 [ 658.354646] do_vfs_ioctl+0xcdb/0x12e0 [ 658.358514] ? lock_downgrade+0x720/0x720 [ 658.362666] ? check_preemption_disabled+0x41/0x280 [ 658.367667] ? ioctl_preallocate+0x200/0x200 [ 658.372061] ? __fget+0x356/0x510 [ 658.375499] ? do_dup2+0x450/0x450 [ 658.379026] ? do_sys_open+0x2bf/0x520 [ 658.382901] ksys_ioctl+0x9b/0xc0 [ 658.386348] __x64_sys_ioctl+0x6f/0xb0 [ 658.390225] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 658.394795] do_syscall_64+0xf9/0x620 [ 658.398586] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 658.403762] RIP: 0033:0x7f85e0292ec7 [ 658.407461] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 658.426344] RSP: 002b:00007f85dec07f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 658.434039] RAX: ffffffffffffffda RBX: 00007f85e02dca20 RCX: 00007f85e0292ec7 [ 658.441343] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 658.448603] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f85dec081d0 [ 658.455859] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 658.463116] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 658.485632] (syz-executor.1,21628,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 658.485632] " or missing value [ 658.508180] (syz-executor.1,21628,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000040000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:11 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xbc, 0x0, 0x0) 10:32:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 15) [ 658.526845] (syz-executor.0,21629,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 658.526845] " or missing value [ 658.551869] (syz-executor.0,21629,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:11 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xbd, 0x0, 0x0) 10:32:11 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc\n\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:11 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x700}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500050000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:11 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xbe, 0x0, 0x0) [ 658.736768] FAULT_INJECTION: forcing a failure. [ 658.736768] name failslab, interval 1, probability 0, space 0, times 0 [ 658.748543] CPU: 1 PID: 21671 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 658.756427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 658.765774] Call Trace: [ 658.768355] dump_stack+0x1fc/0x2ef [ 658.771975] should_fail.cold+0xa/0xf [ 658.775762] ? setup_fault_attr+0x200/0x200 [ 658.780066] ? lock_acquire+0x170/0x3c0 [ 658.784029] __should_failslab+0x115/0x180 [ 658.788262] should_failslab+0x5/0x10 [ 658.792057] kmem_cache_alloc+0x277/0x370 [ 658.796200] __kernfs_new_node+0xd2/0x680 [ 658.800363] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 658.805105] ? __mutex_unlock_slowpath+0xea/0x610 [ 658.809947] ? wait_for_completion_io+0x10/0x10 [ 658.814619] ? kernfs_next_descendant_post+0x19c/0x290 [ 658.819893] kernfs_new_node+0x92/0x120 [ 658.823862] __kernfs_create_file+0x51/0x340 [ 658.828257] sysfs_add_file_mode_ns+0x226/0x540 [ 658.832917] internal_create_group+0x355/0xb20 [ 658.837485] ? sysfs_remove_link_from_group+0x70/0x70 [ 658.842662] ? lock_downgrade+0x720/0x720 [ 658.846799] lo_ioctl+0xf7c/0x20e0 [ 658.850328] ? loop_set_status64+0x110/0x110 [ 658.854721] blkdev_ioctl+0x5cb/0x1a80 [ 658.858593] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 658.863987] ? blkpg_ioctl+0x9d0/0x9d0 [ 658.867858] ? mark_held_locks+0xf0/0xf0 [ 658.871900] ? mark_held_locks+0xf0/0xf0 [ 658.875945] ? debug_check_no_obj_freed+0x201/0x490 [ 658.880958] ? lock_downgrade+0x720/0x720 [ 658.885097] block_ioctl+0xe9/0x130 [ 658.888713] ? blkdev_fallocate+0x3f0/0x3f0 [ 658.893034] do_vfs_ioctl+0xcdb/0x12e0 [ 658.896913] ? lock_downgrade+0x720/0x720 [ 658.901048] ? check_preemption_disabled+0x41/0x280 [ 658.906048] ? ioctl_preallocate+0x200/0x200 [ 658.910490] ? __fget+0x356/0x510 [ 658.913927] ? do_dup2+0x450/0x450 [ 658.917460] ? do_sys_open+0x2bf/0x520 [ 658.921364] ksys_ioctl+0x9b/0xc0 [ 658.924801] __x64_sys_ioctl+0x6f/0xb0 [ 658.928696] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 658.933282] do_syscall_64+0xf9/0x620 [ 658.937075] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 658.942337] RIP: 0033:0x7f85e0292ec7 [ 658.946034] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 658.964940] RSP: 002b:00007f85dec07f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 658.972638] RAX: ffffffffffffffda RBX: 00007f85e02dca20 RCX: 00007f85e0292ec7 [ 658.979897] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 658.987156] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f85dec081d0 [ 658.994409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 659.001666] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 10:32:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000050000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 16) [ 659.089006] (syz-executor.1,21677,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 659.089006] " or missing value [ 659.112476] (syz-executor.0,21675,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 659.112476] " or missing value [ 659.112967] (syz-executor.1,21677,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 659.133042] FAULT_INJECTION: forcing a failure. [ 659.133042] name failslab, interval 1, probability 0, space 0, times 0 [ 659.144956] CPU: 0 PID: 21692 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 659.152846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 659.162207] Call Trace: [ 659.164807] dump_stack+0x1fc/0x2ef [ 659.168453] should_fail.cold+0xa/0xf [ 659.172263] ? is_bpf_text_address+0xfc/0x1b0 [ 659.177200] ? setup_fault_attr+0x200/0x200 [ 659.177257] ? kernel_text_address+0xbd/0xf0 [ 659.177274] ? __kernel_text_address+0x9/0x30 [ 659.177291] ? unwind_get_return_address+0x51/0x90 [ 659.177308] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 659.177326] __should_failslab+0x115/0x180 [ 659.177346] should_failslab+0x5/0x10 [ 659.177360] kmem_cache_alloc+0x3f/0x370 [ 659.177378] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 659.177396] idr_get_free+0x50e/0xa10 [ 659.188840] (syz-executor.0,21675,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 659.190636] idr_alloc_u32+0x1a5/0x320 [ 659.190657] ? __fprop_inc_percpu_max+0x210/0x210 10:32:12 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xbf, 0x0, 0x0) [ 659.190673] ? mark_held_locks+0xf0/0xf0 [ 659.190685] ? node_tag_clear+0xb5/0x1b0 [ 659.190705] ? should_fail+0x142/0x7b0 [ 659.190722] ? fs_reclaim_release+0xd0/0x110 [ 659.254802] idr_alloc_cyclic+0x102/0x230 [ 659.254823] ? idr_alloc+0x130/0x130 [ 659.254837] ? __kernfs_new_node+0xf9/0x680 [ 659.254851] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 659.254868] __kernfs_new_node+0x11a/0x680 [ 659.276255] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 659.281011] ? __mutex_unlock_slowpath+0xea/0x610 [ 659.285853] ? wait_for_completion_io+0x10/0x10 [ 659.290524] ? kernfs_next_descendant_post+0x19c/0x290 [ 659.295810] kernfs_new_node+0x92/0x120 [ 659.299779] __kernfs_create_file+0x51/0x340 [ 659.304187] sysfs_add_file_mode_ns+0x226/0x540 [ 659.308853] internal_create_group+0x355/0xb20 [ 659.313435] ? sysfs_remove_link_from_group+0x70/0x70 [ 659.318618] ? lock_downgrade+0x720/0x720 [ 659.322755] lo_ioctl+0xf7c/0x20e0 [ 659.326294] ? loop_set_status64+0x110/0x110 [ 659.330697] blkdev_ioctl+0x5cb/0x1a80 [ 659.334580] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 659.339940] ? blkpg_ioctl+0x9d0/0x9d0 [ 659.343822] ? mark_held_locks+0xf0/0xf0 [ 659.347889] ? mark_held_locks+0xf0/0xf0 [ 659.351946] ? debug_check_no_obj_freed+0x201/0x490 [ 659.356958] ? lock_downgrade+0x720/0x720 [ 659.361100] block_ioctl+0xe9/0x130 [ 659.364720] ? blkdev_fallocate+0x3f0/0x3f0 [ 659.369047] do_vfs_ioctl+0xcdb/0x12e0 [ 659.372928] ? lock_downgrade+0x720/0x720 [ 659.377061] ? check_preemption_disabled+0x41/0x280 [ 659.382063] ? ioctl_preallocate+0x200/0x200 [ 659.386471] ? __fget+0x356/0x510 [ 659.389922] ? do_dup2+0x450/0x450 [ 659.393457] ? do_sys_open+0x2bf/0x520 [ 659.397342] ksys_ioctl+0x9b/0xc0 [ 659.400780] __x64_sys_ioctl+0x6f/0xb0 [ 659.404661] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 659.409245] do_syscall_64+0xf9/0x620 [ 659.413044] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 659.418223] RIP: 0033:0x7f85e0292ec7 [ 659.421928] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 659.440811] RSP: 002b:00007f85dec07f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 659.448509] RAX: ffffffffffffffda RBX: 00007f85e02dca20 RCX: 00007f85e0292ec7 [ 659.455767] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 659.463022] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f85dec081d0 [ 659.470273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 659.477524] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 10:32:12 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc%\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:12 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0xa00}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:12 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xc0, 0x0, 0x0) 10:32:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 17) 10:32:12 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xc1, 0x0, 0x0) 10:32:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500060000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 659.708520] FAULT_INJECTION: forcing a failure. [ 659.708520] name failslab, interval 1, probability 0, space 0, times 0 [ 659.720564] CPU: 1 PID: 21722 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 659.728473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 659.728478] Call Trace: [ 659.728500] dump_stack+0x1fc/0x2ef [ 659.728518] should_fail.cold+0xa/0xf [ 659.747848] ? setup_fault_attr+0x200/0x200 [ 659.752191] ? lock_acquire+0x170/0x3c0 [ 659.756160] __should_failslab+0x115/0x180 [ 659.760379] should_failslab+0x5/0x10 [ 659.764162] kmem_cache_alloc+0x277/0x370 [ 659.768300] __kernfs_new_node+0xd2/0x680 [ 659.772436] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 659.777174] ? __mutex_unlock_slowpath+0xea/0x610 [ 659.781997] ? wait_for_completion_io+0x10/0x10 [ 659.786653] ? kernfs_next_descendant_post+0x19c/0x290 [ 659.791921] kernfs_new_node+0x92/0x120 [ 659.795880] __kernfs_create_file+0x51/0x340 [ 659.800270] sysfs_add_file_mode_ns+0x226/0x540 [ 659.804923] internal_create_group+0x355/0xb20 [ 659.809490] ? sysfs_remove_link_from_group+0x70/0x70 [ 659.814662] ? lock_downgrade+0x720/0x720 [ 659.818799] lo_ioctl+0xf7c/0x20e0 [ 659.822326] ? loop_set_status64+0x110/0x110 [ 659.826719] blkdev_ioctl+0x5cb/0x1a80 [ 659.830594] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 659.835951] ? blkpg_ioctl+0x9d0/0x9d0 [ 659.839911] ? mark_held_locks+0xf0/0xf0 [ 659.843951] ? mark_held_locks+0xf0/0xf0 [ 659.848003] ? debug_check_no_obj_freed+0x201/0x490 [ 659.853012] ? lock_downgrade+0x720/0x720 [ 659.857141] block_ioctl+0xe9/0x130 [ 659.860751] ? blkdev_fallocate+0x3f0/0x3f0 [ 659.865058] do_vfs_ioctl+0xcdb/0x12e0 [ 659.868927] ? lock_downgrade+0x720/0x720 [ 659.873061] ? check_preemption_disabled+0x41/0x280 [ 659.878057] ? ioctl_preallocate+0x200/0x200 [ 659.882448] ? __fget+0x356/0x510 [ 659.885884] ? do_dup2+0x450/0x450 [ 659.889417] ? do_sys_open+0x2bf/0x520 [ 659.893290] ksys_ioctl+0x9b/0xc0 [ 659.896725] __x64_sys_ioctl+0x6f/0xb0 [ 659.900594] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 659.905158] do_syscall_64+0xf9/0x620 [ 659.908954] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 659.914129] RIP: 0033:0x7f85e0292ec7 [ 659.917831] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 659.936713] RSP: 002b:00007f85dec07f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 659.944402] RAX: ffffffffffffffda RBX: 00007f85e02dca20 RCX: 00007f85e0292ec7 [ 659.951659] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 659.958917] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f85dec081d0 [ 659.966166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 659.973418] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 659.988875] (syz-executor.1,21712,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 659.988875] " or missing value 10:32:12 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xc2, 0x0, 0x0) 10:32:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000060000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 660.010654] (syz-executor.0,21713,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 660.010654] " or missing value [ 660.041419] (syz-executor.1,21712,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 18) 10:32:13 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xc3, 0x0, 0x0) [ 660.057872] (syz-executor.0,21713,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:13 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xc4, 0x0, 0x0) 10:32:13 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc/\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:13 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x2000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 660.179128] FAULT_INJECTION: forcing a failure. [ 660.179128] name failslab, interval 1, probability 0, space 0, times 0 [ 660.195350] CPU: 0 PID: 21750 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 660.203250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 660.212600] Call Trace: [ 660.215274] dump_stack+0x1fc/0x2ef [ 660.218914] should_fail.cold+0xa/0xf [ 660.222708] ? setup_fault_attr+0x200/0x200 [ 660.227017] ? lock_acquire+0x170/0x3c0 [ 660.230982] __should_failslab+0x115/0x180 [ 660.235215] should_failslab+0x5/0x10 [ 660.239011] kmem_cache_alloc+0x277/0x370 [ 660.243146] __kernfs_new_node+0xd2/0x680 [ 660.247284] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 660.252024] ? __mutex_unlock_slowpath+0xea/0x610 [ 660.256863] ? wait_for_completion_io+0x10/0x10 [ 660.261525] ? kernfs_next_descendant_post+0x19c/0x290 [ 660.266793] kernfs_new_node+0x92/0x120 [ 660.270759] __kernfs_create_file+0x51/0x340 [ 660.275168] sysfs_add_file_mode_ns+0x226/0x540 [ 660.279835] internal_create_group+0x355/0xb20 [ 660.284407] ? sysfs_remove_link_from_group+0x70/0x70 [ 660.289587] ? lock_downgrade+0x720/0x720 [ 660.293740] lo_ioctl+0xf7c/0x20e0 [ 660.297283] ? loop_set_status64+0x110/0x110 [ 660.301685] blkdev_ioctl+0x5cb/0x1a80 [ 660.305572] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 660.310927] ? blkpg_ioctl+0x9d0/0x9d0 [ 660.314814] ? mark_held_locks+0xf0/0xf0 [ 660.318887] ? mark_held_locks+0xf0/0xf0 [ 660.322949] ? debug_check_no_obj_freed+0x201/0x490 [ 660.327954] ? lock_downgrade+0x720/0x720 [ 660.332087] block_ioctl+0xe9/0x130 [ 660.335712] ? blkdev_fallocate+0x3f0/0x3f0 [ 660.340037] do_vfs_ioctl+0xcdb/0x12e0 [ 660.343909] ? lock_downgrade+0x720/0x720 [ 660.348040] ? check_preemption_disabled+0x41/0x280 [ 660.353036] ? ioctl_preallocate+0x200/0x200 [ 660.357442] ? __fget+0x356/0x510 [ 660.360889] ? do_dup2+0x450/0x450 [ 660.364419] ? do_sys_open+0x2bf/0x520 [ 660.368293] ksys_ioctl+0x9b/0xc0 [ 660.371739] __x64_sys_ioctl+0x6f/0xb0 [ 660.375619] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 660.380196] do_syscall_64+0xf9/0x620 [ 660.383981] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 660.389149] RIP: 0033:0x7f85e0292ec7 [ 660.392863] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 660.411748] RSP: 002b:00007f85dec07f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 660.419449] RAX: ffffffffffffffda RBX: 00007f85e02dca20 RCX: 00007f85e0292ec7 [ 660.426699] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 660.433958] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f85dec081d0 [ 660.441229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 660.448478] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 10:32:13 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xc5, 0x0, 0x0) 10:32:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500070000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000070000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 19) [ 660.621678] (syz-executor.0,21758,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 660.621678] " or missing value [ 660.669719] (syz-executor.1,21762,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 660.669719] " or missing value [ 660.677863] (syz-executor.0,21758,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 660.714457] FAULT_INJECTION: forcing a failure. [ 660.714457] name failslab, interval 1, probability 0, space 0, times 0 [ 660.727108] CPU: 0 PID: 21782 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 660.735374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 660.735380] Call Trace: [ 660.735402] dump_stack+0x1fc/0x2ef 10:32:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000080000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:13 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xc6, 0x0, 0x0) [ 660.735423] should_fail.cold+0xa/0xf [ 660.735441] ? setup_fault_attr+0x200/0x200 [ 660.735457] ? lock_acquire+0x170/0x3c0 [ 660.735479] __should_failslab+0x115/0x180 [ 660.735497] should_failslab+0x5/0x10 [ 660.735511] kmem_cache_alloc+0x277/0x370 [ 660.735529] __kernfs_new_node+0xd2/0x680 [ 660.735547] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 660.735564] ? __mutex_unlock_slowpath+0xea/0x610 [ 660.735580] ? wait_for_completion_io+0x10/0x10 [ 660.735597] ? kernfs_next_descendant_post+0x19c/0x290 [ 660.735618] kernfs_new_node+0x92/0x120 [ 660.735637] __kernfs_create_file+0x51/0x340 [ 660.735657] sysfs_add_file_mode_ns+0x226/0x540 [ 660.735678] internal_create_group+0x355/0xb20 [ 660.735698] ? sysfs_remove_link_from_group+0x70/0x70 [ 660.735712] ? lock_downgrade+0x720/0x720 [ 660.735738] lo_ioctl+0xf7c/0x20e0 [ 660.735764] ? loop_set_status64+0x110/0x110 [ 660.735781] blkdev_ioctl+0x5cb/0x1a80 [ 660.735797] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 660.735811] ? blkpg_ioctl+0x9d0/0x9d0 [ 660.735826] ? mark_held_locks+0xf0/0xf0 [ 660.735841] ? mark_held_locks+0xf0/0xf0 [ 660.735861] ? debug_check_no_obj_freed+0x201/0x490 [ 660.735880] ? lock_downgrade+0x720/0x720 [ 660.735897] block_ioctl+0xe9/0x130 [ 660.735909] ? blkdev_fallocate+0x3f0/0x3f0 [ 660.735923] do_vfs_ioctl+0xcdb/0x12e0 [ 660.735939] ? lock_downgrade+0x720/0x720 [ 660.735954] ? check_preemption_disabled+0x41/0x280 [ 660.735968] ? ioctl_preallocate+0x200/0x200 [ 660.735986] ? __fget+0x356/0x510 [ 660.736003] ? do_dup2+0x450/0x450 10:32:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500080000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 660.736017] ? do_sys_open+0x2bf/0x520 [ 660.736038] ksys_ioctl+0x9b/0xc0 [ 660.736054] __x64_sys_ioctl+0x6f/0xb0 [ 660.736068] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 660.736082] do_syscall_64+0xf9/0x620 [ 660.736100] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 660.736111] RIP: 0033:0x7f85e0292ec7 [ 660.736125] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 10:32:13 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xc7, 0x0, 0x0) [ 660.736132] RSP: 002b:00007f85dec07f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 660.736146] RAX: ffffffffffffffda RBX: 00007f85e02dca20 RCX: 00007f85e0292ec7 [ 660.736154] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 660.736162] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f85dec081d0 [ 660.736169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 660.736177] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 660.779841] (syz-executor.1,21762,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:14 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xc8, 0x0, 0x0) 10:32:14 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x3f00}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:14 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc\x8d\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:14 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xc9, 0x0, 0x0) 10:32:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 20) 10:32:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500090000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:14 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xca, 0x0, 0x0) 10:32:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000090000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 661.298233] FAULT_INJECTION: forcing a failure. [ 661.298233] name failslab, interval 1, probability 0, space 0, times 0 [ 661.311796] CPU: 1 PID: 21819 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 661.319711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 661.329054] Call Trace: [ 661.331632] dump_stack+0x1fc/0x2ef [ 661.335245] should_fail.cold+0xa/0xf [ 661.339038] ? setup_fault_attr+0x200/0x200 [ 661.343339] ? lock_acquire+0x170/0x3c0 [ 661.347301] ? dev_uevent_filter+0xd0/0xd0 [ 661.351516] __should_failslab+0x115/0x180 [ 661.355738] should_failslab+0x5/0x10 [ 661.359519] kmem_cache_alloc_trace+0x284/0x380 [ 661.364170] ? dev_uevent_filter+0xd0/0xd0 [ 661.368388] kobject_uevent_env+0x236/0x1480 [ 661.372785] lo_ioctl+0xff9/0x20e0 [ 661.376356] ? loop_set_status64+0x110/0x110 [ 661.380746] blkdev_ioctl+0x5cb/0x1a80 [ 661.384620] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 661.389967] ? blkpg_ioctl+0x9d0/0x9d0 [ 661.393833] ? mark_held_locks+0xf0/0xf0 [ 661.397876] ? mark_held_locks+0xf0/0xf0 [ 661.401939] ? debug_check_no_obj_freed+0x201/0x490 [ 661.406937] ? lock_downgrade+0x720/0x720 [ 661.411082] block_ioctl+0xe9/0x130 [ 661.414696] ? blkdev_fallocate+0x3f0/0x3f0 [ 661.419000] do_vfs_ioctl+0xcdb/0x12e0 [ 661.422870] ? lock_downgrade+0x720/0x720 [ 661.427011] ? check_preemption_disabled+0x41/0x280 [ 661.432027] ? ioctl_preallocate+0x200/0x200 [ 661.436439] ? __fget+0x356/0x510 [ 661.439879] ? do_dup2+0x450/0x450 [ 661.443404] ? do_sys_open+0x2bf/0x520 [ 661.447285] ksys_ioctl+0x9b/0xc0 [ 661.450730] __x64_sys_ioctl+0x6f/0xb0 [ 661.454610] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 661.459173] do_syscall_64+0xf9/0x620 [ 661.462967] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 661.468140] RIP: 0033:0x7f85e0292ec7 [ 661.471832] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 661.490710] RSP: 002b:00007f85dec07f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 661.498407] RAX: ffffffffffffffda RBX: 00007f85e02dca20 RCX: 00007f85e0292ec7 [ 661.505667] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 661.512916] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f85dec081d0 [ 661.520170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 661.527418] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 10:32:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 21) [ 661.577486] (syz-executor.0,21814,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 661.577486] " or missing value 10:32:14 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xcb, 0x0, 0x0) [ 661.658442] (syz-executor.0,21814,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 661.664489] (syz-executor.1,21825,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 661.664489] " or missing value 10:32:14 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x4800}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 661.722804] (syz-executor.1,21825,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000a0000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:14 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbb\x8d\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:14 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xcc, 0x0, 0x0) [ 661.874532] FAULT_INJECTION: forcing a failure. [ 661.874532] name failslab, interval 1, probability 0, space 0, times 0 [ 661.885992] CPU: 0 PID: 21846 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 661.893870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 661.903215] Call Trace: [ 661.905794] dump_stack+0x1fc/0x2ef [ 661.909414] should_fail.cold+0xa/0xf [ 661.913206] ? setup_fault_attr+0x200/0x200 [ 661.917529] ? lock_acquire+0x170/0x3c0 [ 661.921504] __should_failslab+0x115/0x180 [ 661.925731] should_failslab+0x5/0x10 [ 661.929522] __kmalloc+0x2ab/0x3c0 [ 661.933073] ? kobject_get_path+0xbf/0x240 [ 661.937317] kobject_get_path+0xbf/0x240 [ 661.941377] kobject_uevent_env+0x25c/0x1480 [ 661.945781] lo_ioctl+0xff9/0x20e0 [ 661.949308] ? loop_set_status64+0x110/0x110 [ 661.953712] blkdev_ioctl+0x5cb/0x1a80 [ 661.957605] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 661.963063] ? blkpg_ioctl+0x9d0/0x9d0 [ 661.966941] ? mark_held_locks+0xf0/0xf0 [ 661.970994] ? mark_held_locks+0xf0/0xf0 [ 661.975051] ? debug_check_no_obj_freed+0x201/0x490 [ 661.980066] ? lock_downgrade+0x720/0x720 [ 661.984196] block_ioctl+0xe9/0x130 [ 661.987799] ? blkdev_fallocate+0x3f0/0x3f0 [ 661.992108] do_vfs_ioctl+0xcdb/0x12e0 [ 661.995994] ? lock_downgrade+0x720/0x720 [ 662.000138] ? check_preemption_disabled+0x41/0x280 [ 662.005138] ? ioctl_preallocate+0x200/0x200 [ 662.009527] ? __fget+0x356/0x510 [ 662.012975] ? do_dup2+0x450/0x450 [ 662.016514] ? do_sys_open+0x2bf/0x520 [ 662.020396] ksys_ioctl+0x9b/0xc0 [ 662.023832] __x64_sys_ioctl+0x6f/0xb0 [ 662.027702] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 662.032264] do_syscall_64+0xf9/0x620 [ 662.036060] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 662.041237] RIP: 0033:0x7f85e0292ec7 [ 662.044933] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 662.063843] RSP: 002b:00007f85dec07f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 10:32:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000100000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 662.071546] RAX: ffffffffffffffda RBX: 00007f85e02dca20 RCX: 00007f85e0292ec7 [ 662.078808] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 662.086061] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f85dec081d0 [ 662.093328] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 662.100585] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 10:32:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 22) 10:32:15 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xcd, 0x0, 0x0) 10:32:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500100000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 662.245115] (syz-executor.0,21850,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 662.245115] " or missing value [ 662.269941] (syz-executor.1,21862,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 662.269941] " or missing value [ 662.279167] (syz-executor.0,21850,0):ocfs2_fill_super:1225 ERROR: status = -22 10:32:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000001f0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:15 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xce, 0x0, 0x0) [ 662.317183] (syz-executor.1,21862,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 662.360010] FAULT_INJECTION: forcing a failure. [ 662.360010] name failslab, interval 1, probability 0, space 0, times 0 [ 662.371521] CPU: 0 PID: 21877 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 662.379401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 662.388734] Call Trace: [ 662.391308] dump_stack+0x1fc/0x2ef [ 662.394930] should_fail.cold+0xa/0xf [ 662.398724] ? setup_fault_attr+0x200/0x200 [ 662.403038] ? lock_acquire+0x170/0x3c0 [ 662.407003] __should_failslab+0x115/0x180 [ 662.411218] should_failslab+0x5/0x10 [ 662.415012] kmem_cache_alloc_node+0x245/0x3b0 [ 662.419590] __alloc_skb+0x71/0x560 [ 662.423217] alloc_uevent_skb+0x7b/0x210 [ 662.427273] kobject_uevent_env+0xa90/0x1480 [ 662.431668] lo_ioctl+0xff9/0x20e0 [ 662.435204] ? loop_set_status64+0x110/0x110 [ 662.439605] blkdev_ioctl+0x5cb/0x1a80 [ 662.443487] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 662.448842] ? blkpg_ioctl+0x9d0/0x9d0 [ 662.452723] ? mark_held_locks+0xf0/0xf0 [ 662.456778] ? mark_held_locks+0xf0/0xf0 [ 662.460832] ? debug_check_no_obj_freed+0x201/0x490 [ 662.465842] ? lock_downgrade+0x720/0x720 [ 662.469976] block_ioctl+0xe9/0x130 [ 662.473596] ? blkdev_fallocate+0x3f0/0x3f0 [ 662.477926] do_vfs_ioctl+0xcdb/0x12e0 [ 662.481804] ? lock_downgrade+0x720/0x720 [ 662.485934] ? check_preemption_disabled+0x41/0x280 [ 662.490930] ? ioctl_preallocate+0x200/0x200 [ 662.495330] ? __fget+0x356/0x510 [ 662.498776] ? do_dup2+0x450/0x450 [ 662.502306] ? do_sys_open+0x2bf/0x520 [ 662.506186] ksys_ioctl+0x9b/0xc0 [ 662.509624] __x64_sys_ioctl+0x6f/0xb0 [ 662.513503] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 662.518082] do_syscall_64+0xf9/0x620 [ 662.521875] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 662.527043] RIP: 0033:0x7f85e0292ec7 [ 662.530734] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 662.549622] RSP: 002b:00007f85dec07f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 662.557315] RAX: ffffffffffffffda RBX: 00007f85e02dca20 RCX: 00007f85e0292ec7 [ 662.564577] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 662.571838] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f85dec081d0 [ 662.579088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 662.586364] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 10:32:15 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x4c00}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 23) 10:32:15 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xadR\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000200000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:15 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xcf, 0x0, 0x0) 10:32:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500220000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:15 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xd0, 0x0, 0x0) [ 662.873052] FAULT_INJECTION: forcing a failure. [ 662.873052] name failslab, interval 1, probability 0, space 0, times 0 [ 662.908558] CPU: 0 PID: 21905 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 662.916467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 662.925820] Call Trace: [ 662.928428] dump_stack+0x1fc/0x2ef [ 662.932055] should_fail.cold+0xa/0xf [ 662.935852] ? setup_fault_attr+0x200/0x200 [ 662.940154] ? lock_acquire+0x170/0x3c0 [ 662.944127] __should_failslab+0x115/0x180 [ 662.948357] should_failslab+0x5/0x10 [ 662.952139] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 662.957227] __kmalloc_node_track_caller+0x38/0x70 [ 662.962157] __alloc_skb+0xae/0x560 [ 662.965769] alloc_uevent_skb+0x7b/0x210 [ 662.969814] kobject_uevent_env+0xa90/0x1480 [ 662.974225] lo_ioctl+0xff9/0x20e0 [ 662.977756] ? loop_set_status64+0x110/0x110 [ 662.982146] blkdev_ioctl+0x5cb/0x1a80 [ 662.986015] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 662.991359] ? blkpg_ioctl+0x9d0/0x9d0 [ 662.995238] ? mark_held_locks+0xf0/0xf0 [ 662.999289] ? mark_held_locks+0xf0/0xf0 [ 663.003332] ? debug_check_no_obj_freed+0x201/0x490 [ 663.008331] ? lock_downgrade+0x720/0x720 [ 663.012461] block_ioctl+0xe9/0x130 [ 663.016072] ? blkdev_fallocate+0x3f0/0x3f0 [ 663.020377] do_vfs_ioctl+0xcdb/0x12e0 [ 663.024261] ? lock_downgrade+0x720/0x720 [ 663.028398] ? check_preemption_disabled+0x41/0x280 [ 663.033404] ? ioctl_preallocate+0x200/0x200 [ 663.037801] ? __fget+0x356/0x510 [ 663.041238] ? do_dup2+0x450/0x450 [ 663.044764] ? do_sys_open+0x2bf/0x520 [ 663.048641] ksys_ioctl+0x9b/0xc0 [ 663.052090] __x64_sys_ioctl+0x6f/0xb0 [ 663.055975] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 663.060545] do_syscall_64+0xf9/0x620 [ 663.064347] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 663.069528] RIP: 0033:0x7f85e0292ec7 [ 663.073276] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 663.092206] RSP: 002b:00007f85dec07f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 663.099917] RAX: ffffffffffffffda RBX: 00007f85e02dca20 RCX: 00007f85e0292ec7 [ 663.107180] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 663.114534] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f85dec081d0 [ 663.121787] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 663.129038] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 663.153558] (syz-executor.1,21906,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 663.153558] " or missing value 10:32:16 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xd1, 0x0, 0x0) [ 663.163702] (syz-executor.0,21904,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 663.163702] " or missing value [ 663.176808] (syz-executor.1,21906,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 663.211280] (syz-executor.0,21904,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000230000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:16 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x6000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:16 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x8d\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:16 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xd2, 0x0, 0x0) 10:32:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 24) 10:32:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500230000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:16 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xd3, 0x0, 0x0) [ 663.431034] FAULT_INJECTION: forcing a failure. [ 663.431034] name failslab, interval 1, probability 0, space 0, times 0 [ 663.448506] CPU: 1 PID: 21945 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 663.456413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 663.465769] Call Trace: [ 663.468355] dump_stack+0x1fc/0x2ef [ 663.471974] should_fail.cold+0xa/0xf [ 663.475762] ? setup_fault_attr+0x200/0x200 [ 663.480074] ? lock_acquire+0x170/0x3c0 [ 663.484069] __should_failslab+0x115/0x180 [ 663.488293] should_failslab+0x5/0x10 [ 663.492077] kmem_cache_alloc+0x277/0x370 [ 663.496209] skb_clone+0x151/0x3d0 [ 663.499731] netlink_broadcast_filtered+0x8e5/0xbc0 [ 663.504732] netlink_broadcast+0x35/0x40 [ 663.508779] kobject_uevent_env+0xa56/0x1480 [ 663.513183] lo_ioctl+0xff9/0x20e0 [ 663.516709] ? loop_set_status64+0x110/0x110 [ 663.521103] blkdev_ioctl+0x5cb/0x1a80 [ 663.524980] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 663.530331] ? blkpg_ioctl+0x9d0/0x9d0 [ 663.534203] ? mark_held_locks+0xf0/0xf0 [ 663.538273] ? mark_held_locks+0xf0/0xf0 [ 663.542320] ? debug_check_no_obj_freed+0x201/0x490 [ 663.547320] ? lock_downgrade+0x720/0x720 [ 663.551456] block_ioctl+0xe9/0x130 [ 663.555077] ? blkdev_fallocate+0x3f0/0x3f0 [ 663.559379] do_vfs_ioctl+0xcdb/0x12e0 [ 663.563261] ? lock_downgrade+0x720/0x720 [ 663.567403] ? check_preemption_disabled+0x41/0x280 [ 663.572400] ? ioctl_preallocate+0x200/0x200 [ 663.576791] ? __fget+0x356/0x510 [ 663.580228] ? do_dup2+0x450/0x450 [ 663.583754] ? do_sys_open+0x2bf/0x520 [ 663.587629] ksys_ioctl+0x9b/0xc0 [ 663.591065] __x64_sys_ioctl+0x6f/0xb0 [ 663.594934] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 663.599497] do_syscall_64+0xf9/0x620 [ 663.603281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 663.608459] RIP: 0033:0x7f85e0292ec7 [ 663.612167] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 663.631050] RSP: 002b:00007f85dec07f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 663.638742] RAX: ffffffffffffffda RBX: 00007f85e02dca20 RCX: 00007f85e0292ec7 [ 663.645997] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 663.653248] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f85dec081d0 [ 663.660497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 663.667748] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 10:32:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 25) 10:32:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500480000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 663.799641] (syz-executor.1,21942,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 663.799641] " or missing value [ 663.814627] (syz-executor.0,21943,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 663.814627] " or missing value 10:32:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000003f0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:16 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xd4, 0x0, 0x0) [ 663.848336] (syz-executor.1,21942,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 663.873437] (syz-executor.0,21943,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:16 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xd5, 0x0, 0x0) 10:32:17 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6\n|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:17 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x6800}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 664.021108] FAULT_INJECTION: forcing a failure. [ 664.021108] name failslab, interval 1, probability 0, space 0, times 0 [ 664.044280] CPU: 1 PID: 21969 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 664.052189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 664.061550] Call Trace: [ 664.064154] dump_stack+0x1fc/0x2ef 10:32:17 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xd6, 0x0, 0x0) [ 664.067806] should_fail.cold+0xa/0xf [ 664.071639] ? setup_fault_attr+0x200/0x200 [ 664.071657] ? lock_acquire+0x170/0x3c0 [ 664.071679] __should_failslab+0x115/0x180 [ 664.071697] should_failslab+0x5/0x10 [ 664.071712] kmem_cache_alloc+0x277/0x370 [ 664.071731] getname_flags+0xce/0x590 [ 664.071747] do_mkdirat+0x8d/0x2d0 [ 664.099448] ? __ia32_sys_mknod+0x120/0x120 [ 664.099465] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 664.099480] ? trace_hardirqs_off_caller+0x6e/0x210 [ 664.099497] ? do_syscall_64+0x21/0x620 [ 664.118120] do_syscall_64+0xf9/0x620 [ 664.121918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 664.127099] RIP: 0033:0x7f85e0292217 [ 664.130799] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 664.149685] RSP: 002b:00007f85dec07f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 664.157384] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e0292217 [ 664.164645] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c 10:32:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85004a0000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 664.171900] RBP: 00007f85dec081d0 R08: 0000000000000000 R09: 00007f85dec081d0 [ 664.179151] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 664.186399] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 10:32:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 26) 10:32:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000480000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:17 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xd7, 0x0, 0x0) [ 664.403387] FAULT_INJECTION: forcing a failure. [ 664.403387] name failslab, interval 1, probability 0, space 0, times 0 [ 664.471444] CPU: 1 PID: 22000 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 664.479400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 664.488751] Call Trace: [ 664.491332] dump_stack+0x1fc/0x2ef [ 664.494952] should_fail.cold+0xa/0xf [ 664.498744] ? setup_fault_attr+0x200/0x200 [ 664.503050] ? lock_acquire+0x170/0x3c0 [ 664.507017] __should_failslab+0x115/0x180 [ 664.511250] should_failslab+0x5/0x10 [ 664.515037] kmem_cache_alloc+0x277/0x370 [ 664.519177] getname_flags+0xce/0x590 [ 664.522965] do_mkdirat+0x8d/0x2d0 [ 664.526493] ? __ia32_sys_mknod+0x120/0x120 [ 664.530803] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 664.536154] ? trace_hardirqs_off_caller+0x6e/0x210 [ 664.541159] ? do_syscall_64+0x21/0x620 [ 664.545124] do_syscall_64+0xf9/0x620 [ 664.548915] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 664.554089] RIP: 0033:0x7f85e0292217 [ 664.557787] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 664.576670] RSP: 002b:00007f85dec07f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 664.584363] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e0292217 [ 664.591617] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 664.598872] RBP: 00007f85dec081d0 R08: 0000000000000000 R09: 00007f85dec081d0 [ 664.606128] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 664.613384] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 10:32:17 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xd8, 0x0, 0x0) 10:32:17 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x6c00}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:17 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xd9, 0x0, 0x0) [ 664.695230] (syz-executor.1,21998,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 664.695230] " or missing value 10:32:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 27) [ 664.740393] (syz-executor.1,21998,0):ocfs2_fill_super:1225 ERROR: status = -22 10:32:17 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6\x8d|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:17 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xda, 0x0, 0x0) 10:32:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000004c0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85004c0000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:17 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xdb, 0x0, 0x0) [ 664.960662] FAULT_INJECTION: forcing a failure. [ 664.960662] name failslab, interval 1, probability 0, space 0, times 0 [ 664.975232] CPU: 0 PID: 22039 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 664.983119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 664.992466] Call Trace: [ 664.995040] dump_stack+0x1fc/0x2ef [ 664.998762] should_fail.cold+0xa/0xf [ 665.002566] ? setup_fault_attr+0x200/0x200 [ 665.006881] ? lock_acquire+0x170/0x3c0 [ 665.010840] __should_failslab+0x115/0x180 [ 665.015066] should_failslab+0x5/0x10 [ 665.018859] kmem_cache_alloc_trace+0x284/0x380 [ 665.023521] ? wait_for_completion_io+0x10/0x10 [ 665.028181] ? kobj_ns_initial+0x90/0x90 [ 665.032224] call_usermodehelper_setup+0x84/0x300 [ 665.037051] kobject_uevent_env+0xe83/0x1480 [ 665.041449] lo_ioctl+0xff9/0x20e0 [ 665.044973] ? loop_set_status64+0x110/0x110 [ 665.049374] blkdev_ioctl+0x5cb/0x1a80 [ 665.053248] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 665.058693] ? blkpg_ioctl+0x9d0/0x9d0 [ 665.062575] ? mark_held_locks+0xf0/0xf0 [ 665.066627] ? mark_held_locks+0xf0/0xf0 [ 665.070671] ? debug_check_no_obj_freed+0x201/0x490 [ 665.075668] ? lock_downgrade+0x720/0x720 [ 665.079798] block_ioctl+0xe9/0x130 [ 665.083418] ? blkdev_fallocate+0x3f0/0x3f0 [ 665.087730] do_vfs_ioctl+0xcdb/0x12e0 [ 665.091772] ? lock_downgrade+0x720/0x720 [ 665.095989] ? check_preemption_disabled+0x41/0x280 [ 665.100989] ? ioctl_preallocate+0x200/0x200 [ 665.105380] ? __fget+0x356/0x510 [ 665.108815] ? do_dup2+0x450/0x450 [ 665.112338] ? do_sys_open+0x2bf/0x520 [ 665.116210] ksys_ioctl+0x9b/0xc0 [ 665.119647] __x64_sys_ioctl+0x6f/0xb0 [ 665.123528] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 665.128109] do_syscall_64+0xf9/0x620 [ 665.131905] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 665.137077] RIP: 0033:0x7f85e0292ec7 [ 665.140779] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 665.159664] RSP: 002b:00007f85dec07f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 665.167354] RAX: ffffffffffffffda RBX: 00007f85e02dca20 RCX: 00007f85e0292ec7 [ 665.174607] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 665.181861] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f85dec081d0 [ 665.189118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 665.196374] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 10:32:18 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xdc, 0x0, 0x0) [ 665.255197] (syz-executor.1,22037,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 665.255197] " or missing value [ 665.268251] (syz-executor.1,22037,0):ocfs2_fill_super:1225 ERROR: status = -22 10:32:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 28) 10:32:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000680000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:18 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_\x8dS\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 665.424252] (syz-executor.0,22038,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 665.424252] " or missing value [ 665.447774] (syz-executor.0,22038,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 665.526770] FAULT_INJECTION: forcing a failure. [ 665.526770] name failslab, interval 1, probability 0, space 0, times 0 [ 665.557630] (syz-executor.1,22065,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 665.557630] " or missing value 10:32:18 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x7400}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500600000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:18 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xdd, 0x0, 0x0) [ 665.580115] (syz-executor.1,22065,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 665.590327] CPU: 0 PID: 22060 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 665.598224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 665.607575] Call Trace: [ 665.610151] dump_stack+0x1fc/0x2ef [ 665.613785] should_fail.cold+0xa/0xf [ 665.617593] ? setup_fault_attr+0x200/0x200 [ 665.621926] ? lock_acquire+0x170/0x3c0 [ 665.625917] __should_failslab+0x115/0x180 [ 665.630157] should_failslab+0x5/0x10 [ 665.633963] kmem_cache_alloc+0x277/0x370 [ 665.638126] __d_alloc+0x2b/0xa10 [ 665.641595] d_alloc+0x4a/0x230 [ 665.644887] __lookup_hash+0xc8/0x180 [ 665.648692] filename_create+0x186/0x490 [ 665.652767] ? kern_path_mountpoint+0x40/0x40 [ 665.657273] ? strncpy_from_user+0x2a2/0x350 [ 665.662057] ? getname_flags+0x25b/0x590 [ 665.666135] do_mkdirat+0xa0/0x2d0 [ 665.669680] ? __ia32_sys_mknod+0x120/0x120 [ 665.674020] ? trace_hardirqs_off_caller+0x6e/0x210 10:32:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000006c0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 665.674036] ? do_syscall_64+0x21/0x620 [ 665.674054] do_syscall_64+0xf9/0x620 [ 665.674074] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 665.674087] RIP: 0033:0x7f85e0292217 [ 665.674100] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 665.674108] RSP: 002b:00007f85dec07f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 665.674122] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e0292217 [ 665.674130] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 665.674139] RBP: 00007f85dec081d0 R08: 0000000000000000 R09: 00007f85dec081d0 [ 665.674147] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 10:32:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 29) 10:32:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500680000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 665.674155] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 10:32:18 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|\x8d\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:18 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xde, 0x0, 0x0) [ 665.915409] FAULT_INJECTION: forcing a failure. [ 665.915409] name failslab, interval 1, probability 0, space 0, times 0 [ 665.932324] CPU: 1 PID: 22102 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 665.940225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 665.949594] Call Trace: [ 665.952191] dump_stack+0x1fc/0x2ef [ 665.955831] should_fail.cold+0xa/0xf [ 665.959661] ? setup_fault_attr+0x200/0x200 10:32:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000740000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 665.959687] __should_failslab+0x115/0x180 [ 665.959711] should_failslab+0x5/0x10 [ 665.959726] kmem_cache_alloc+0x277/0x370 [ 665.959742] ? ext4_sync_fs+0x8d0/0x8d0 [ 665.959758] ext4_alloc_inode+0x1a/0x630 [ 665.959774] ? ext4_sync_fs+0x8d0/0x8d0 [ 665.959788] alloc_inode+0x5d/0x180 [ 665.959800] new_inode+0x1d/0xf0 [ 665.959815] __ext4_new_inode+0x400/0x5a20 [ 665.959837] ? putname+0xe1/0x120 [ 666.003228] ? do_mkdirat+0xa0/0x2d0 [ 666.003249] ? ext4_free_inode+0x1780/0x1780 10:32:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85006c0000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:19 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x7a00}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 666.003260] ? debug_check_no_obj_freed+0x201/0x490 [ 666.003273] ? __dquot_initialize+0x298/0xb70 [ 666.003289] ? lock_acquire+0x170/0x3c0 [ 666.003302] ? dquot_initialize_needed+0x290/0x290 [ 666.003315] ? trace_hardirqs_off+0x64/0x200 [ 666.003330] ? common_perm+0x4be/0x800 [ 666.003344] ext4_mkdir+0x396/0xe10 [ 666.003360] ? putname+0xe1/0x120 [ 666.003375] ? ext4_init_dot_dotdot+0x600/0x600 [ 666.003388] ? generic_permission+0x116/0x4d0 [ 666.003400] ? security_inode_permission+0xc5/0xf0 [ 666.003414] ? inode_permission.part.0+0x10c/0x450 [ 666.003428] vfs_mkdir+0x508/0x7a0 [ 666.003440] do_mkdirat+0x262/0x2d0 10:32:19 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xdf, 0x0, 0x0) [ 666.003451] ? __ia32_sys_mknod+0x120/0x120 [ 666.003464] ? trace_hardirqs_off_caller+0x6e/0x210 [ 666.003476] ? do_syscall_64+0x21/0x620 [ 666.003489] do_syscall_64+0xf9/0x620 [ 666.003505] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 666.003514] RIP: 0033:0x7f85e0292217 [ 666.003525] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 666.003531] RSP: 002b:00007f85dec07f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 666.003542] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e0292217 [ 666.003548] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 666.003554] RBP: 00007f85dec081d0 R08: 0000000000000000 R09: 00007f85dec081d0 [ 666.003561] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 666.003567] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 10:32:19 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xe0, 0x0, 0x0) 10:32:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 30) [ 666.005330] (syz-executor.0,22085,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 666.005330] " or missing value [ 666.005390] (syz-executor.0,22085,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 666.131636] (syz-executor.1,22112,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 666.131636] " or missing value [ 666.308656] (syz-executor.1,22112,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:19 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xe1, 0x0, 0x0) 10:32:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500700000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:19 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93\x8d\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 666.424411] (syz-executor.0,22126,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 666.424411] " or missing value [ 666.445192] (syz-executor.0,22126,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:19 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xe2, 0x0, 0x0) 10:32:19 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0xedc0}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000007a0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 666.510458] FAULT_INJECTION: forcing a failure. [ 666.510458] name failslab, interval 1, probability 0, space 0, times 0 10:32:19 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xe3, 0x0, 0x0) [ 666.574863] CPU: 0 PID: 22144 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 666.582772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 666.592121] Call Trace: [ 666.594723] dump_stack+0x1fc/0x2ef [ 666.598356] should_fail.cold+0xa/0xf [ 666.602167] ? setup_fault_attr+0x200/0x200 [ 666.606490] ? __lock_acquire+0x6de/0x3ff0 [ 666.610733] __should_failslab+0x115/0x180 [ 666.614976] should_failslab+0x5/0x10 [ 666.618780] __kmalloc+0x2ab/0x3c0 [ 666.622327] ? ext4_find_extent+0x9bb/0xc70 [ 666.626654] ext4_find_extent+0x9bb/0xc70 [ 666.630802] ext4_ext_map_blocks+0x1c0/0x7390 [ 666.635282] ? __lock_acquire+0x6de/0x3ff0 [ 666.639507] ? __lock_acquire+0x6de/0x3ff0 [ 666.643724] ? mark_held_locks+0xf0/0xf0 [ 666.647764] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 666.653108] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 666.658282] ? mark_held_locks+0xf0/0xf0 [ 666.662325] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 666.667178] ? ext4_es_lookup_extent+0x375/0xb60 [ 666.671933] ? lock_downgrade+0x720/0x720 [ 666.676079] ? lock_acquire+0x170/0x3c0 [ 666.680039] ? check_preemption_disabled+0x41/0x280 [ 666.685037] ? lock_acquire+0x170/0x3c0 [ 666.688990] ? ext4_map_blocks+0x33e/0x1a50 [ 666.693296] ext4_map_blocks+0xd88/0x1a50 [ 666.697426] ? check_preemption_disabled+0x41/0x280 [ 666.702439] ? ext4_issue_zeroout+0x160/0x160 [ 666.706924] ? __brelse+0x84/0xa0 [ 666.710362] ? __ext4_new_inode+0x2eb/0x5a20 [ 666.714777] ext4_getblk+0xad/0x4f0 [ 666.718390] ? ext4_iomap_begin+0xe00/0xe00 [ 666.722695] ? ext4_free_inode+0x1780/0x1780 [ 666.727097] ? debug_check_no_obj_freed+0x201/0x490 [ 666.732106] ? __dquot_initialize+0x298/0xb70 [ 666.736590] ext4_bread+0x7c/0x210 [ 666.740119] ? ext4_getblk+0x4f0/0x4f0 [ 666.743992] ? dquot_initialize_needed+0x290/0x290 [ 666.748904] ? trace_hardirqs_off+0x64/0x200 [ 666.753314] ext4_append+0x155/0x370 [ 666.757032] ext4_mkdir+0x5bd/0xe10 [ 666.760654] ? ext4_init_dot_dotdot+0x600/0x600 [ 666.765320] ? generic_permission+0x116/0x4d0 [ 666.769800] ? inode_permission.part.0+0x10c/0x450 [ 666.774722] vfs_mkdir+0x508/0x7a0 [ 666.778252] do_mkdirat+0x262/0x2d0 [ 666.781859] ? __ia32_sys_mknod+0x120/0x120 [ 666.786164] ? trace_hardirqs_off_caller+0x6e/0x210 [ 666.791190] ? do_syscall_64+0x21/0x620 [ 666.795147] do_syscall_64+0xf9/0x620 [ 666.798960] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 666.804134] RIP: 0033:0x7f85e0292217 10:32:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500720000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 666.807826] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 666.826713] RSP: 002b:00007f85dec07f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 666.834410] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e0292217 [ 666.841663] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 666.848917] RBP: 00007f85dec081d0 R08: 0000000000000000 R09: 00007f85dec081d0 [ 666.856169] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 666.863425] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 10:32:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000ecb3cb8a0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 666.943904] (syz-executor.1,22158,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 666.943904] " or missing value 10:32:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 31) 10:32:19 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xe4, 0x0, 0x0) [ 666.991898] (syz-executor.1,22158,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 666.999103] (syz-executor.0,22164,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 666.999103] " or missing value [ 667.013432] (syz-executor.0,22164,0):ocfs2_fill_super:1225 ERROR: status = -22 10:32:20 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4%#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:20 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xe5, 0x0, 0x0) 10:32:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500740000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 667.109861] FAULT_INJECTION: forcing a failure. [ 667.109861] name failslab, interval 1, probability 0, space 0, times 0 10:32:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000ffffff8c0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:20 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x40000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 667.206043] CPU: 0 PID: 22189 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 667.213964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 667.223328] Call Trace: [ 667.225932] dump_stack+0x1fc/0x2ef [ 667.229569] should_fail.cold+0xa/0xf [ 667.233379] ? setup_fault_attr+0x200/0x200 [ 667.237712] ? lock_downgrade+0x720/0x720 [ 667.241872] __should_failslab+0x115/0x180 [ 667.246118] should_failslab+0x5/0x10 [ 667.249923] __kmalloc+0x2ab/0x3c0 [ 667.253470] ? ext4_find_extent+0x9bb/0xc70 [ 667.257800] ext4_find_extent+0x9bb/0xc70 [ 667.261961] ext4_ext_map_blocks+0x1c0/0x7390 [ 667.266471] ? __lock_acquire+0x6de/0x3ff0 [ 667.270716] ? mark_held_locks+0xf0/0xf0 [ 667.274783] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 667.280150] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 667.285349] ? mark_held_locks+0xf0/0xf0 [ 667.289419] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 667.294271] ? ext4_es_lookup_extent+0x375/0xb60 [ 667.299033] ? ext4_map_blocks+0x59f/0x1a50 [ 667.303362] ? lock_acquire+0x170/0x3c0 [ 667.307338] ? ext4_map_blocks+0x740/0x1a50 [ 667.311676] ext4_map_blocks+0x7a2/0x1a50 [ 667.315832] ? check_preemption_disabled+0x41/0x280 [ 667.321038] ? ext4_issue_zeroout+0x160/0x160 [ 667.325538] ? __brelse+0x84/0xa0 [ 667.328994] ? __ext4_new_inode+0x2eb/0x5a20 [ 667.333414] ext4_getblk+0xad/0x4f0 [ 667.337048] ? ext4_iomap_begin+0xe00/0xe00 [ 667.341374] ? ext4_free_inode+0x1780/0x1780 [ 667.345783] ? debug_check_no_obj_freed+0x201/0x490 [ 667.350801] ? __dquot_initialize+0x298/0xb70 [ 667.355301] ext4_bread+0x7c/0x210 [ 667.358844] ? ext4_getblk+0x4f0/0x4f0 [ 667.362743] ? dquot_initialize_needed+0x290/0x290 [ 667.367688] ? trace_hardirqs_off+0x64/0x200 [ 667.372110] ext4_append+0x155/0x370 [ 667.375831] ext4_mkdir+0x5bd/0xe10 [ 667.379470] ? ext4_init_dot_dotdot+0x600/0x600 [ 667.384149] ? generic_permission+0x116/0x4d0 [ 667.388652] ? inode_permission.part.0+0x10c/0x450 [ 667.393594] vfs_mkdir+0x508/0x7a0 [ 667.397140] do_mkdirat+0x262/0x2d0 [ 667.400807] ? __ia32_sys_mknod+0x120/0x120 [ 667.405138] ? trace_hardirqs_off_caller+0x6e/0x210 [ 667.410158] ? do_syscall_64+0x21/0x620 [ 667.414141] do_syscall_64+0xf9/0x620 [ 667.417960] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 667.423152] RIP: 0033:0x7f85e0292217 [ 667.426854] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 667.445738] RSP: 002b:00007f85dec07f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 10:32:20 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xe6, 0x0, 0x0) 10:32:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000ffffff970000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 667.453432] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e0292217 [ 667.460685] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 667.467939] RBP: 00007f85dec081d0 R08: 0000000000000000 R09: 00007f85dec081d0 [ 667.475213] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 667.482467] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 10:32:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 32) [ 667.531532] (syz-executor.0,22205,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 667.531532] " or missing value [ 667.563375] (syz-executor.0,22205,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85007a0000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:20 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xe7, 0x0, 0x0) [ 667.580550] (syz-executor.1,22211,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 667.580550] " or missing value [ 667.602051] (syz-executor.1,22211,0):ocfs2_fill_super:1225 ERROR: status = -22 10:32:20 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4R#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 667.704333] FAULT_INJECTION: forcing a failure. [ 667.704333] name failslab, interval 1, probability 0, space 0, times 0 [ 667.715689] CPU: 0 PID: 22228 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 667.723572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 667.733017] Call Trace: [ 667.735615] dump_stack+0x1fc/0x2ef [ 667.739253] should_fail.cold+0xa/0xf [ 667.743067] ? setup_fault_attr+0x200/0x200 [ 667.747396] ? __es_tree_search.isra.0+0x1af/0x210 [ 667.752339] __should_failslab+0x115/0x180 [ 667.756587] should_failslab+0x5/0x10 [ 667.760403] kmem_cache_alloc+0x3f/0x370 [ 667.764475] __es_insert_extent+0x39b/0x13b0 [ 667.768896] ? lock_acquire+0x170/0x3c0 [ 667.772874] ? ext4_es_insert_extent+0x17e/0x5e0 [ 667.777650] ext4_es_insert_extent+0x22e/0x5e0 [ 667.782695] ? lock_downgrade+0x720/0x720 10:32:20 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x1fffff}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 667.782753] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 10:32:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000edc00000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500910000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 667.782774] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 667.782788] ? ext4_es_find_delayed_extent_range+0x7d9/0x9f0 [ 667.782806] ext4_ext_map_blocks+0x2129/0x7390 [ 667.782823] ? __lock_acquire+0x6de/0x3ff0 [ 667.782843] ? __lock_acquire+0x6de/0x3ff0 [ 667.782863] ? mark_held_locks+0xf0/0xf0 [ 667.782877] ? __ext4_handle_dirty_metadata+0x1e0/0x590 10:32:20 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x8d#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 667.782892] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 667.782907] ? mark_held_locks+0xf0/0xf0 [ 667.782923] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 667.782942] ? ext4_es_lookup_extent+0x375/0xb60 [ 667.782965] ? check_preemption_disabled+0x41/0x280 [ 667.782984] ? lock_acquire+0x170/0x3c0 10:32:21 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x1000000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 667.782998] ? ext4_map_blocks+0x33e/0x1a50 [ 667.783020] ext4_map_blocks+0xd88/0x1a50 [ 667.783039] ? check_preemption_disabled+0x41/0x280 [ 667.783056] ? ext4_issue_zeroout+0x160/0x160 [ 667.783072] ? __brelse+0x84/0xa0 [ 667.783085] ? __ext4_new_inode+0x2eb/0x5a20 [ 667.783108] ext4_getblk+0xad/0x4f0 [ 667.783123] ? ext4_iomap_begin+0xe00/0xe00 [ 667.783140] ? ext4_free_inode+0x1780/0x1780 [ 667.783153] ? debug_check_no_obj_freed+0x201/0x490 [ 667.783167] ? __dquot_initialize+0x298/0xb70 [ 667.783185] ext4_bread+0x7c/0x210 [ 667.783199] ? ext4_getblk+0x4f0/0x4f0 [ 667.783213] ? dquot_initialize_needed+0x290/0x290 10:32:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 33) 10:32:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000008acbb3ec0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 667.783230] ? trace_hardirqs_off+0x64/0x200 [ 667.783248] ext4_append+0x155/0x370 [ 667.783266] ext4_mkdir+0x5bd/0xe10 [ 667.783288] ? ext4_init_dot_dotdot+0x600/0x600 [ 667.783304] ? generic_permission+0x116/0x4d0 [ 667.783321] ? inode_permission.part.0+0x10c/0x450 [ 667.783339] vfs_mkdir+0x508/0x7a0 [ 667.783355] do_mkdirat+0x262/0x2d0 [ 667.783370] ? __ia32_sys_mknod+0x120/0x120 [ 667.783387] ? trace_hardirqs_off_caller+0x6e/0x210 [ 667.783401] ? do_syscall_64+0x21/0x620 [ 667.783418] do_syscall_64+0xf9/0x620 [ 667.783438] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 667.783449] RIP: 0033:0x7f85e0292217 10:32:21 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15\x8db\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85009f0000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 667.783463] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 667.783470] RSP: 002b:00007f85dec07f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 667.783484] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e0292217 [ 667.783492] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 667.783500] RBP: 00007f85dec081d0 R08: 0000000000000000 R09: 00007f85dec081d0 [ 667.783508] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 667.783516] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 [ 667.928607] (syz-executor.1,22239,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 667.928607] " or missing value [ 667.928695] (syz-executor.1,22239,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 667.996731] (syz-executor.0,22250,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 667.996731] " or missing value [ 667.996803] (syz-executor.0,22250,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 668.233336] (syz-executor.1,22267,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 668.233336] " or missing value [ 668.233394] (syz-executor.1,22267,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 668.292616] FAULT_INJECTION: forcing a failure. [ 668.292616] name failslab, interval 1, probability 0, space 0, times 0 [ 668.356009] CPU: 0 PID: 22281 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 668.363893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 668.373244] Call Trace: [ 668.375847] dump_stack+0x1fc/0x2ef [ 668.379486] should_fail.cold+0xa/0xf [ 668.383294] ? setup_fault_attr+0x200/0x200 [ 668.387621] ? lock_downgrade+0x720/0x720 [ 668.391771] ? check_preemption_disabled+0x41/0x280 [ 668.396799] __should_failslab+0x115/0x180 [ 668.401052] should_failslab+0x5/0x10 [ 668.404859] kmem_cache_alloc+0x277/0x370 [ 668.409013] ext4_mb_new_blocks+0x60a/0x4370 [ 668.413433] ? rcu_read_lock_sched_held+0x16c/0x1d0 10:32:21 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xe8, 0x0, 0x0) [ 668.418453] ? ext4_cache_extents+0x68/0x2d0 [ 668.422865] ? ext4_find_extent+0x9bb/0xc70 [ 668.427194] ? ext4_discard_preallocations+0xfb0/0xfb0 [ 668.432468] ? ext4_ext_search_right+0x2c7/0xb60 [ 668.437233] ? ext4_inode_to_goal_block+0x2d2/0x3e0 [ 668.442257] ext4_ext_map_blocks+0x2aa2/0x7390 [ 668.446850] ? __lock_acquire+0x6de/0x3ff0 [ 668.451090] ? mark_held_locks+0xf0/0xf0 [ 668.455156] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 668.460521] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 668.465714] ? mark_held_locks+0xf0/0xf0 [ 668.469767] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 668.474607] ? ext4_es_lookup_extent+0x375/0xb60 [ 668.479346] ? ext4_map_blocks+0x59f/0x1a50 [ 668.483677] ext4_map_blocks+0x7a2/0x1a50 [ 668.487835] ? check_preemption_disabled+0x41/0x280 [ 668.492842] ? ext4_issue_zeroout+0x160/0x160 [ 668.497328] ? __brelse+0x84/0xa0 [ 668.500763] ? __ext4_new_inode+0x2eb/0x5a20 [ 668.505175] ext4_getblk+0xad/0x4f0 [ 668.508792] ? ext4_iomap_begin+0xe00/0xe00 [ 668.513183] ? ext4_free_inode+0x1780/0x1780 [ 668.517570] ? debug_check_no_obj_freed+0x201/0x490 [ 668.522579] ? __dquot_initialize+0x298/0xb70 [ 668.527070] ext4_bread+0x7c/0x210 [ 668.530597] ? ext4_getblk+0x4f0/0x4f0 [ 668.534480] ? dquot_initialize_needed+0x290/0x290 [ 668.539401] ? trace_hardirqs_off+0x64/0x200 [ 668.543814] ext4_append+0x155/0x370 [ 668.547523] ext4_mkdir+0x5bd/0xe10 [ 668.551146] ? ext4_init_dot_dotdot+0x600/0x600 [ 668.555808] ? generic_permission+0x116/0x4d0 [ 668.560285] ? inode_permission.part.0+0x10c/0x450 [ 668.565216] vfs_mkdir+0x508/0x7a0 [ 668.569180] do_mkdirat+0x262/0x2d0 [ 668.572791] ? __ia32_sys_mknod+0x120/0x120 [ 668.577095] ? trace_hardirqs_off_caller+0x6e/0x210 [ 668.582104] ? do_syscall_64+0x21/0x620 [ 668.586081] do_syscall_64+0xf9/0x620 [ 668.589872] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 668.595043] RIP: 0033:0x7f85e0292217 [ 668.598736] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 668.617621] RSP: 002b:00007f85dec07f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 668.625317] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e0292217 [ 668.632577] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 668.639827] RBP: 00007f85dec081d0 R08: 0000000000000000 R09: 00007f85dec081d0 [ 668.647082] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 668.654349] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 10:32:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000fffffff50000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:21 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xe9, 0x0, 0x0) [ 668.716498] (syz-executor.0,22277,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 668.716498] " or missing value [ 668.730961] (syz-executor.0,22277,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500a10000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 34) 10:32:21 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xea, 0x0, 0x0) 10:32:21 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x2000000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500ba0000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:21 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xeb, 0x0, 0x0) [ 668.973217] (syz-executor.1,22311,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 668.973217] " or missing value [ 668.999720] (syz-executor.1,22311,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 669.015991] FAULT_INJECTION: forcing a failure. [ 669.015991] name failslab, interval 1, probability 0, space 0, times 0 [ 669.027422] CPU: 0 PID: 22330 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 669.035305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 669.044654] Call Trace: [ 669.047247] dump_stack+0x1fc/0x2ef [ 669.050888] should_fail.cold+0xa/0xf [ 669.054698] ? setup_fault_attr+0x200/0x200 [ 669.059031] ? lock_downgrade+0x720/0x720 [ 669.063187] __should_failslab+0x115/0x180 [ 669.067803] should_failslab+0x5/0x10 10:32:22 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xec, 0x0, 0x0) [ 669.067817] __kmalloc+0x2ab/0x3c0 [ 669.067830] ? ext4_find_extent+0x9bb/0xc70 [ 669.067846] ext4_find_extent+0x9bb/0xc70 [ 669.067867] ext4_ext_map_blocks+0x1c0/0x7390 [ 669.067897] ? __lock_acquire+0x6de/0x3ff0 [ 669.067920] ? mark_held_locks+0xf0/0xf0 [ 669.096409] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 669.096422] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 669.096439] ? mark_held_locks+0xf0/0xf0 [ 669.111030] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 669.115895] ? ext4_es_lookup_extent+0x375/0xb60 [ 669.120651] ? ext4_map_blocks+0x59f/0x1a50 [ 669.124961] ? lock_acquire+0x170/0x3c0 [ 669.128931] ? ext4_map_blocks+0x740/0x1a50 [ 669.133262] ext4_map_blocks+0x7a2/0x1a50 [ 669.137416] ? check_preemption_disabled+0x41/0x280 [ 669.142418] ? ext4_issue_zeroout+0x160/0x160 [ 669.146901] ? __brelse+0x84/0xa0 [ 669.150361] ? __ext4_new_inode+0x2eb/0x5a20 [ 669.154791] ext4_getblk+0xad/0x4f0 [ 669.158435] ? ext4_iomap_begin+0xe00/0xe00 [ 669.162754] ? ext4_free_inode+0x1780/0x1780 [ 669.167145] ? debug_check_no_obj_freed+0x201/0x490 [ 669.172159] ? __dquot_initialize+0x298/0xb70 [ 669.176676] ext4_bread+0x7c/0x210 [ 669.180207] ? ext4_getblk+0x4f0/0x4f0 [ 669.184087] ? dquot_initialize_needed+0x290/0x290 [ 669.189003] ? trace_hardirqs_off+0x64/0x200 [ 669.193417] ext4_append+0x155/0x370 [ 669.197186] ext4_mkdir+0x5bd/0xe10 [ 669.200809] ? ext4_init_dot_dotdot+0x600/0x600 [ 669.205462] ? generic_permission+0x116/0x4d0 [ 669.209964] ? inode_permission.part.0+0x10c/0x450 [ 669.214893] vfs_mkdir+0x508/0x7a0 [ 669.218430] do_mkdirat+0x262/0x2d0 [ 669.222043] ? __ia32_sys_mknod+0x120/0x120 [ 669.226352] ? trace_hardirqs_off_caller+0x6e/0x210 [ 669.231364] ? do_syscall_64+0x21/0x620 [ 669.235349] do_syscall_64+0xf9/0x620 [ 669.239334] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 669.244515] RIP: 0033:0x7f85e0292217 [ 669.248216] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 669.267100] RSP: 002b:00007f85dec07f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 669.274801] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e0292217 [ 669.282063] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 669.289313] RBP: 00007f85dec081d0 R08: 0000000000000000 R09: 00007f85dec081d0 [ 669.296564] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 669.303817] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 10:32:22 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#\x8d\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000fffffff60000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:22 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xed, 0x0, 0x0) [ 669.337732] (syz-executor.0,22332,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 669.337732] " or missing value [ 669.370239] (syz-executor.0,22332,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 35) 10:32:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500f40000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:22 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x3000000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:22 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xee, 0x0, 0x0) [ 669.542149] FAULT_INJECTION: forcing a failure. [ 669.542149] name failslab, interval 1, probability 0, space 0, times 0 [ 669.566933] CPU: 0 PID: 22362 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 669.574845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 669.584202] Call Trace: [ 669.586797] dump_stack+0x1fc/0x2ef [ 669.590438] should_fail.cold+0xa/0xf [ 669.594247] ? setup_fault_attr+0x200/0x200 [ 669.598573] ? lock_acquire+0x170/0x3c0 [ 669.602559] __should_failslab+0x115/0x180 [ 669.606801] should_failslab+0x5/0x10 [ 669.610607] __kmalloc_track_caller+0x2a6/0x3c0 [ 669.614499] (syz-executor.0,22363,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 669.614499] " or missing value [ 669.615275] ? strndup_user+0x70/0x120 [ 669.615290] ? _copy_from_user+0xd2/0x130 [ 669.615308] memdup_user+0x22/0xb0 [ 669.615335] strndup_user+0x70/0x120 [ 669.643230] ksys_mount+0x6f/0x130 [ 669.646780] __x64_sys_mount+0xba/0x150 [ 669.650767] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 669.655356] do_syscall_64+0xf9/0x620 [ 669.659177] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 669.664379] RIP: 0033:0x7f85e029463a [ 669.668100] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 669.668331] (syz-executor.0,22363,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 669.686998] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 669.687013] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 669.687020] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 669.687029] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 669.687037] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 669.687045] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 10:32:22 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xef, 0x0, 0x0) 10:32:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85005a0100000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 36) [ 669.755177] (syz-executor.1,22360,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 669.755177] " or missing value [ 669.789045] (syz-executor.1,22360,0):ocfs2_fill_super:1225 ERROR: status = -22 10:32:22 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xf0, 0x0, 0x0) 10:32:22 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x4000000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:22 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2R\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000fffffdfc0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:23 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xf1, 0x0, 0x0) 10:32:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500800100000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 670.140301] FAULT_INJECTION: forcing a failure. [ 670.140301] name failslab, interval 1, probability 0, space 0, times 0 [ 670.170215] (syz-executor.0,22399,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 670.170215] " or missing value [ 670.173256] CPU: 0 PID: 22402 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 10:32:23 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xf2, 0x0, 0x0) [ 670.190712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 670.200066] Call Trace: [ 670.200184] (syz-executor.0,22399,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 670.202660] dump_stack+0x1fc/0x2ef [ 670.202679] should_fail.cold+0xa/0xf [ 670.202696] ? setup_fault_attr+0x200/0x200 [ 670.202712] ? lock_acquire+0x170/0x3c0 [ 670.202732] __should_failslab+0x115/0x180 [ 670.202751] should_failslab+0x5/0x10 [ 670.202767] __kmalloc_track_caller+0x2a6/0x3c0 [ 670.202782] ? strndup_user+0x70/0x120 [ 670.202795] ? _copy_from_user+0xd2/0x130 [ 670.202812] memdup_user+0x22/0xb0 [ 670.202829] strndup_user+0x70/0x120 [ 670.202845] ksys_mount+0x6f/0x130 [ 670.202862] __x64_sys_mount+0xba/0x150 [ 670.202878] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 670.202891] do_syscall_64+0xf9/0x620 [ 670.202909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.274658] RIP: 0033:0x7f85e029463a [ 670.278355] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 670.297245] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 670.304949] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 670.312210] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 670.319468] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 670.326791] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 670.334043] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 10:32:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 37) 10:32:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000fffffdfd0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 670.350071] (syz-executor.1,22404,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 670.350071] " or missing value [ 670.364017] (syz-executor.1,22404,0):ocfs2_fill_super:1225 ERROR: status = -22 10:32:23 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xf3, 0x0, 0x0) 10:32:23 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xf4, 0x0, 0x0) 10:32:23 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x8d\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 670.555391] FAULT_INJECTION: forcing a failure. [ 670.555391] name failslab, interval 1, probability 0, space 0, times 0 [ 670.573860] CPU: 1 PID: 22429 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 670.581763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 670.591107] Call Trace: [ 670.593696] dump_stack+0x1fc/0x2ef [ 670.597322] should_fail.cold+0xa/0xf [ 670.601117] ? setup_fault_attr+0x200/0x200 [ 670.605434] ? lock_acquire+0x170/0x3c0 [ 670.609402] __should_failslab+0x115/0x180 [ 670.613634] should_failslab+0x5/0x10 [ 670.617421] kmem_cache_alloc+0x277/0x370 [ 670.621560] getname_flags+0xce/0x590 [ 670.625348] user_path_at_empty+0x2a/0x50 [ 670.629486] do_mount+0x147/0x2f50 [ 670.633014] ? cmp_ex_sort+0xc0/0xc0 [ 670.636741] ? __do_page_fault+0x180/0xd60 [ 670.640969] ? copy_mount_string+0x40/0x40 [ 670.645195] ? memset+0x20/0x40 [ 670.648470] ? copy_mount_options+0x26f/0x380 [ 670.652964] ksys_mount+0xcf/0x130 [ 670.656496] __x64_sys_mount+0xba/0x150 [ 670.660457] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 670.665026] do_syscall_64+0xf9/0x620 [ 670.668820] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.674033] RIP: 0033:0x7f85e029463a [ 670.677735] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 670.696617] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 670.704311] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 670.711564] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 670.718819] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 670.726072] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 670.733327] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 10:32:23 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x5000000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:23 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xf5, 0x0, 0x0) 10:32:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000fffffffd0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500a00100000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 38) 10:32:23 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xf6, 0x0, 0x0) [ 670.908180] (syz-executor.1,22441,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 670.908180] " or missing value [ 670.924160] (syz-executor.1,22441,0):ocfs2_fill_super:1225 ERROR: status = -22 10:32:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000fff0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:23 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xf7, 0x0, 0x0) 10:32:23 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd\n\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 670.995144] (syz-executor.0,22455,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 670.995144] " or missing value [ 671.027357] (syz-executor.0,22455,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 671.037534] FAULT_INJECTION: forcing a failure. [ 671.037534] name failslab, interval 1, probability 0, space 0, times 0 [ 671.063428] CPU: 0 PID: 22472 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 671.071343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 671.080696] Call Trace: [ 671.083319] dump_stack+0x1fc/0x2ef [ 671.086966] should_fail.cold+0xa/0xf [ 671.090778] ? setup_fault_attr+0x200/0x200 [ 671.095109] ? lock_acquire+0x170/0x3c0 [ 671.099100] __should_failslab+0x115/0x180 [ 671.103344] should_failslab+0x5/0x10 [ 671.107162] kmem_cache_alloc+0x277/0x370 [ 671.107181] getname_flags+0xce/0x590 [ 671.115115] user_path_at_empty+0x2a/0x50 [ 671.115139] do_mount+0x147/0x2f50 [ 671.122833] ? cmp_ex_sort+0xc0/0xc0 [ 671.126553] ? __do_page_fault+0x180/0xd60 [ 671.130786] ? copy_mount_string+0x40/0x40 [ 671.135010] ? memset+0x20/0x40 [ 671.138273] ? copy_mount_options+0x26f/0x380 [ 671.142771] ksys_mount+0xcf/0x130 [ 671.146308] __x64_sys_mount+0xba/0x150 [ 671.150270] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 671.154838] do_syscall_64+0xf9/0x620 [ 671.158632] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 671.163812] RIP: 0033:0x7f85e029463a [ 671.167510] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 671.186392] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 10:32:24 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xf8, 0x0, 0x0) [ 671.194087] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 671.201344] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 671.208625] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 671.215906] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 671.223165] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 10:32:24 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x6000000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000001fffff0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500d60100000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:24 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xf9, 0x0, 0x0) 10:32:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 39) [ 671.353706] (syz-executor.1,22484,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 671.353706] " or missing value 10:32:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000fcfdffff0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:24 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xfa, 0x0, 0x0) [ 671.415252] (syz-executor.1,22484,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:24 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xfb, 0x0, 0x0) 10:32:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85002b0200000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:24 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x7000000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 671.593821] (syz-executor.0,22497,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 671.593821] " or missing value [ 671.611989] (syz-executor.0,22497,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 671.612953] FAULT_INJECTION: forcing a failure. [ 671.612953] name failslab, interval 1, probability 0, space 0, times 0 10:32:24 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd#\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000fdfdffff0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 671.712333] CPU: 0 PID: 22523 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 671.720243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 671.729597] Call Trace: [ 671.732198] dump_stack+0x1fc/0x2ef [ 671.735856] should_fail.cold+0xa/0xf [ 671.735875] ? setup_fault_attr+0x200/0x200 [ 671.744002] ? lock_acquire+0x170/0x3c0 [ 671.744024] __should_failslab+0x115/0x180 [ 671.744042] should_failslab+0x5/0x10 [ 671.744056] __kmalloc_track_caller+0x2a6/0x3c0 [ 671.744071] ? kstrdup_const+0x53/0x80 [ 671.744089] kstrdup+0x36/0x70 [ 671.744106] kstrdup_const+0x53/0x80 [ 671.744128] alloc_vfsmnt+0xb5/0x780 [ 671.744143] ? _raw_read_unlock+0x29/0x40 [ 671.744160] vfs_kern_mount.part.0+0x27/0x470 [ 671.744179] do_mount+0x115c/0x2f50 [ 671.744197] ? cmp_ex_sort+0xc0/0xc0 [ 671.744215] ? __do_page_fault+0x180/0xd60 [ 671.744232] ? copy_mount_string+0x40/0x40 10:32:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 40) [ 671.744255] ? memset+0x20/0x40 [ 671.744271] ? copy_mount_options+0x26f/0x380 [ 671.744290] ksys_mount+0xcf/0x130 [ 671.744305] __x64_sys_mount+0xba/0x150 [ 671.744321] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 671.744336] do_syscall_64+0xf9/0x620 10:32:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500350200000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 671.744353] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 671.744364] RIP: 0033:0x7f85e029463a [ 671.744378] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 671.744384] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 671.744397] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 671.744405] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 671.744414] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 671.744422] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 10:32:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000008cffffff0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 671.744430] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 [ 672.008381] (syz-executor.1,22542,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 672.008381] " or missing value [ 672.008440] (syz-executor.1,22542,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 672.048463] (syz-executor.0,22541,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 672.048463] " or missing value [ 672.048523] (syz-executor.0,22541,0):ocfs2_fill_super:1225 ERROR: status = -22 10:32:25 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xfc, 0x0, 0x0) [ 672.150756] FAULT_INJECTION: forcing a failure. [ 672.150756] name failslab, interval 1, probability 0, space 0, times 0 [ 672.178961] CPU: 1 PID: 22562 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 672.186866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 672.196210] Call Trace: [ 672.198794] dump_stack+0x1fc/0x2ef [ 672.202413] should_fail.cold+0xa/0xf [ 672.206206] ? setup_fault_attr+0x200/0x200 [ 672.210514] ? lock_acquire+0x170/0x3c0 [ 672.214482] __should_failslab+0x115/0x180 [ 672.218705] should_failslab+0x5/0x10 [ 672.222494] kmem_cache_alloc+0x277/0x370 [ 672.226633] alloc_vfsmnt+0x23/0x780 [ 672.230337] ? _raw_read_unlock+0x29/0x40 [ 672.234473] vfs_kern_mount.part.0+0x27/0x470 [ 672.238962] do_mount+0x115c/0x2f50 [ 672.242591] ? cmp_ex_sort+0xc0/0xc0 [ 672.246298] ? __do_page_fault+0x180/0xd60 [ 672.250531] ? copy_mount_string+0x40/0x40 [ 672.254772] ? memset+0x20/0x40 [ 672.258045] ? copy_mount_options+0x26f/0x380 [ 672.262537] ksys_mount+0xcf/0x130 [ 672.266074] __x64_sys_mount+0xba/0x150 [ 672.270040] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 672.274609] do_syscall_64+0xf9/0x620 [ 672.278403] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.283578] RIP: 0033:0x7f85e029463a [ 672.287281] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 672.306166] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 672.313860] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 672.321113] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 672.328365] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 672.335621] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 672.342895] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 10:32:25 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd%\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:25 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x8000000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:25 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xfd, 0x0, 0x0) 10:32:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85004a0200000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:25 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xfe, 0x0, 0x0) 10:32:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000097ffffff0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:25 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x102, 0x0, 0x0) 10:32:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 41) 10:32:25 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x103, 0x0, 0x0) 10:32:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000f5ffffff0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500560200000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 672.592530] (syz-executor.1,22585,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 672.592530] " or missing value 10:32:25 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x104, 0x0, 0x0) [ 672.652734] (syz-executor.0,22595,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 672.652734] " or missing value [ 672.689268] (syz-executor.1,22585,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 672.712223] (syz-executor.0,22595,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 672.767777] FAULT_INJECTION: forcing a failure. [ 672.767777] name failslab, interval 1, probability 0, space 0, times 0 [ 672.779171] CPU: 0 PID: 22618 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 672.787040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 672.796384] Call Trace: [ 672.798972] dump_stack+0x1fc/0x2ef [ 672.802610] should_fail.cold+0xa/0xf [ 672.806535] ? setup_fault_attr+0x200/0x200 [ 672.810866] ? lock_acquire+0x170/0x3c0 [ 672.814852] __should_failslab+0x115/0x180 [ 672.819092] should_failslab+0x5/0x10 [ 672.822894] __kmalloc_track_caller+0x2a6/0x3c0 [ 672.827561] ? btrfs_mount+0xb5/0xaa0 [ 672.831365] kstrdup+0x36/0x70 [ 672.834559] btrfs_mount+0xb5/0xaa0 [ 672.838187] ? btrfs_show_options+0xfd0/0xfd0 [ 672.842688] ? __mutex_unlock_slowpath+0xea/0x610 [ 672.847534] ? check_preemption_disabled+0x41/0x280 [ 672.852558] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 672.857571] ? pcpu_alloc+0xc9/0x1190 [ 672.861373] ? __lockdep_init_map+0x100/0x5a0 [ 672.865877] mount_fs+0xa3/0x310 [ 672.869233] vfs_kern_mount.part.0+0x68/0x470 [ 672.873716] do_mount+0x115c/0x2f50 [ 672.877328] ? cmp_ex_sort+0xc0/0xc0 [ 672.881039] ? __do_page_fault+0x180/0xd60 [ 672.885280] ? copy_mount_string+0x40/0x40 [ 672.889514] ? memset+0x20/0x40 [ 672.892789] ? copy_mount_options+0x26f/0x380 [ 672.897280] ksys_mount+0xcf/0x130 [ 672.900823] __x64_sys_mount+0xba/0x150 [ 672.904892] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 672.909469] do_syscall_64+0xf9/0x620 [ 672.913279] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.918461] RIP: 0033:0x7f85e029463a [ 672.922172] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 672.941076] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 672.948786] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 672.956043] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 672.963308] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 672.970576] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 672.977831] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 10:32:26 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd+\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:26 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0xa000000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:26 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x105, 0x0, 0x0) 10:32:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000f6ffffff0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500580200000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 42) 10:32:26 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x106, 0x0, 0x0) 10:32:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000fdffffff0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 673.216348] FAULT_INJECTION: forcing a failure. [ 673.216348] name failslab, interval 1, probability 0, space 0, times 0 10:32:26 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x107, 0x0, 0x0) [ 673.261482] (syz-executor.1,22644,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 673.261482] " or missing value [ 673.275129] (syz-executor.1,22644,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:26 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x108, 0x0, 0x0) [ 673.319921] CPU: 0 PID: 22645 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 673.327833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 673.337180] Call Trace: [ 673.339759] dump_stack+0x1fc/0x2ef [ 673.343373] should_fail.cold+0xa/0xf [ 673.347161] ? setup_fault_attr+0x200/0x200 [ 673.351468] ? lock_acquire+0x170/0x3c0 [ 673.355434] __should_failslab+0x115/0x180 [ 673.359651] should_failslab+0x5/0x10 [ 673.363464] __kmalloc_track_caller+0x2a6/0x3c0 [ 673.368129] ? btrfs_mount+0xb5/0xaa0 [ 673.371920] kstrdup+0x36/0x70 [ 673.375101] btrfs_mount+0xb5/0xaa0 [ 673.378712] ? btrfs_show_options+0xfd0/0xfd0 [ 673.383191] ? __mutex_unlock_slowpath+0xea/0x610 [ 673.388020] ? check_preemption_disabled+0x41/0x280 [ 673.393028] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 673.398026] ? pcpu_alloc+0xc9/0x1190 [ 673.401813] ? __lockdep_init_map+0x100/0x5a0 [ 673.406295] mount_fs+0xa3/0x310 [ 673.409647] vfs_kern_mount.part.0+0x68/0x470 [ 673.414127] do_mount+0x115c/0x2f50 [ 673.417747] ? cmp_ex_sort+0xc0/0xc0 [ 673.421468] ? __do_page_fault+0x180/0xd60 [ 673.425794] ? copy_mount_string+0x40/0x40 [ 673.430039] ? memset+0x20/0x40 [ 673.433320] ? copy_mount_options+0x26f/0x380 [ 673.437820] ksys_mount+0xcf/0x130 [ 673.441375] __x64_sys_mount+0xba/0x150 [ 673.445362] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 673.449934] do_syscall_64+0xf9/0x620 [ 673.453721] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 673.458901] RIP: 0033:0x7f85e029463a [ 673.462611] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 673.481505] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 673.489218] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 673.496494] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 673.503749] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 673.511000] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 10:32:26 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x20000000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 673.518250] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 10:32:26 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd-\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:26 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x109, 0x0, 0x0) 10:32:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 43) 10:32:26 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x10a, 0x0, 0x0) 10:32:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000c0ed000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500900200000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:26 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x10b, 0x0, 0x0) [ 673.778030] (syz-executor.0,22680,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 673.778030] " or missing value [ 673.811070] (syz-executor.1,22679,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 673.811070] " or missing value [ 673.816714] FAULT_INJECTION: forcing a failure. [ 673.816714] name failslab, interval 1, probability 0, space 0, times 0 [ 673.837119] (syz-executor.0,22680,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 673.858567] CPU: 1 PID: 22694 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 673.859005] (syz-executor.1,22679,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 673.866469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 673.866475] Call Trace: [ 673.866497] dump_stack+0x1fc/0x2ef [ 673.866514] should_fail.cold+0xa/0xf [ 673.866531] ? setup_fault_attr+0x200/0x200 [ 673.866545] ? lock_acquire+0x170/0x3c0 [ 673.866565] __should_failslab+0x115/0x180 [ 673.866584] should_failslab+0x5/0x10 [ 673.866598] kmem_cache_alloc+0x277/0x370 [ 673.866613] alloc_vfsmnt+0x23/0x780 [ 673.866631] vfs_kern_mount.part.0+0x27/0x470 [ 673.866644] ? kfree+0x110/0x210 [ 673.866663] vfs_kern_mount+0x3c/0x60 [ 673.866681] btrfs_mount+0x23a/0xaa0 [ 673.866700] ? btrfs_show_options+0xfd0/0xfd0 [ 673.866713] ? __mutex_unlock_slowpath+0xea/0x610 [ 673.866733] ? check_preemption_disabled+0x41/0x280 [ 673.866754] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 673.866768] ? pcpu_alloc+0xc9/0x1190 [ 673.866785] ? __lockdep_init_map+0x100/0x5a0 [ 673.866803] mount_fs+0xa3/0x310 [ 673.866822] vfs_kern_mount.part.0+0x68/0x470 [ 673.866841] do_mount+0x115c/0x2f50 [ 673.866857] ? cmp_ex_sort+0xc0/0xc0 [ 673.866875] ? __do_page_fault+0x180/0xd60 [ 673.866891] ? copy_mount_string+0x40/0x40 [ 673.866914] ? memset+0x20/0x40 [ 673.866929] ? copy_mount_options+0x26f/0x380 [ 673.866953] ksys_mount+0xcf/0x130 [ 673.866970] __x64_sys_mount+0xba/0x150 [ 673.866983] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 673.866999] do_syscall_64+0xf9/0x620 [ 674.007861] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 674.007877] RIP: 0033:0x7f85e029463a [ 674.016771] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 674.035679] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 674.043400] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 674.050677] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 674.057952] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 674.065223] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 10:32:27 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x10c, 0x0, 0x0) 10:32:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 44) [ 674.072495] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 10:32:27 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x10d, 0x0, 0x0) 10:32:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000010000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:27 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x3f000000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:27 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd/\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500920200000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:27 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x10e, 0x0, 0x0) 10:32:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000020000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 674.316061] FAULT_INJECTION: forcing a failure. [ 674.316061] name failslab, interval 1, probability 0, space 0, times 0 [ 674.365245] CPU: 0 PID: 22729 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 674.373154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 674.382512] Call Trace: [ 674.385107] dump_stack+0x1fc/0x2ef [ 674.388742] should_fail.cold+0xa/0xf [ 674.392553] ? setup_fault_attr+0x200/0x200 [ 674.396881] ? lock_acquire+0x170/0x3c0 [ 674.400865] __should_failslab+0x115/0x180 [ 674.405108] should_failslab+0x5/0x10 [ 674.408916] __kmalloc_track_caller+0x2a6/0x3c0 [ 674.413592] ? kstrdup_const+0x53/0x80 [ 674.417492] kstrdup+0x36/0x70 [ 674.420701] kstrdup_const+0x53/0x80 [ 674.424420] alloc_vfsmnt+0xb5/0x780 [ 674.428144] vfs_kern_mount.part.0+0x27/0x470 [ 674.432471] (syz-executor.1,22732,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 674.432471] " or missing value [ 674.432642] ? kfree+0x110/0x210 [ 674.432663] vfs_kern_mount+0x3c/0x60 [ 674.452383] btrfs_mount+0x23a/0xaa0 [ 674.456113] ? btrfs_show_options+0xfd0/0xfd0 [ 674.460613] ? __mutex_unlock_slowpath+0xea/0x610 [ 674.465470] ? check_preemption_disabled+0x41/0x280 [ 674.470517] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 674.470532] ? pcpu_alloc+0xc9/0x1190 [ 674.470549] ? __lockdep_init_map+0x100/0x5a0 [ 674.470567] mount_fs+0xa3/0x310 [ 674.470587] vfs_kern_mount.part.0+0x68/0x470 [ 674.470606] do_mount+0x115c/0x2f50 [ 674.470624] ? cmp_ex_sort+0xc0/0xc0 [ 674.470641] ? __do_page_fault+0x180/0xd60 [ 674.470659] ? copy_mount_string+0x40/0x40 [ 674.470680] ? memset+0x20/0x40 [ 674.484800] (syz-executor.1,22732,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 674.487309] ? copy_mount_options+0x26f/0x380 [ 674.487335] ksys_mount+0xcf/0x130 [ 674.487353] __x64_sys_mount+0xba/0x150 [ 674.487376] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 674.534776] do_syscall_64+0xf9/0x620 [ 674.534795] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 674.543791] RIP: 0033:0x7f85e029463a [ 674.547515] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 10:32:27 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x10f, 0x0, 0x0) 10:32:27 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd\x8d\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:27 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x48000000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 674.566417] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 674.574132] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 674.581406] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 674.588680] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 674.595952] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 674.603215] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 10:32:27 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x110, 0x0, 0x0) 10:32:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 45) 10:32:27 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x111, 0x0, 0x0) 10:32:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500c50200000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000040000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 674.797356] (syz-executor.1,22758,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 674.797356] " or missing value 10:32:27 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x4c000000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:27 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x112, 0x0, 0x0) [ 674.872903] (syz-executor.1,22758,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 674.909838] FAULT_INJECTION: forcing a failure. [ 674.909838] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 674.922080] CPU: 0 PID: 22777 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 674.929966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 674.939312] Call Trace: [ 674.941923] dump_stack+0x1fc/0x2ef [ 674.945566] should_fail.cold+0xa/0xf [ 674.949378] ? lock_acquire+0x170/0x3c0 [ 674.953367] ? setup_fault_attr+0x200/0x200 [ 674.957711] __alloc_pages_nodemask+0x239/0x2890 [ 674.962499] ? __lock_acquire+0x6de/0x3ff0 [ 674.962528] ? kernel_text_address+0xbd/0xf0 10:32:27 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\x90\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 46) [ 674.962547] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 674.962560] ? __save_stack_trace+0xaf/0x190 [ 674.962584] ? __lock_acquire+0x6de/0x3ff0 [ 674.962614] alloc_pages_current+0x193/0x2a0 [ 674.962631] get_zeroed_page+0x10/0x40 [ 674.962649] parse_security_options.constprop.0+0x1a/0xa0 10:32:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000100000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:28 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x60000000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 674.962666] btrfs_mount_root+0x110/0x1830 [ 674.962690] ? btrfs_decode_error+0x70/0x70 [ 674.962706] ? __mutex_unlock_slowpath+0xea/0x610 [ 674.962727] ? check_preemption_disabled+0x41/0x280 [ 674.962749] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 674.962763] ? pcpu_alloc+0xc9/0x1190 10:32:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500e20200000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 674.962779] ? __lockdep_init_map+0x100/0x5a0 10:32:28 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1\n+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 674.962797] mount_fs+0xa3/0x310 [ 674.962817] vfs_kern_mount.part.0+0x68/0x470 [ 674.962832] ? kfree+0x110/0x210 [ 674.962849] vfs_kern_mount+0x3c/0x60 10:32:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 47) [ 674.962866] btrfs_mount+0x23a/0xaa0 [ 674.962884] ? btrfs_show_options+0xfd0/0xfd0 [ 674.962897] ? __mutex_unlock_slowpath+0xea/0x610 10:32:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000100000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 674.962916] ? check_preemption_disabled+0x41/0x280 [ 674.962937] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 674.962951] ? pcpu_alloc+0xc9/0x1190 [ 674.962967] ? __lockdep_init_map+0x100/0x5a0 [ 674.962984] mount_fs+0xa3/0x310 [ 674.963003] vfs_kern_mount.part.0+0x68/0x470 [ 674.963022] do_mount+0x115c/0x2f50 [ 674.963040] ? cmp_ex_sort+0xc0/0xc0 [ 674.963059] ? __do_page_fault+0x180/0xd60 [ 674.963075] ? copy_mount_string+0x40/0x40 [ 674.963097] ? memset+0x20/0x40 [ 674.963113] ? copy_mount_options+0x26f/0x380 [ 674.963131] ksys_mount+0xcf/0x130 [ 674.963149] __x64_sys_mount+0xba/0x150 [ 674.963165] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 674.963179] do_syscall_64+0xf9/0x620 [ 674.963198] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 674.963210] RIP: 0033:0x7f85e029463a [ 674.963224] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 674.963231] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 674.963263] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a 10:32:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000300000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 674.963276] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 674.963285] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 674.963293] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 674.963302] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 [ 675.055337] (syz-executor.0,22783,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 675.055337] " or missing value [ 675.055410] (syz-executor.0,22783,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 675.186360] (syz-executor.1,22800,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 675.186360] " or missing value [ 675.186597] (syz-executor.1,22800,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 675.242887] FAULT_INJECTION: forcing a failure. [ 675.242887] name failslab, interval 1, probability 0, space 0, times 0 10:32:28 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1%+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:28 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x68000000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 675.242907] CPU: 0 PID: 22811 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 675.242915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 675.242919] Call Trace: [ 675.242939] dump_stack+0x1fc/0x2ef [ 675.242960] should_fail.cold+0xa/0xf [ 675.242979] ? setup_fault_attr+0x200/0x200 [ 675.242995] ? lock_acquire+0x170/0x3c0 [ 675.243016] __should_failslab+0x115/0x180 [ 675.243033] should_failslab+0x5/0x10 [ 675.243046] __kmalloc_track_caller+0x2a6/0x3c0 [ 675.243061] ? kstrdup_const+0x53/0x80 [ 675.243079] kstrdup+0x36/0x70 [ 675.243095] kstrdup_const+0x53/0x80 [ 675.243109] alloc_vfsmnt+0xb5/0x780 [ 675.243127] vfs_kern_mount.part.0+0x27/0x470 [ 675.243138] ? kfree+0x110/0x210 [ 675.243155] vfs_kern_mount+0x3c/0x60 [ 675.243173] btrfs_mount+0x23a/0xaa0 [ 675.243191] ? btrfs_show_options+0xfd0/0xfd0 [ 675.243204] ? __mutex_unlock_slowpath+0xea/0x610 [ 675.243242] ? check_preemption_disabled+0x41/0x280 [ 675.243265] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 675.243279] ? pcpu_alloc+0xc9/0x1190 [ 675.243296] ? __lockdep_init_map+0x100/0x5a0 [ 675.243315] mount_fs+0xa3/0x310 [ 675.243334] vfs_kern_mount.part.0+0x68/0x470 [ 675.243353] do_mount+0x115c/0x2f50 [ 675.243372] ? cmp_ex_sort+0xc0/0xc0 [ 675.243391] ? __do_page_fault+0x180/0xd60 [ 675.243407] ? copy_mount_string+0x40/0x40 [ 675.243429] ? memset+0x20/0x40 [ 675.243444] ? copy_mount_options+0x26f/0x380 [ 675.243463] ksys_mount+0xcf/0x130 [ 675.243480] __x64_sys_mount+0xba/0x150 [ 675.243496] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 675.243510] do_syscall_64+0xf9/0x620 [ 675.243528] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 675.243539] RIP: 0033:0x7f85e029463a [ 675.243553] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 675.243560] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 675.243574] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 675.243582] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 675.243591] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 675.243598] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 675.243607] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 [ 675.371432] FAULT_INJECTION: forcing a failure. [ 675.371432] name failslab, interval 1, probability 0, space 0, times 0 [ 675.371450] CPU: 0 PID: 22833 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 675.371459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 675.371464] Call Trace: [ 675.371484] dump_stack+0x1fc/0x2ef [ 675.371503] should_fail.cold+0xa/0xf [ 675.371522] ? setup_fault_attr+0x200/0x200 [ 675.371541] ? lock_acquire+0x170/0x3c0 [ 675.371562] __should_failslab+0x115/0x180 [ 675.371579] should_failslab+0x5/0x10 [ 675.371593] kmem_cache_alloc_trace+0x284/0x380 [ 675.371612] btrfs_mount_root+0x1e1/0x1830 [ 675.371635] ? btrfs_decode_error+0x70/0x70 [ 675.371651] ? __mutex_unlock_slowpath+0xea/0x610 [ 675.371670] ? check_preemption_disabled+0x41/0x280 [ 675.371692] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 675.371705] ? pcpu_alloc+0xc9/0x1190 [ 675.371727] ? __lockdep_init_map+0x100/0x5a0 [ 675.371744] mount_fs+0xa3/0x310 [ 675.371763] vfs_kern_mount.part.0+0x68/0x470 [ 675.371776] ? kfree+0x110/0x210 [ 675.371793] vfs_kern_mount+0x3c/0x60 [ 675.371811] btrfs_mount+0x23a/0xaa0 [ 675.371829] ? btrfs_show_options+0xfd0/0xfd0 [ 675.371842] ? __mutex_unlock_slowpath+0xea/0x610 [ 675.371861] ? check_preemption_disabled+0x41/0x280 [ 675.371882] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 675.371895] ? pcpu_alloc+0xc9/0x1190 [ 675.371912] ? __lockdep_init_map+0x100/0x5a0 [ 675.371929] mount_fs+0xa3/0x310 [ 675.371948] vfs_kern_mount.part.0+0x68/0x470 [ 675.371966] do_mount+0x115c/0x2f50 [ 675.371982] ? cmp_ex_sort+0xc0/0xc0 [ 675.372000] ? __do_page_fault+0x180/0xd60 [ 675.372015] ? copy_mount_string+0x40/0x40 [ 675.372037] ? memset+0x20/0x40 [ 675.372052] ? copy_mount_options+0x26f/0x380 [ 675.372070] ksys_mount+0xcf/0x130 [ 675.372087] __x64_sys_mount+0xba/0x150 [ 675.372103] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 675.372116] do_syscall_64+0xf9/0x620 [ 675.372135] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 675.372146] RIP: 0033:0x7f85e029463a [ 675.372159] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 675.372167] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 675.372180] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 675.372188] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 675.372196] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 675.372204] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 675.372213] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 [ 675.378383] (syz-executor.0,22814,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 675.378383] " or missing value [ 675.378408] (syz-executor.0,22814,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 675.474747] (syz-executor.1,22829,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 675.474747] " or missing value [ 675.474820] (syz-executor.1,22829,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 675.798239] (syz-executor.1,22857,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 675.798239] " or missing value 10:32:29 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x113, 0x0, 0x0) 10:32:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 48) 10:32:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500040300000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000200000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:29 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1n+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:29 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x6c000000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 675.798312] (syz-executor.1,22857,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 675.838451] (syz-executor.0,22858,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 675.838451] " or missing value [ 675.838498] (syz-executor.0,22858,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 676.918616] FAULT_INJECTION: forcing a failure. [ 676.918616] name failslab, interval 1, probability 0, space 0, times 0 [ 676.930850] CPU: 0 PID: 22882 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 676.938749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 676.948107] Call Trace: [ 676.950706] dump_stack+0x1fc/0x2ef [ 676.954350] should_fail.cold+0xa/0xf [ 676.958172] ? setup_fault_attr+0x200/0x200 [ 676.962509] ? lock_acquire+0x170/0x3c0 [ 676.966503] __should_failslab+0x115/0x180 [ 676.970756] should_failslab+0x5/0x10 [ 676.974580] kmem_cache_alloc_trace+0x284/0x380 [ 676.979264] btrfs_mount_root+0x188/0x1830 [ 676.983520] ? btrfs_decode_error+0x70/0x70 [ 676.987873] ? __mutex_unlock_slowpath+0xea/0x610 [ 676.987894] ? check_preemption_disabled+0x41/0x280 [ 676.987916] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 676.987931] ? pcpu_alloc+0xc9/0x1190 [ 676.987948] ? __lockdep_init_map+0x100/0x5a0 [ 676.987966] mount_fs+0xa3/0x310 [ 676.987986] vfs_kern_mount.part.0+0x68/0x470 [ 676.988000] ? kfree+0x110/0x210 [ 676.988017] vfs_kern_mount+0x3c/0x60 [ 676.988035] btrfs_mount+0x23a/0xaa0 [ 676.988052] ? btrfs_show_options+0xfd0/0xfd0 [ 676.988065] ? __mutex_unlock_slowpath+0xea/0x610 [ 676.988084] ? check_preemption_disabled+0x41/0x280 [ 676.988105] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 676.988119] ? pcpu_alloc+0xc9/0x1190 [ 676.988135] ? __lockdep_init_map+0x100/0x5a0 [ 676.988152] mount_fs+0xa3/0x310 [ 676.988171] vfs_kern_mount.part.0+0x68/0x470 [ 676.988189] do_mount+0x115c/0x2f50 [ 676.988207] ? cmp_ex_sort+0xc0/0xc0 [ 676.988224] ? __do_page_fault+0x180/0xd60 [ 676.988240] ? copy_mount_string+0x40/0x40 [ 676.988262] ? memset+0x20/0x40 [ 676.988277] ? copy_mount_options+0x26f/0x380 [ 676.988295] ksys_mount+0xcf/0x130 [ 676.988313] __x64_sys_mount+0xba/0x150 [ 676.988329] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 676.988343] do_syscall_64+0xf9/0x620 [ 676.988362] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 676.988375] RIP: 0033:0x7f85e029463a [ 676.988388] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 676.988400] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 677.140541] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 677.147812] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 677.155075] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 677.162342] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 10:32:30 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x114, 0x0, 0x0) [ 677.169606] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 [ 677.201474] (syz-executor.1,22886,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 677.201474] " or missing value 10:32:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000300000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 677.218863] (syz-executor.0,22880,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 677.218863] " or missing value [ 677.254713] (syz-executor.1,22886,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:30 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x115, 0x0, 0x0) [ 677.263474] (syz-executor.0,22880,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 49) 10:32:30 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x74000000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:30 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1\x8d+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000c0300000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:30 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x116, 0x0, 0x0) 10:32:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000400000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 677.537247] FAULT_INJECTION: forcing a failure. [ 677.537247] name failslab, interval 1, probability 0, space 0, times 0 [ 677.556548] CPU: 0 PID: 22917 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 677.564457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 677.573820] Call Trace: [ 677.576415] dump_stack+0x1fc/0x2ef [ 677.580060] should_fail.cold+0xa/0xf [ 677.583872] ? setup_fault_attr+0x200/0x200 [ 677.588205] ? lock_acquire+0x170/0x3c0 [ 677.592278] __should_failslab+0x115/0x180 [ 677.596539] should_failslab+0x5/0x10 [ 677.596568] __kmalloc_track_caller+0x2a6/0x3c0 10:32:30 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o\x8d\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 677.596584] ? btrfs_mount_root+0x364/0x1830 [ 677.596604] kstrdup+0x36/0x70 [ 677.596621] btrfs_mount_root+0x364/0x1830 [ 677.596644] ? btrfs_decode_error+0x70/0x70 [ 677.596661] ? __mutex_unlock_slowpath+0xea/0x610 [ 677.596682] ? check_preemption_disabled+0x41/0x280 [ 677.596704] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 677.596718] ? pcpu_alloc+0xc9/0x1190 10:32:30 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x7a000000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 50) [ 677.596735] ? __lockdep_init_map+0x100/0x5a0 [ 677.596753] mount_fs+0xa3/0x310 [ 677.596774] vfs_kern_mount.part.0+0x68/0x470 [ 677.596787] ? kfree+0x110/0x210 [ 677.596804] vfs_kern_mount+0x3c/0x60 [ 677.596821] btrfs_mount+0x23a/0xaa0 10:32:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000e0300000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000500000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 677.596840] ? btrfs_show_options+0xfd0/0xfd0 [ 677.596852] ? __mutex_unlock_slowpath+0xea/0x610 [ 677.596871] ? check_preemption_disabled+0x41/0x280 [ 677.596892] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 677.596906] ? pcpu_alloc+0xc9/0x1190 [ 677.596923] ? __lockdep_init_map+0x100/0x5a0 10:32:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 51) [ 677.596940] mount_fs+0xa3/0x310 [ 677.596959] vfs_kern_mount.part.0+0x68/0x470 [ 677.596977] do_mount+0x115c/0x2f50 [ 677.597000] ? cmp_ex_sort+0xc0/0xc0 [ 677.597018] ? __do_page_fault+0x180/0xd60 [ 677.597034] ? copy_mount_string+0x40/0x40 [ 677.597057] ? memset+0x20/0x40 10:32:30 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd\x8dEV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 677.597073] ? copy_mount_options+0x26f/0x380 [ 677.597092] ksys_mount+0xcf/0x130 [ 677.597109] __x64_sys_mount+0xba/0x150 [ 677.597124] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 677.597138] do_syscall_64+0xf9/0x620 [ 677.597157] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 677.597169] RIP: 0033:0x7f85e029463a [ 677.597183] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 677.597190] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 10:32:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000600000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 677.597204] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 677.597212] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 677.597220] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 677.597228] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 10:32:31 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x8cffffff}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 677.597236] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 [ 677.613033] (syz-executor.1,22921,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 677.613033] " or missing value [ 677.613106] (syz-executor.1,22921,0):ocfs2_fill_super:1225 ERROR: status = -22 10:32:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 52) [ 677.634229] (syz-executor.0,22918,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 677.634229] " or missing value [ 677.634285] (syz-executor.0,22918,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 677.821008] FAULT_INJECTION: forcing a failure. [ 677.821008] name failslab, interval 1, probability 0, space 0, times 0 [ 677.821026] CPU: 0 PID: 22951 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 677.821035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 677.821040] Call Trace: [ 677.821059] dump_stack+0x1fc/0x2ef [ 677.821080] should_fail.cold+0xa/0xf [ 677.821098] ? setup_fault_attr+0x200/0x200 [ 677.821113] ? lock_acquire+0x170/0x3c0 [ 677.821134] __should_failslab+0x115/0x180 [ 677.821153] should_failslab+0x5/0x10 [ 677.821167] __kmalloc_track_caller+0x2a6/0x3c0 [ 677.821182] ? btrfs_mount_root+0x364/0x1830 [ 677.821200] kstrdup+0x36/0x70 [ 677.821217] btrfs_mount_root+0x364/0x1830 [ 677.821240] ? btrfs_decode_error+0x70/0x70 [ 677.821255] ? __mutex_unlock_slowpath+0xea/0x610 [ 677.821275] ? check_preemption_disabled+0x41/0x280 [ 677.821296] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 677.821310] ? pcpu_alloc+0xc9/0x1190 [ 677.821326] ? __lockdep_init_map+0x100/0x5a0 [ 677.821343] mount_fs+0xa3/0x310 [ 677.821363] vfs_kern_mount.part.0+0x68/0x470 [ 677.821375] ? kfree+0x110/0x210 [ 677.821392] vfs_kern_mount+0x3c/0x60 [ 677.821409] btrfs_mount+0x23a/0xaa0 [ 677.821427] ? btrfs_show_options+0xfd0/0xfd0 [ 677.821439] ? __mutex_unlock_slowpath+0xea/0x610 [ 677.821459] ? check_preemption_disabled+0x41/0x280 [ 677.821478] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 677.821491] ? pcpu_alloc+0xc9/0x1190 [ 677.821507] ? __lockdep_init_map+0x100/0x5a0 [ 677.821524] mount_fs+0xa3/0x310 [ 677.821543] vfs_kern_mount.part.0+0x68/0x470 [ 677.821561] do_mount+0x115c/0x2f50 [ 677.821578] ? cmp_ex_sort+0xc0/0xc0 [ 677.821594] ? __do_page_fault+0x180/0xd60 [ 677.821611] ? copy_mount_string+0x40/0x40 [ 677.821632] ? memset+0x20/0x40 [ 677.821647] ? copy_mount_options+0x26f/0x380 [ 677.821665] ksys_mount+0xcf/0x130 [ 677.821682] __x64_sys_mount+0xba/0x150 [ 677.821698] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 677.821711] do_syscall_64+0xf9/0x620 [ 677.821730] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 677.821741] RIP: 0033:0x7f85e029463a [ 677.821754] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 677.821762] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 677.821775] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 677.821783] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 677.821791] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 677.821800] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 677.821807] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 [ 677.918436] (syz-executor.1,22949,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 677.918436] " or missing value [ 677.918494] (syz-executor.1,22949,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 678.031389] (syz-executor.0,22971,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 678.031389] " or missing value [ 678.031468] (syz-executor.0,22971,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 678.077369] FAULT_INJECTION: forcing a failure. [ 678.077369] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 678.077386] CPU: 1 PID: 22972 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 678.077393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 678.077397] Call Trace: [ 678.077417] dump_stack+0x1fc/0x2ef [ 678.077437] should_fail.cold+0xa/0xf [ 678.077456] ? setup_fault_attr+0x200/0x200 [ 678.077483] __alloc_pages_nodemask+0x239/0x2890 [ 678.077495] ? __save_stack_trace+0x72/0x190 [ 678.077511] ? deref_stack_reg+0x134/0x1d0 [ 678.077528] ? mark_held_locks+0xf0/0xf0 [ 678.077545] ? unwind_next_frame+0xeee/0x1400 [ 678.077563] ? __lock_acquire+0x6de/0x3ff0 [ 678.077584] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 678.077597] ? is_bpf_text_address+0xd5/0x1b0 10:32:31 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x117, 0x0, 0x0) 10:32:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85001a0300000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000700000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:31 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}\tV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 53) [ 678.077616] ? __bpf_address_lookup+0x330/0x330 [ 678.077633] ? check_preemption_disabled+0x41/0x280 [ 678.077651] ? is_bpf_text_address+0xfc/0x1b0 [ 678.077668] ? kernel_text_address+0xbd/0xf0 [ 678.077686] cache_grow_begin+0xa4/0x8a0 [ 678.077701] ? setup_fault_attr+0x200/0x200 [ 678.077714] ? lock_acquire+0x170/0x3c0 [ 678.077732] cache_alloc_refill+0x273/0x340 [ 678.077751] kmem_cache_alloc+0x346/0x370 [ 678.077770] getname_kernel+0x4e/0x370 [ 678.077783] kern_path+0x1b/0x40 [ 678.077797] lookup_bdev+0xfc/0x220 [ 678.077809] ? bd_acquire+0x440/0x440 [ 678.077821] ? debug_check_no_obj_freed+0x201/0x490 [ 678.077842] blkdev_get_by_path+0x1b/0xd0 [ 678.077857] btrfs_scan_one_device+0xd0/0xd00 [ 678.077876] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 678.077889] ? debug_check_no_obj_freed+0x201/0x490 [ 678.077905] ? device_list_add+0xdd0/0xdd0 [ 678.077918] ? kfree+0x110/0x210 [ 678.077932] ? btrfs_mount_root+0x107a/0x1830 [ 678.077959] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 678.077978] btrfs_mount_root+0x9df/0x1830 [ 678.078000] ? btrfs_decode_error+0x70/0x70 [ 678.078019] ? __mutex_unlock_slowpath+0xea/0x610 [ 678.078039] ? check_preemption_disabled+0x41/0x280 [ 678.078060] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 678.078073] ? pcpu_alloc+0xc9/0x1190 [ 678.078090] ? __lockdep_init_map+0x100/0x5a0 [ 678.078107] mount_fs+0xa3/0x310 [ 678.078126] vfs_kern_mount.part.0+0x68/0x470 [ 678.078139] ? kfree+0x110/0x210 [ 678.078155] vfs_kern_mount+0x3c/0x60 [ 678.078172] btrfs_mount+0x23a/0xaa0 [ 678.078190] ? btrfs_show_options+0xfd0/0xfd0 [ 678.078202] ? __mutex_unlock_slowpath+0xea/0x610 [ 678.078221] ? check_preemption_disabled+0x41/0x280 [ 678.078241] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 678.078255] ? pcpu_alloc+0xc9/0x1190 [ 678.078271] ? __lockdep_init_map+0x100/0x5a0 [ 678.078288] mount_fs+0xa3/0x310 [ 678.078308] vfs_kern_mount.part.0+0x68/0x470 [ 678.078326] do_mount+0x115c/0x2f50 [ 678.078342] ? cmp_ex_sort+0xc0/0xc0 [ 678.078358] ? __do_page_fault+0x180/0xd60 [ 678.078374] ? copy_mount_string+0x40/0x40 [ 678.078397] ? memset+0x20/0x40 [ 678.078412] ? copy_mount_options+0x26f/0x380 [ 678.078430] ksys_mount+0xcf/0x130 [ 678.078446] __x64_sys_mount+0xba/0x150 [ 678.078462] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 678.078475] do_syscall_64+0xf9/0x620 [ 678.078494] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 678.078506] RIP: 0033:0x7f85e029463a [ 678.078519] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 678.078527] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 678.078540] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 678.078548] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 678.078557] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 678.078564] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 678.078573] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 [ 678.228508] FAULT_INJECTION: forcing a failure. [ 678.228508] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 678.228526] CPU: 0 PID: 22997 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 678.228535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 678.228539] Call Trace: [ 678.228560] dump_stack+0x1fc/0x2ef [ 678.228581] should_fail.cold+0xa/0xf [ 678.228599] ? setup_fault_attr+0x200/0x200 [ 678.228625] __alloc_pages_nodemask+0x239/0x2890 [ 678.228638] ? __save_stack_trace+0x72/0x190 [ 678.228652] ? deref_stack_reg+0x134/0x1d0 [ 678.228669] ? mark_held_locks+0xf0/0xf0 [ 678.228684] ? unwind_next_frame+0xeee/0x1400 [ 678.228702] ? __lock_acquire+0x6de/0x3ff0 [ 678.228724] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 678.228737] ? is_bpf_text_address+0xd5/0x1b0 [ 678.228756] ? __bpf_address_lookup+0x330/0x330 [ 678.228772] ? check_preemption_disabled+0x41/0x280 [ 678.228790] ? is_bpf_text_address+0xfc/0x1b0 [ 678.228807] ? kernel_text_address+0xbd/0xf0 [ 678.228825] cache_grow_begin+0xa4/0x8a0 [ 678.228841] ? setup_fault_attr+0x200/0x200 [ 678.228854] ? lock_acquire+0x170/0x3c0 [ 678.228871] cache_alloc_refill+0x273/0x340 [ 678.228890] kmem_cache_alloc+0x346/0x370 [ 678.228915] getname_kernel+0x4e/0x370 [ 678.228929] kern_path+0x1b/0x40 [ 678.228943] lookup_bdev+0xfc/0x220 [ 678.228954] ? bd_acquire+0x440/0x440 [ 678.228965] ? debug_check_no_obj_freed+0x201/0x490 [ 678.228983] blkdev_get_by_path+0x1b/0xd0 [ 678.228997] btrfs_scan_one_device+0xd0/0xd00 [ 678.229015] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 678.229028] ? debug_check_no_obj_freed+0x201/0x490 [ 678.229044] ? device_list_add+0xdd0/0xdd0 [ 678.229057] ? kfree+0x110/0x210 [ 678.229071] ? btrfs_mount_root+0x107a/0x1830 [ 678.229085] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 678.229102] btrfs_mount_root+0x9df/0x1830 [ 678.229124] ? btrfs_decode_error+0x70/0x70 [ 678.229140] ? __mutex_unlock_slowpath+0xea/0x610 [ 678.229159] ? check_preemption_disabled+0x41/0x280 [ 678.229179] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 678.229193] ? pcpu_alloc+0xc9/0x1190 [ 678.229209] ? __lockdep_init_map+0x100/0x5a0 [ 678.229226] mount_fs+0xa3/0x310 [ 678.229244] vfs_kern_mount.part.0+0x68/0x470 [ 678.229257] ? kfree+0x110/0x210 [ 678.229273] vfs_kern_mount+0x3c/0x60 [ 678.229289] btrfs_mount+0x23a/0xaa0 [ 678.229307] ? btrfs_show_options+0xfd0/0xfd0 [ 678.229319] ? __mutex_unlock_slowpath+0xea/0x610 [ 678.229338] ? check_preemption_disabled+0x41/0x280 [ 678.229358] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 678.229371] ? pcpu_alloc+0xc9/0x1190 [ 678.229387] ? __lockdep_init_map+0x100/0x5a0 [ 678.229404] mount_fs+0xa3/0x310 [ 678.229422] vfs_kern_mount.part.0+0x68/0x470 [ 678.229440] do_mount+0x115c/0x2f50 [ 678.229456] ? cmp_ex_sort+0xc0/0xc0 [ 678.229479] ? __do_page_fault+0x180/0xd60 [ 678.229497] ? copy_mount_string+0x40/0x40 [ 678.229520] ? memset+0x20/0x40 [ 678.229536] ? copy_mount_options+0x26f/0x380 [ 678.229554] ksys_mount+0xcf/0x130 [ 678.229572] __x64_sys_mount+0xba/0x150 [ 678.229588] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 678.229601] do_syscall_64+0xf9/0x620 [ 678.229619] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 678.229631] RIP: 0033:0x7f85e029463a [ 678.229645] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 678.229652] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 678.229666] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 678.229674] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 678.229682] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 678.229690] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 678.229699] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 [ 678.243833] (syz-executor.1,22987,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 678.243833] " or missing value [ 678.245100] (syz-executor.1,22987,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 678.398842] (syz-executor.0,23003,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 678.398842] " or missing value [ 679.311659] FAULT_INJECTION: forcing a failure. [ 679.311659] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 679.370493] (syz-executor.0,23003,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 679.374268] CPU: 1 PID: 23030 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 679.462824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 679.462829] Call Trace: [ 679.462847] dump_stack+0x1fc/0x2ef [ 679.462863] should_fail.cold+0xa/0xf [ 679.462878] ? setup_fault_attr+0x200/0x200 [ 679.462889] ? is_bpf_text_address+0xfc/0x1b0 [ 679.462902] ? kernel_text_address+0xbd/0xf0 [ 679.462918] __alloc_pages_nodemask+0x239/0x2890 [ 679.462938] ? __lock_acquire+0x6de/0x3ff0 [ 679.462951] ? mount_fs+0xa3/0x310 10:32:32 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0xc0ed0000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 679.462962] ? vfs_kern_mount.part.0+0x68/0x470 [ 679.462973] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 679.462983] ? vfs_kern_mount.part.0+0x68/0x470 [ 679.462998] ? do_mount+0x115c/0x2f50 [ 679.463008] ? ksys_mount+0xcf/0x130 [ 679.463018] ? __x64_sys_mount+0xba/0x150 [ 679.463029] ? do_syscall_64+0xf9/0x620 [ 679.463041] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 679.463058] ? lock_downgrade+0x720/0x720 10:32:32 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}\nV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 679.463069] ? lock_acquire+0x170/0x3c0 [ 679.463081] ? cache_alloc_refill+0x2f8/0x340 [ 679.463097] cache_grow_begin+0xa4/0x8a0 [ 679.463109] ? setup_fault_attr+0x200/0x200 [ 679.463119] ? lock_acquire+0x170/0x3c0 [ 679.463133] cache_alloc_refill+0x273/0x340 [ 679.463148] kmem_cache_alloc_trace+0x354/0x380 [ 679.463165] btrfs_mount_root+0x1e1/0x1830 [ 679.463183] ? btrfs_decode_error+0x70/0x70 10:32:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85001c0300000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 679.463195] ? __mutex_unlock_slowpath+0xea/0x610 [ 679.463211] ? check_preemption_disabled+0x41/0x280 [ 679.463227] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 679.463238] ? pcpu_alloc+0xc9/0x1190 [ 679.463250] ? __lockdep_init_map+0x100/0x5a0 [ 679.463263] mount_fs+0xa3/0x310 [ 679.463278] vfs_kern_mount.part.0+0x68/0x470 [ 679.463288] ? kfree+0x110/0x210 10:32:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000800000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 679.463301] vfs_kern_mount+0x3c/0x60 [ 679.463314] btrfs_mount+0x23a/0xaa0 [ 679.463328] ? btrfs_show_options+0xfd0/0xfd0 [ 679.463337] ? __mutex_unlock_slowpath+0xea/0x610 [ 679.463351] ? check_preemption_disabled+0x41/0x280 [ 679.463367] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 679.463378] ? pcpu_alloc+0xc9/0x1190 [ 679.463390] ? __lockdep_init_map+0x100/0x5a0 [ 679.463403] mount_fs+0xa3/0x310 [ 679.463418] vfs_kern_mount.part.0+0x68/0x470 10:32:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 54) [ 679.463432] do_mount+0x115c/0x2f50 [ 679.463446] ? cmp_ex_sort+0xc0/0xc0 10:32:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000900000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 679.463460] ? __do_page_fault+0x180/0xd60 [ 679.463472] ? copy_mount_string+0x40/0x40 [ 679.463490] ? memset+0x20/0x40 [ 679.463502] ? copy_mount_options+0x26f/0x380 [ 679.463516] ksys_mount+0xcf/0x130 10:32:32 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0xf6ffffff}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 679.463529] __x64_sys_mount+0xba/0x150 [ 679.463541] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 679.463551] do_syscall_64+0xf9/0x620 [ 679.463565] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 679.463574] RIP: 0033:0x7f85e029463a [ 679.463585] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 679.463591] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 679.463601] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 679.463608] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 679.463614] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 679.463620] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 10:32:33 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x118, 0x0, 0x0) [ 679.463627] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 [ 679.484712] (syz-executor.1,23026,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 679.484712] " or missing value [ 679.484772] (syz-executor.1,23026,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 679.907652] (syz-executor.0,23045,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 679.907652] " or missing value [ 679.907725] (syz-executor.0,23045,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 680.011216] (syz-executor.1,23042,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 680.011216] " or missing value [ 680.133260] FAULT_INJECTION: forcing a failure. [ 680.133260] name failslab, interval 1, probability 0, space 0, times 0 [ 680.152415] CPU: 0 PID: 23065 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 10:32:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500220300000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 680.160313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 680.169693] Call Trace: [ 680.169727] dump_stack+0x1fc/0x2ef [ 680.169746] should_fail.cold+0xa/0xf [ 680.169764] ? setup_fault_attr+0x200/0x200 [ 680.169780] ? __lock_acquire+0x6de/0x3ff0 [ 680.169801] __should_failslab+0x115/0x180 [ 680.169818] should_failslab+0x5/0x10 [ 680.169832] kmem_cache_alloc+0x3f/0x370 [ 680.169845] ? mempool_alloc+0x350/0x350 [ 680.169857] mempool_alloc+0x146/0x350 [ 680.169874] ? lock_acquire+0x170/0x3c0 [ 680.169887] ? mempool_resize+0x790/0x790 [ 680.169903] ? check_preemption_disabled+0x41/0x280 [ 680.169921] ? alloc_buffer_head+0x20/0x130 [ 680.169940] bio_alloc_bioset+0x389/0x5e0 [ 680.169957] ? alloc_page_buffers+0x2da/0x5c0 [ 680.169969] ? bvec_alloc+0x2f0/0x2f0 [ 680.169981] ? do_raw_spin_lock+0xcb/0x220 [ 680.169997] ? create_empty_buffers+0x4e7/0x760 [ 680.170021] submit_bh_wbc+0x141/0x760 [ 680.170042] block_read_full_page+0x7cf/0xd10 [ 680.170058] ? block_llseek+0xc0/0xc0 [ 680.170077] ? __bread_gfp+0x300/0x300 [ 680.170097] ? add_to_page_cache_locked+0x40/0x40 [ 680.170122] do_read_cache_page+0x533/0x1170 [ 680.170136] ? blkdev_writepages+0x20/0x20 [ 680.170154] btrfs_scan_one_device+0x195/0xd00 [ 680.170173] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 680.170187] ? debug_check_no_obj_freed+0x201/0x490 [ 680.170203] ? device_list_add+0xdd0/0xdd0 [ 680.170215] ? kfree+0x110/0x210 [ 680.170230] ? btrfs_mount_root+0x107a/0x1830 [ 680.170246] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 680.170264] btrfs_mount_root+0x9df/0x1830 [ 680.170288] ? btrfs_decode_error+0x70/0x70 [ 680.170303] ? __mutex_unlock_slowpath+0xea/0x610 10:32:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000001000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500540300000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 680.170322] ? check_preemption_disabled+0x41/0x280 [ 680.170344] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 680.170358] ? pcpu_alloc+0xc9/0x1190 [ 680.170374] ? __lockdep_init_map+0x100/0x5a0 [ 680.170392] mount_fs+0xa3/0x310 [ 680.170413] vfs_kern_mount.part.0+0x68/0x470 10:32:33 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0xffff1f00}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 55) [ 680.170426] ? kfree+0x110/0x210 [ 680.170442] vfs_kern_mount+0x3c/0x60 [ 680.170459] btrfs_mount+0x23a/0xaa0 [ 680.170476] ? btrfs_show_options+0xfd0/0xfd0 10:32:33 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}\x8dV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 680.170486] ? __mutex_unlock_slowpath+0xea/0x610 [ 680.170504] ? check_preemption_disabled+0x41/0x280 [ 680.170534] ? rcu_read_lock_sched_held+0x16c/0x1d0 10:32:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500690300000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 680.170550] ? pcpu_alloc+0xc9/0x1190 10:32:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 56) [ 680.170567] ? __lockdep_init_map+0x100/0x5a0 [ 680.170585] mount_fs+0xa3/0x310 [ 680.170605] vfs_kern_mount.part.0+0x68/0x470 [ 680.170624] do_mount+0x115c/0x2f50 [ 680.170643] ? cmp_ex_sort+0xc0/0xc0 [ 680.170660] ? __do_page_fault+0x180/0xd60 [ 680.170678] ? copy_mount_string+0x40/0x40 [ 680.170708] ? memset+0x20/0x40 [ 680.170725] ? copy_mount_options+0x26f/0x380 [ 680.170743] ksys_mount+0xcf/0x130 [ 680.170759] __x64_sys_mount+0xba/0x150 [ 680.170774] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 680.170787] do_syscall_64+0xf9/0x620 [ 680.170805] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 680.170816] RIP: 0033:0x7f85e029463a [ 680.170830] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 680.170837] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 10:32:33 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x119, 0x0, 0x0) [ 680.170850] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 680.170858] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 680.170866] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 680.170873] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 680.170882] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 [ 680.306575] (syz-executor.1,23042,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 680.350050] (syz-executor.0,23081,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 680.350050] " or missing value [ 680.350110] (syz-executor.0,23081,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 680.656968] FAULT_INJECTION: forcing a failure. [ 680.656968] name failslab, interval 1, probability 0, space 0, times 0 [ 680.657037] CPU: 0 PID: 23105 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 680.657046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 680.657051] Call Trace: [ 680.657071] dump_stack+0x1fc/0x2ef [ 680.657092] should_fail.cold+0xa/0xf [ 680.657111] ? setup_fault_attr+0x200/0x200 [ 680.657129] ? __lock_acquire+0x6de/0x3ff0 [ 680.657149] __should_failslab+0x115/0x180 [ 680.657167] should_failslab+0x5/0x10 [ 680.657180] kmem_cache_alloc+0x3f/0x370 [ 680.657197] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 680.657214] __radix_tree_create+0x314/0x540 [ 680.657237] page_cache_tree_insert+0xac/0x3f0 [ 680.657255] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 680.657269] ? lock_acquire+0x170/0x3c0 [ 680.657284] ? __add_to_page_cache_locked+0x45e/0xb60 [ 680.657306] __add_to_page_cache_locked+0x46e/0xb60 [ 680.657325] ? page_cache_tree_insert+0x3f0/0x3f0 [ 680.657347] add_to_page_cache_lru+0x16a/0x680 [ 680.657364] ? add_to_page_cache_locked+0x40/0x40 [ 680.657388] pagecache_get_page+0x478/0xd50 [ 680.657409] __getblk_slow+0x216/0x9e0 [ 680.657434] __bread_gfp+0x218/0x300 [ 680.657451] btrfs_read_dev_super+0x8a/0x230 [ 680.657465] btrfs_get_bdev_and_sb+0xf6/0x2f0 [ 680.657480] open_fs_devices+0x5a3/0xa50 [ 680.657499] ? find_fsid+0xb0/0xb0 [ 680.657523] btrfs_open_devices+0x114/0x150 [ 680.657540] btrfs_mount_root+0xa60/0x1830 [ 680.657562] ? btrfs_decode_error+0x70/0x70 [ 680.657577] ? __mutex_unlock_slowpath+0xea/0x610 [ 680.657597] ? check_preemption_disabled+0x41/0x280 [ 680.657617] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 680.657631] ? pcpu_alloc+0xc9/0x1190 [ 680.657646] ? __lockdep_init_map+0x100/0x5a0 [ 680.657663] mount_fs+0xa3/0x310 [ 680.657682] vfs_kern_mount.part.0+0x68/0x470 [ 680.657694] ? kfree+0x110/0x210 [ 680.657714] vfs_kern_mount+0x3c/0x60 [ 680.657731] btrfs_mount+0x23a/0xaa0 [ 680.657748] ? btrfs_show_options+0xfd0/0xfd0 [ 680.657760] ? __mutex_unlock_slowpath+0xea/0x610 [ 680.657779] ? check_preemption_disabled+0x41/0x280 [ 680.657798] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 680.657811] ? pcpu_alloc+0xc9/0x1190 [ 680.657827] ? __lockdep_init_map+0x100/0x5a0 [ 680.657849] mount_fs+0xa3/0x310 [ 680.657868] vfs_kern_mount.part.0+0x68/0x470 [ 680.657887] do_mount+0x115c/0x2f50 [ 680.657904] ? cmp_ex_sort+0xc0/0xc0 [ 680.657920] ? __do_page_fault+0x180/0xd60 [ 680.657936] ? copy_mount_string+0x40/0x40 [ 680.657957] ? memset+0x20/0x40 [ 680.657972] ? copy_mount_options+0x26f/0x380 [ 680.657990] ksys_mount+0xcf/0x130 [ 680.658006] __x64_sys_mount+0xba/0x150 [ 680.658022] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 680.658035] do_syscall_64+0xf9/0x620 [ 680.658053] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 680.658064] RIP: 0033:0x7f85e029463a [ 680.658079] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 680.658086] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 680.658099] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 680.658108] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 680.658117] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 680.658125] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 680.658133] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 [ 680.797587] (syz-executor.0,23101,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 680.797587] " or missing value [ 681.247207] (syz-executor.0,23101,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 681.260522] (syz-executor.1,23112,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 681.260522] " or missing value 10:32:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000001f00000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 681.274100] (syz-executor.1,23112,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:34 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x11a, 0x0, 0x0) 10:32:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85008d0300000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:34 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EB\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:34 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0, 0x0) 10:32:34 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0xffffff7f}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 681.461349] FAULT_INJECTION: forcing a failure. [ 681.461349] name failslab, interval 1, probability 0, space 0, times 0 [ 681.533535] CPU: 0 PID: 23130 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 681.541458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 681.551317] Call Trace: [ 681.551342] dump_stack+0x1fc/0x2ef [ 681.551359] should_fail.cold+0xa/0xf [ 681.551379] ? setup_fault_attr+0x200/0x200 [ 681.565743] __should_failslab+0x115/0x180 [ 681.565762] should_failslab+0x5/0x10 [ 681.573786] __kmalloc+0x2ab/0x3c0 [ 681.577334] ? device_list_add+0x85d/0xdd0 [ 681.581581] device_list_add+0x85d/0xdd0 [ 681.585653] ? btrfs_rm_dev_replace_free_srcdev+0x450/0x450 [ 681.591380] btrfs_scan_one_device+0x33f/0xd00 [ 681.595975] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 681.601083] ? debug_check_no_obj_freed+0x201/0x490 [ 681.606115] ? device_list_add+0xdd0/0xdd0 [ 681.610354] ? kfree+0x110/0x210 [ 681.613726] ? btrfs_mount_root+0x107a/0x1830 [ 681.618227] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 681.622822] btrfs_mount_root+0x9df/0x1830 [ 681.627077] ? btrfs_decode_error+0x70/0x70 [ 681.631411] ? __mutex_unlock_slowpath+0xea/0x610 [ 681.636263] ? check_preemption_disabled+0x41/0x280 [ 681.641299] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 681.646319] ? pcpu_alloc+0xc9/0x1190 [ 681.650132] ? __lockdep_init_map+0x100/0x5a0 [ 681.654637] mount_fs+0xa3/0x310 [ 681.658010] vfs_kern_mount.part.0+0x68/0x470 [ 681.662506] ? kfree+0x110/0x210 [ 681.665880] vfs_kern_mount+0x3c/0x60 [ 681.669686] btrfs_mount+0x23a/0xaa0 [ 681.673405] ? btrfs_show_options+0xfd0/0xfd0 [ 681.677902] ? __mutex_unlock_slowpath+0xea/0x610 [ 681.682755] ? check_preemption_disabled+0x41/0x280 [ 681.687780] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 681.692800] ? pcpu_alloc+0xc9/0x1190 [ 681.696610] ? __lockdep_init_map+0x100/0x5a0 [ 681.701128] mount_fs+0xa3/0x310 [ 681.704511] vfs_kern_mount.part.0+0x68/0x470 [ 681.709021] do_mount+0x115c/0x2f50 [ 681.712742] ? cmp_ex_sort+0xc0/0xc0 [ 681.716461] ? __do_page_fault+0x180/0xd60 [ 681.720704] ? copy_mount_string+0x40/0x40 [ 681.724955] ? memset+0x20/0x40 [ 681.728242] ? copy_mount_options+0x26f/0x380 [ 681.732753] ksys_mount+0xcf/0x130 [ 681.736310] __x64_sys_mount+0xba/0x150 [ 681.740293] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 681.744882] do_syscall_64+0xf9/0x620 [ 681.746674] (syz-executor.1,23150,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 681.746674] " or missing value [ 681.748690] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.748703] RIP: 0033:0x7f85e029463a 10:32:34 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x11c, 0x0, 0x0) [ 681.748717] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 681.748725] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 681.748739] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 681.748749] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 681.748758] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 681.748766] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 681.748784] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 10:32:34 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x11d, 0x0, 0x0) [ 681.879729] (syz-executor.1,23150,0):ocfs2_fill_super:1225 ERROR: status = -22 10:32:34 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EC\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:34 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x11e, 0x0, 0x0) [ 681.944425] (syz-executor.0,23151,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 681.944425] " or missing value [ 681.958528] (syz-executor.0,23151,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 57) 10:32:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000002000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:35 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0xffffff8c}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85009b0300000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:35 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x11f, 0x0, 0x0) [ 682.203879] (syz-executor.1,23179,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 682.203879] " or missing value [ 682.204667] (syz-executor.0,23187,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 682.204667] " or missing value [ 682.237621] FAULT_INJECTION: forcing a failure. [ 682.237621] name failslab, interval 1, probability 0, space 0, times 0 [ 682.250319] (syz-executor.0,23187,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 682.254771] CPU: 0 PID: 23194 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 682.258473] (syz-executor.1,23179,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 682.265710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.265716] Call Trace: [ 682.265737] dump_stack+0x1fc/0x2ef [ 682.265754] should_fail.cold+0xa/0xf [ 682.265771] ? setup_fault_attr+0x200/0x200 [ 682.265785] ? __lock_acquire+0x6de/0x3ff0 [ 682.265805] __should_failslab+0x115/0x180 [ 682.265823] should_failslab+0x5/0x10 [ 682.265837] kmem_cache_alloc+0x3f/0x370 [ 682.265851] ? mempool_alloc+0x350/0x350 [ 682.265863] mempool_alloc+0x146/0x350 [ 682.265879] ? lock_acquire+0x170/0x3c0 [ 682.265891] ? mempool_resize+0x790/0x790 [ 682.265907] ? check_preemption_disabled+0x41/0x280 [ 682.265925] ? alloc_buffer_head+0x20/0x130 [ 682.265946] bio_alloc_bioset+0x389/0x5e0 [ 682.265962] ? alloc_page_buffers+0x2da/0x5c0 [ 682.265974] ? bvec_alloc+0x2f0/0x2f0 [ 682.265986] ? do_raw_spin_lock+0xcb/0x220 [ 682.266004] ? create_empty_buffers+0x4e7/0x760 [ 682.266021] submit_bh_wbc+0x141/0x760 [ 682.266042] block_read_full_page+0x7cf/0xd10 [ 682.266058] ? block_llseek+0xc0/0xc0 [ 682.266077] ? __bread_gfp+0x300/0x300 [ 682.266103] ? add_to_page_cache_locked+0x40/0x40 [ 682.266128] do_read_cache_page+0x533/0x1170 [ 682.266142] ? blkdev_writepages+0x20/0x20 [ 682.266160] btrfs_scan_one_device+0x195/0xd00 [ 682.266178] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 682.266191] ? debug_check_no_obj_freed+0x201/0x490 [ 682.266207] ? device_list_add+0xdd0/0xdd0 [ 682.266221] ? kfree+0x110/0x210 [ 682.266236] ? btrfs_mount_root+0x107a/0x1830 [ 682.266252] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 682.421283] btrfs_mount_root+0x9df/0x1830 [ 682.421309] ? btrfs_decode_error+0x70/0x70 10:32:35 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0xfffffff6}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:35 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}ED\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000002300000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 682.421327] ? __mutex_unlock_slowpath+0xea/0x610 [ 682.421348] ? check_preemption_disabled+0x41/0x280 [ 682.421370] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 682.421385] ? pcpu_alloc+0xc9/0x1190 [ 682.421403] ? __lockdep_init_map+0x100/0x5a0 10:32:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 58) [ 682.421422] mount_fs+0xa3/0x310 [ 682.421442] vfs_kern_mount.part.0+0x68/0x470 [ 682.421462] ? kfree+0x110/0x210 [ 682.421484] vfs_kern_mount+0x3c/0x60 [ 682.421505] btrfs_mount+0x23a/0xaa0 [ 682.421529] ? btrfs_show_options+0xfd0/0xfd0 [ 682.421549] ? __mutex_unlock_slowpath+0xea/0x610 [ 682.421569] ? check_preemption_disabled+0x41/0x280 [ 682.421590] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 682.421604] ? pcpu_alloc+0xc9/0x1190 [ 682.421620] ? __lockdep_init_map+0x100/0x5a0 [ 682.421638] mount_fs+0xa3/0x310 [ 682.421657] vfs_kern_mount.part.0+0x68/0x470 [ 682.421676] do_mount+0x115c/0x2f50 [ 682.421694] ? cmp_ex_sort+0xc0/0xc0 [ 682.421712] ? __do_page_fault+0x180/0xd60 [ 682.421728] ? copy_mount_string+0x40/0x40 [ 682.421750] ? memset+0x20/0x40 [ 682.421766] ? copy_mount_options+0x26f/0x380 [ 682.421784] ksys_mount+0xcf/0x130 [ 682.421802] __x64_sys_mount+0xba/0x150 [ 682.421820] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 682.421835] do_syscall_64+0xf9/0x620 [ 682.421854] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.421867] RIP: 0033:0x7f85e029463a 10:32:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500c70300000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 682.421883] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 682.421891] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 682.421905] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 682.421914] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 682.421922] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 682.421930] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 682.421943] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 [ 682.742915] (syz-executor.0,23218,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 682.742915] " or missing value [ 682.779117] FAULT_INJECTION: forcing a failure. [ 682.779117] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 682.790945] CPU: 1 PID: 23217 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 682.798828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.806836] (syz-executor.1,23221,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 682.806836] " or missing value [ 682.808180] Call Trace: [ 682.808200] dump_stack+0x1fc/0x2ef [ 682.808221] should_fail.cold+0xa/0xf [ 682.808239] ? setup_fault_attr+0x200/0x200 [ 682.808265] __alloc_pages_nodemask+0x239/0x2890 [ 682.808281] ? mark_held_locks+0xf0/0xf0 [ 682.808308] ? __lock_acquire+0x6de/0x3ff0 [ 682.831802] (syz-executor.1,23221,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 682.835333] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 682.835360] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 682.835379] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 682.835393] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 682.835412] ? try_to_wake_up+0x733/0x1050 10:32:35 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x120, 0x0, 0x0) 10:32:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000003f00000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 682.852281] (syz-executor.0,23218,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 682.855807] ? __mutex_unlock_slowpath+0x2b4/0x610 [ 682.855829] cache_grow_begin+0xa4/0x8a0 [ 682.855847] ? setup_fault_attr+0x200/0x200 [ 682.855862] ? lock_acquire+0x170/0x3c0 [ 682.855879] cache_alloc_refill+0x273/0x340 [ 682.855898] kmem_cache_alloc+0x346/0x370 [ 682.912713] getname_kernel+0x4e/0x370 [ 682.912728] kern_path+0x1b/0x40 [ 682.919970] lookup_bdev+0xfc/0x220 [ 682.923617] ? bd_acquire+0x440/0x440 10:32:35 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x121, 0x0, 0x0) [ 682.923635] ? list_sort.part.0+0x523/0x790 [ 682.923649] ? try_release_extent_buffer+0x3a0/0x3a0 [ 682.923668] blkdev_get_by_path+0x1b/0xd0 [ 682.923684] btrfs_get_bdev_and_sb+0x2f/0x2f0 [ 682.923701] open_fs_devices+0x5a3/0xa50 [ 682.923720] ? find_fsid+0xb0/0xb0 [ 682.923732] ? debug_check_no_obj_freed+0x201/0x490 [ 682.923752] btrfs_open_devices+0x114/0x150 [ 682.962346] btrfs_mount_root+0xa60/0x1830 [ 682.966569] ? btrfs_decode_error+0x70/0x70 [ 682.970951] ? __mutex_unlock_slowpath+0xea/0x610 [ 682.975780] ? check_preemption_disabled+0x41/0x280 [ 682.980787] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 682.985800] ? pcpu_alloc+0xc9/0x1190 [ 682.989609] ? __lockdep_init_map+0x100/0x5a0 [ 682.994088] mount_fs+0xa3/0x310 [ 682.997443] vfs_kern_mount.part.0+0x68/0x470 [ 683.001919] ? kfree+0x110/0x210 [ 683.005272] vfs_kern_mount+0x3c/0x60 [ 683.009060] btrfs_mount+0x23a/0xaa0 [ 683.012758] ? btrfs_show_options+0xfd0/0xfd0 [ 683.017234] ? __mutex_unlock_slowpath+0xea/0x610 [ 683.022062] ? check_preemption_disabled+0x41/0x280 [ 683.027070] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 683.032076] ? pcpu_alloc+0xc9/0x1190 [ 683.035865] ? __lockdep_init_map+0x100/0x5a0 [ 683.040345] mount_fs+0xa3/0x310 [ 683.043698] vfs_kern_mount.part.0+0x68/0x470 [ 683.048190] do_mount+0x115c/0x2f50 [ 683.051867] ? cmp_ex_sort+0xc0/0xc0 [ 683.055567] ? __do_page_fault+0x180/0xd60 [ 683.059785] ? copy_mount_string+0x40/0x40 [ 683.064024] ? memset+0x20/0x40 [ 683.067308] ? copy_mount_options+0x26f/0x380 [ 683.071796] ksys_mount+0xcf/0x130 [ 683.075319] __x64_sys_mount+0xba/0x150 [ 683.079284] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 683.083864] do_syscall_64+0xf9/0x620 [ 683.087660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.092829] RIP: 0033:0x7f85e029463a [ 683.096523] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 683.115409] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 683.123211] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 683.130461] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 683.137713] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 683.144969] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 683.152227] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 10:32:36 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EE\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:36 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0xedc000000000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 59) 10:32:36 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x122, 0x0, 0x0) 10:32:36 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x123, 0x0, 0x0) 10:32:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500d40300000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000004800000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 683.390426] (syz-executor.1,23253,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 683.390426] " or missing value [ 683.409722] FAULT_INJECTION: forcing a failure. [ 683.409722] name failslab, interval 1, probability 0, space 0, times 0 [ 683.416478] (syz-executor.0,23257,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 683.416478] " or missing value [ 683.433279] CPU: 1 PID: 23256 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 683.441956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 683.441963] Call Trace: [ 683.441987] dump_stack+0x1fc/0x2ef [ 683.442009] should_fail.cold+0xa/0xf [ 683.442035] ? setup_fault_attr+0x200/0x200 [ 683.442060] __should_failslab+0x115/0x180 [ 683.442077] should_failslab+0x5/0x10 [ 683.442093] kmem_cache_alloc+0x3f/0x370 [ 683.442110] ? mempool_alloc+0x350/0x350 [ 683.442125] mempool_alloc+0x146/0x350 [ 683.442144] ? mempool_resize+0x790/0x790 [ 683.442163] ? lock_downgrade+0x720/0x720 [ 683.442180] ? mark_held_locks+0xa6/0xf0 [ 683.442198] bio_alloc_bioset+0x389/0x5e0 [ 683.442213] ? __find_get_block+0x314/0xde0 [ 683.442228] ? bvec_alloc+0x2f0/0x2f0 [ 683.442246] ? __getblk_slow+0x6a3/0x9e0 [ 683.442267] submit_bh_wbc+0x141/0x760 [ 683.442288] __bread_gfp+0x14e/0x300 [ 683.442305] btrfs_read_dev_super+0x8a/0x230 [ 683.442321] btrfs_get_bdev_and_sb+0xf6/0x2f0 [ 683.442337] open_fs_devices+0x5a3/0xa50 [ 683.442357] ? find_fsid+0xb0/0xb0 [ 683.442399] btrfs_open_devices+0x114/0x150 [ 683.442419] btrfs_mount_root+0xa60/0x1830 [ 683.442443] ? btrfs_decode_error+0x70/0x70 [ 683.442459] ? __mutex_unlock_slowpath+0xea/0x610 [ 683.442478] ? check_preemption_disabled+0x41/0x280 [ 683.442499] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 683.442512] ? pcpu_alloc+0xc9/0x1190 [ 683.442528] ? __lockdep_init_map+0x100/0x5a0 [ 683.442545] mount_fs+0xa3/0x310 [ 683.442564] vfs_kern_mount.part.0+0x68/0x470 [ 683.442577] ? kfree+0x110/0x210 [ 683.442594] vfs_kern_mount+0x3c/0x60 [ 683.442611] btrfs_mount+0x23a/0xaa0 [ 683.442629] ? btrfs_show_options+0xfd0/0xfd0 [ 683.442640] ? __mutex_unlock_slowpath+0xea/0x610 [ 683.442657] ? check_preemption_disabled+0x41/0x280 [ 683.442676] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 683.442689] ? pcpu_alloc+0xc9/0x1190 [ 683.442705] ? __lockdep_init_map+0x100/0x5a0 [ 683.442724] mount_fs+0xa3/0x310 [ 683.442742] vfs_kern_mount.part.0+0x68/0x470 [ 683.442761] do_mount+0x115c/0x2f50 [ 683.442778] ? cmp_ex_sort+0xc0/0xc0 [ 683.442794] ? __do_page_fault+0x180/0xd60 [ 683.442808] ? copy_mount_string+0x40/0x40 [ 683.442830] ? memset+0x20/0x40 [ 683.442844] ? copy_mount_options+0x26f/0x380 [ 683.442862] ksys_mount+0xcf/0x130 [ 683.442880] __x64_sys_mount+0xba/0x150 [ 683.442896] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 683.442910] do_syscall_64+0xf9/0x620 [ 683.442930] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.442942] RIP: 0033:0x7f85e029463a [ 683.442956] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 683.442964] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 683.442979] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 683.442987] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 683.442996] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 10:32:36 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x124, 0x0, 0x0) [ 683.443004] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 683.443018] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 [ 683.445051] (syz-executor.0,23257,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 683.465880] (syz-executor.1,23253,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 60) 10:32:36 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x4000000000000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:36 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EF\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:36 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x125, 0x0, 0x0) 10:32:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500fc0300000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000004c00000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:36 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x126, 0x0, 0x0) [ 683.971452] FAULT_INJECTION: forcing a failure. [ 683.971452] name failslab, interval 1, probability 0, space 0, times 0 [ 683.993500] CPU: 1 PID: 23297 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 684.001410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.010770] Call Trace: [ 684.013457] dump_stack+0x1fc/0x2ef [ 684.017101] should_fail.cold+0xa/0xf [ 684.020912] ? setup_fault_attr+0x200/0x200 [ 684.025243] ? lock_acquire+0x170/0x3c0 [ 684.029230] __should_failslab+0x115/0x180 [ 684.033480] should_failslab+0x5/0x10 [ 684.037290] kmem_cache_alloc+0x277/0x370 [ 684.041452] getname_kernel+0x4e/0x370 [ 684.045363] kern_path+0x1b/0x40 [ 684.045378] lookup_bdev+0xfc/0x220 [ 684.045390] ? bd_acquire+0x440/0x440 [ 684.045411] blkdev_get_by_path+0x1b/0xd0 [ 684.045425] btrfs_get_bdev_and_sb+0x2f/0x2f0 [ 684.045440] open_fs_devices+0x5a3/0xa50 10:32:37 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x127, 0x0, 0x0) [ 684.068834] ? find_fsid+0xb0/0xb0 [ 684.068861] btrfs_open_devices+0x114/0x150 [ 684.068880] btrfs_mount_root+0xa60/0x1830 [ 684.068901] ? btrfs_decode_error+0x70/0x70 [ 684.068919] ? __mutex_unlock_slowpath+0xea/0x610 [ 684.090208] ? check_preemption_disabled+0x41/0x280 [ 684.095210] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 684.100219] ? pcpu_alloc+0xc9/0x1190 [ 684.104021] ? __lockdep_init_map+0x100/0x5a0 [ 684.108516] mount_fs+0xa3/0x310 [ 684.111871] vfs_kern_mount.part.0+0x68/0x470 [ 684.116352] ? kfree+0x110/0x210 [ 684.119701] vfs_kern_mount+0x3c/0x60 [ 684.123489] btrfs_mount+0x23a/0xaa0 [ 684.127186] ? btrfs_show_options+0xfd0/0xfd0 [ 684.131662] ? __mutex_unlock_slowpath+0xea/0x610 [ 684.136492] ? check_preemption_disabled+0x41/0x280 [ 684.141493] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 684.146498] ? pcpu_alloc+0xc9/0x1190 [ 684.150289] ? __lockdep_init_map+0x100/0x5a0 [ 684.154766] mount_fs+0xa3/0x310 [ 684.158120] vfs_kern_mount.part.0+0x68/0x470 [ 684.162601] do_mount+0x115c/0x2f50 [ 684.166226] ? cmp_ex_sort+0xc0/0xc0 [ 684.169963] ? __do_page_fault+0x180/0xd60 [ 684.174187] ? copy_mount_string+0x40/0x40 [ 684.178406] ? memset+0x20/0x40 [ 684.181668] ? copy_mount_options+0x26f/0x380 [ 684.186164] ksys_mount+0xcf/0x130 [ 684.189686] __x64_sys_mount+0xba/0x150 [ 684.193656] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 684.198239] do_syscall_64+0xf9/0x620 [ 684.202025] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 684.207193] RIP: 0033:0x7f85e029463a [ 684.210891] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 684.229788] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 684.237483] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 684.244736] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 684.252074] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 684.259336] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 684.266597] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 10:32:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 61) 10:32:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000005f42485266535f4d00000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:37 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x128, 0x0, 0x0) [ 684.322321] (syz-executor.0,23305,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 684.322321] " or missing value [ 684.338204] (syz-executor.1,23306,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 684.338204] " or missing value [ 684.362737] (syz-executor.0,23305,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 684.398710] (syz-executor.1,23306,0):ocfs2_fill_super:1225 ERROR: status = -22 10:32:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500030400000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:37 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x129, 0x0, 0x0) 10:32:37 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x100000000000000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:37 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EG\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000004d5f53665248425f00000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:37 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x12a, 0x0, 0x0) [ 684.575335] FAULT_INJECTION: forcing a failure. [ 684.575335] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 684.587182] CPU: 1 PID: 23335 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 684.587192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.587197] Call Trace: [ 684.587222] dump_stack+0x1fc/0x2ef [ 684.610635] should_fail.cold+0xa/0xf [ 684.614452] ? setup_fault_attr+0x200/0x200 [ 684.618800] __alloc_pages_nodemask+0x239/0x2890 10:32:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000006800000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000006c00000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 684.623571] ? __lock_acquire+0x6de/0x3ff0 [ 684.627814] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 684.632676] ? mark_held_locks+0xf0/0xf0 [ 684.636751] ? lock_acquire+0x170/0x3c0 [ 684.640753] ? lo_release+0x1a/0x1f0 [ 684.640781] cache_grow_begin+0xa4/0x8a0 [ 684.648545] ? setup_fault_attr+0x200/0x200 [ 684.648561] ? lock_acquire+0x170/0x3c0 [ 684.648580] cache_alloc_refill+0x273/0x340 [ 684.648599] kmem_cache_alloc+0x346/0x370 [ 684.648618] getname_kernel+0x4e/0x370 [ 684.648634] kern_path+0x1b/0x40 10:32:37 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x12b, 0x0, 0x0) [ 684.648648] lookup_bdev+0xfc/0x220 [ 684.648660] ? bd_acquire+0x440/0x440 [ 684.648676] ? list_sort.part.0+0x523/0x790 [ 684.648689] ? try_release_extent_buffer+0x3a0/0x3a0 [ 684.648706] blkdev_get_by_path+0x1b/0xd0 [ 684.648720] btrfs_get_bdev_and_sb+0x2f/0x2f0 [ 684.648735] open_fs_devices+0x5a3/0xa50 [ 684.648756] ? find_fsid+0xb0/0xb0 [ 684.648777] ? debug_check_no_obj_freed+0x201/0x490 [ 684.648805] btrfs_open_devices+0x114/0x150 [ 684.648827] btrfs_mount_root+0xa60/0x1830 [ 684.648847] ? btrfs_decode_error+0x70/0x70 [ 684.648862] ? __mutex_unlock_slowpath+0xea/0x610 [ 684.648877] ? check_preemption_disabled+0x41/0x280 [ 684.648892] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 684.648903] ? pcpu_alloc+0xc9/0x1190 [ 684.648916] ? __lockdep_init_map+0x100/0x5a0 [ 684.648932] mount_fs+0xa3/0x310 [ 684.648951] vfs_kern_mount.part.0+0x68/0x470 [ 684.648963] ? kfree+0x110/0x210 [ 684.648979] vfs_kern_mount+0x3c/0x60 [ 684.648996] btrfs_mount+0x23a/0xaa0 [ 684.649013] ? btrfs_show_options+0xfd0/0xfd0 [ 684.649025] ? __mutex_unlock_slowpath+0xea/0x610 [ 684.649044] ? check_preemption_disabled+0x41/0x280 [ 684.649070] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 684.774535] (syz-executor.1,23363,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 684.774535] " or missing value [ 684.774856] ? pcpu_alloc+0xc9/0x1190 [ 684.774877] ? __lockdep_init_map+0x100/0x5a0 [ 684.780090] (syz-executor.1,23363,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 684.784888] mount_fs+0xa3/0x310 [ 684.784910] vfs_kern_mount.part.0+0x68/0x470 [ 684.784929] do_mount+0x115c/0x2f50 [ 684.784953] ? cmp_ex_sort+0xc0/0xc0 [ 684.828976] ? __do_page_fault+0x180/0xd60 [ 684.828995] ? copy_mount_string+0x40/0x40 [ 684.837454] ? memset+0x20/0x40 [ 684.840746] ? copy_mount_options+0x26f/0x380 [ 684.845256] ksys_mount+0xcf/0x130 [ 684.848797] __x64_sys_mount+0xba/0x150 [ 684.852870] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 684.857444] do_syscall_64+0xf9/0x620 [ 684.861235] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 684.866422] RIP: 0033:0x7f85e029463a [ 684.870126] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 684.889030] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 684.896737] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 684.903989] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 684.911266] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 684.918535] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 684.925790] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 10:32:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 62) 10:32:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000007400000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:37 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x12c, 0x0, 0x0) 10:32:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000500000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:38 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EI\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 684.991200] (syz-executor.0,23368,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 684.991200] " or missing value [ 685.015669] (syz-executor.0,23368,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 685.210402] FAULT_INJECTION: forcing a failure. [ 685.210402] name failslab, interval 1, probability 0, space 0, times 0 [ 685.245561] CPU: 1 PID: 23382 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 685.253527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 685.262874] Call Trace: [ 685.265450] dump_stack+0x1fc/0x2ef [ 685.269063] should_fail.cold+0xa/0xf [ 685.272851] ? setup_fault_attr+0x200/0x200 [ 685.277156] ? lock_acquire+0x170/0x3c0 [ 685.281116] __should_failslab+0x115/0x180 [ 685.285336] should_failslab+0x5/0x10 [ 685.289130] kmem_cache_alloc+0x277/0x370 [ 685.293278] getname_kernel+0x4e/0x370 [ 685.297147] kern_path+0x1b/0x40 [ 685.300497] lookup_bdev+0xfc/0x220 [ 685.304106] ? bd_acquire+0x440/0x440 [ 685.307890] blkdev_get_by_path+0x1b/0xd0 [ 685.312019] btrfs_get_bdev_and_sb+0x2f/0x2f0 [ 685.316669] open_fs_devices+0x5a3/0xa50 [ 685.320712] ? find_fsid+0xb0/0xb0 [ 685.324238] btrfs_open_devices+0x114/0x150 [ 685.328545] btrfs_mount_root+0xa60/0x1830 [ 685.332764] ? btrfs_decode_error+0x70/0x70 [ 685.337067] ? __mutex_unlock_slowpath+0xea/0x610 [ 685.341894] ? check_preemption_disabled+0x41/0x280 [ 685.346902] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 685.351901] ? pcpu_alloc+0xc9/0x1190 [ 685.355689] ? __lockdep_init_map+0x100/0x5a0 [ 685.360167] mount_fs+0xa3/0x310 [ 685.363518] vfs_kern_mount.part.0+0x68/0x470 [ 685.367997] ? kfree+0x110/0x210 [ 685.371345] vfs_kern_mount+0x3c/0x60 [ 685.375129] btrfs_mount+0x23a/0xaa0 [ 685.378823] ? btrfs_show_options+0xfd0/0xfd0 [ 685.383297] ? __mutex_unlock_slowpath+0xea/0x610 [ 685.388123] ? check_preemption_disabled+0x41/0x280 [ 685.393132] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 685.398136] ? pcpu_alloc+0xc9/0x1190 [ 685.401918] ? __lockdep_init_map+0x100/0x5a0 [ 685.406405] mount_fs+0xa3/0x310 [ 685.409756] vfs_kern_mount.part.0+0x68/0x470 [ 685.414236] do_mount+0x115c/0x2f50 [ 685.417848] ? cmp_ex_sort+0xc0/0xc0 [ 685.421545] ? __do_page_fault+0x180/0xd60 [ 685.425765] ? copy_mount_string+0x40/0x40 [ 685.429996] ? memset+0x20/0x40 [ 685.433256] ? copy_mount_options+0x26f/0x380 [ 685.437733] ksys_mount+0xcf/0x130 [ 685.441258] __x64_sys_mount+0xba/0x150 [ 685.445222] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 685.449795] do_syscall_64+0xf9/0x620 [ 685.453586] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 685.458764] RIP: 0033:0x7f85e029463a [ 685.462459] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 685.481342] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 685.489035] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 685.496288] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 685.503544] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 10:32:38 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x200000000000000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:38 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x12d, 0x0, 0x0) 10:32:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000007a00000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) [ 685.510797] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 685.518050] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 [ 685.550224] (syz-executor.1,23385,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 685.550224] " or missing value [ 685.575561] BTRFS warning (device ): duplicate device /dev/loop2 devid 0 generation 0 scanned by syz-executor.2 (23393) 10:32:38 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x12e, 0x0, 0x0) 10:32:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 63) 10:32:38 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x12f, 0x0, 0x0) 10:32:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000600000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000ecb3cb8a00000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:38 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x130, 0x0, 0x0) [ 685.738447] (syz-executor.1,23385,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:38 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EK\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 685.801472] (syz-executor.0,23408,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 685.801472] " or missing value [ 685.814308] (syz-executor.0,23408,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:38 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x131, 0x0, 0x0) 10:32:38 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x300000000000000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 685.921855] FAULT_INJECTION: forcing a failure. [ 685.921855] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 685.934219] CPU: 0 PID: 23417 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 685.942094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 685.951483] Call Trace: [ 685.951504] dump_stack+0x1fc/0x2ef [ 685.951526] should_fail.cold+0xa/0xf [ 685.951549] ? setup_fault_attr+0x200/0x200 [ 685.951565] ? __update_load_avg_se+0x5ec/0xa00 [ 685.951579] ? mark_held_locks+0xf0/0xf0 [ 685.951594] ? mark_held_locks+0xf0/0xf0 [ 685.951614] __alloc_pages_nodemask+0x239/0x2890 [ 685.951630] ? set_next_entity+0xb52/0x1dc0 [ 685.951659] ? check_preemption_disabled+0x41/0x280 [ 685.951677] ? __lock_acquire+0x6de/0x3ff0 [ 685.951697] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 685.951710] ? finish_task_switch+0x118/0x760 [ 685.951723] ? _raw_spin_unlock_irq+0x24/0x80 [ 685.951739] ? finish_task_switch+0x146/0x760 [ 686.015326] ? finish_task_switch+0x118/0x760 10:32:39 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x132, 0x0, 0x0) [ 686.015344] ? switch_mm_irqs_off+0x764/0x1340 [ 686.024317] (syz-executor.1,23438,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 686.024317] " or missing value [ 686.024399] ? __schedule+0x88f/0x2040 [ 686.024424] cache_grow_begin+0xa4/0x8a0 [ 686.044910] ? setup_fault_attr+0x200/0x200 [ 686.049243] ? lock_acquire+0x170/0x3c0 [ 686.053230] cache_alloc_refill+0x273/0x340 [ 686.057566] kmem_cache_alloc+0x346/0x370 [ 686.061727] getname_kernel+0x4e/0x370 [ 686.065622] kern_path+0x1b/0x40 [ 686.068997] lookup_bdev+0xfc/0x220 [ 686.072634] ? bd_acquire+0x440/0x440 [ 686.076451] blkdev_get_by_path+0x1b/0xd0 [ 686.080612] btrfs_get_bdev_and_sb+0x2f/0x2f0 [ 686.085117] open_fs_devices+0x5a3/0xa50 [ 686.089193] ? find_fsid+0xb0/0xb0 [ 686.092748] btrfs_open_devices+0x114/0x150 [ 686.097093] btrfs_mount_root+0xa60/0x1830 [ 686.101354] ? btrfs_decode_error+0x70/0x70 [ 686.105686] ? __mutex_unlock_slowpath+0xea/0x610 [ 686.110542] ? check_preemption_disabled+0x41/0x280 [ 686.115571] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 686.120725] ? pcpu_alloc+0xc9/0x1190 [ 686.124537] ? __lockdep_init_map+0x100/0x5a0 [ 686.129040] mount_fs+0xa3/0x310 [ 686.132415] vfs_kern_mount.part.0+0x68/0x470 [ 686.136920] ? kfree+0x110/0x210 [ 686.137597] (syz-executor.1,23438,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 686.140293] vfs_kern_mount+0x3c/0x60 [ 686.140311] btrfs_mount+0x23a/0xaa0 [ 686.140328] ? btrfs_show_options+0xfd0/0xfd0 [ 686.140341] ? __mutex_unlock_slowpath+0xea/0x610 [ 686.140362] ? check_preemption_disabled+0x41/0x280 [ 686.140385] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 686.140400] ? pcpu_alloc+0xc9/0x1190 [ 686.140417] ? __lockdep_init_map+0x100/0x5a0 [ 686.140434] mount_fs+0xa3/0x310 [ 686.140453] vfs_kern_mount.part.0+0x68/0x470 [ 686.140472] do_mount+0x115c/0x2f50 [ 686.140490] ? cmp_ex_sort+0xc0/0xc0 [ 686.140507] ? __do_page_fault+0x180/0xd60 [ 686.140523] ? copy_mount_string+0x40/0x40 [ 686.140546] ? memset+0x20/0x40 [ 686.140561] ? copy_mount_options+0x26f/0x380 [ 686.140579] ksys_mount+0xcf/0x130 [ 686.140596] __x64_sys_mount+0xba/0x150 [ 686.203634] (syz-executor.0,23447,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 686.203634] " or missing value [ 686.207017] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 686.207034] do_syscall_64+0xf9/0x620 [ 686.207055] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 686.207068] RIP: 0033:0x7f85e029463a [ 686.207083] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 686.207091] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 686.207103] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 686.207116] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 686.256986] (syz-executor.0,23447,1):ocfs2_fill_super:1225 ERROR: status = -22 [ 686.271027] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 686.271035] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 10:32:39 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x133, 0x0, 0x0) [ 686.271042] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 10:32:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000ffffff8c00000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:39 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EM\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 686.350944] BTRFS warning (device ): duplicate device /dev/loop2 devid 0 generation 0 scanned by syz-executor.2 (23429) 10:32:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) (fail_nth: 64) 10:32:39 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x134, 0x0, 0x0) 10:32:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000700000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:39 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x400000000000000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 686.529052] (syz-executor.1,23465,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 686.529052] " or missing value [ 686.567995] (syz-executor.1,23465,1):ocfs2_fill_super:1225 ERROR: status = -22 10:32:39 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EN\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:32:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000ffffff9700000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[]) 10:32:39 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x135, 0x0, 0x0) [ 686.658387] FAULT_INJECTION: forcing a failure. [ 686.658387] name failslab, interval 1, probability 0, space 0, times 0 [ 686.705042] (syz-executor.1,23489,1):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 686.705042] " or missing value [ 686.714621] (syz-executor.0,23487,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "cpu &6 [ 686.714621] " or missing value [ 686.723528] CPU: 1 PID: 23479 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 686.738335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 686.747691] Call Trace: [ 686.750303] dump_stack+0x1fc/0x2ef [ 686.753949] should_fail.cold+0xa/0xf [ 686.757763] ? setup_fault_attr+0x200/0x200 [ 686.762097] ? lock_acquire+0x170/0x3c0 [ 686.766090] __should_failslab+0x115/0x180 [ 686.770339] should_failslab+0x5/0x10 [ 686.774149] kmem_cache_alloc_trace+0x284/0x380 [ 686.778753] (syz-executor.0,23487,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 686.778827] btrfs_alloc_device+0xae/0x670 [ 686.778843] ? btrfs_finish_sprout+0x6c0/0x6c0 [ 686.778861] ? blkdev_put+0x85/0x520 [ 686.786646] (syz-executor.1,23489,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 686.790433] close_fs_devices.part.0+0x263/0x8e0 [ 686.790458] btrfs_close_devices+0x95/0x1f0 [ 686.790477] btrfs_mount_root+0x10b9/0x1830 [ 686.790501] ? btrfs_decode_error+0x70/0x70 [ 686.790516] ? __mutex_unlock_slowpath+0xea/0x610 [ 686.790537] ? check_preemption_disabled+0x41/0x280 [ 686.790556] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 686.790573] ? pcpu_alloc+0xc9/0x1190 [ 686.842962] ? __lockdep_init_map+0x100/0x5a0 [ 686.842979] mount_fs+0xa3/0x310 [ 686.842999] vfs_kern_mount.part.0+0x68/0x470 [ 686.843011] ? kfree+0x110/0x210 [ 686.843027] vfs_kern_mount+0x3c/0x60 [ 686.843047] btrfs_mount+0x23a/0xaa0 [ 686.843064] ? btrfs_show_options+0xfd0/0xfd0 [ 686.843079] ? __mutex_unlock_slowpath+0xea/0x610 [ 686.843096] ? check_preemption_disabled+0x41/0x280 [ 686.843116] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 686.843128] ? pcpu_alloc+0xc9/0x1190 [ 686.843143] ? __lockdep_init_map+0x100/0x5a0 [ 686.843159] mount_fs+0xa3/0x310 [ 686.843177] vfs_kern_mount.part.0+0x68/0x470 10:32:39 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3, 0x500000000000000}, {0x0}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 686.843196] do_mount+0x115c/0x2f50 [ 686.843212] ? cmp_ex_sort+0xc0/0xc0 [ 686.843229] ? __do_page_fault+0x180/0xd60 [ 686.843244] ? copy_mount_string+0x40/0x40 [ 686.843264] ? memset+0x20/0x40 [ 686.843279] ? copy_mount_options+0x26f/0x380 [ 686.843296] ksys_mount+0xcf/0x130 [ 686.843313] __x64_sys_mount+0xba/0x150 [ 686.843328] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 686.843341] do_syscall_64+0xf9/0x620 [ 686.843358] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 686.843369] RIP: 0033:0x7f85e029463a [ 686.843382] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 686.843389] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 686.843402] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 686.843410] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 686.843417] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 686.843424] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 686.843432] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 [ 686.849425] ------------[ cut here ]------------ [ 686.910150] ieee802154 phy0 wpan0: encryption failed: -22 [ 686.911014] kernel BUG at fs/btrfs/volumes.c:1061! [ 686.915362] ieee802154 phy1 wpan1: encryption failed: -22 [ 686.931268] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 687.041088] CPU: 0 PID: 23479 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 687.041100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 687.058329] RIP: 0010:close_fs_devices.part.0+0x6b0/0x8e0 [ 687.063867] Code: 03 0f 8e 27 01 00 00 48 8b 44 24 20 c7 80 10 01 00 00 00 00 00 00 48 83 c4 48 5b 5d 41 5c 41 5d 41 5e 41 5f c3 e8 70 ad 71 fe <0f> 0b e8 69 ad 71 fe 0f 0b e8 22 8d a7 fe e9 17 fd ff ff 48 8b 7c [ 687.082770] RSP: 0018:ffff888057c6f838 EFLAGS: 00010246 [ 687.088137] RAX: 0000000000040000 RBX: 0000000000000001 RCX: ffffc9000631b000 [ 687.095407] RDX: 0000000000040000 RSI: ffffffff82f0d800 RDI: 0000000000000007 [ 687.102676] RBP: ffff8880b1b93780 R08: 0000000000000000 R09: fffffffffffff000 [ 687.109947] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 687.117221] R13: fffffffffffffff4 R14: dffffc0000000000 R15: ffff8880ae666040 [ 687.124491] FS: 00007f85dec08700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 687.132722] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 687.138601] CR2: 0000555557134888 CR3: 00000000ae447000 CR4: 00000000003406f0 [ 687.145874] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 687.153154] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 687.160419] Call Trace: [ 687.163026] btrfs_close_devices+0x95/0x1f0 [ 687.167358] btrfs_mount_root+0x10b9/0x1830 [ 687.171692] ? btrfs_decode_error+0x70/0x70 [ 687.176023] ? __mutex_unlock_slowpath+0xea/0x610 [ 687.180872] ? check_preemption_disabled+0x41/0x280 [ 687.185891] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 687.190897] ? pcpu_alloc+0xc9/0x1190 [ 687.194685] ? __lockdep_init_map+0x100/0x5a0 [ 687.199168] mount_fs+0xa3/0x310 [ 687.202523] vfs_kern_mount.part.0+0x68/0x470 [ 687.207007] ? kfree+0x110/0x210 [ 687.210359] vfs_kern_mount+0x3c/0x60 [ 687.214146] btrfs_mount+0x23a/0xaa0 [ 687.217848] ? btrfs_show_options+0xfd0/0xfd0 [ 687.222328] ? __mutex_unlock_slowpath+0xea/0x610 [ 687.227160] ? check_preemption_disabled+0x41/0x280 [ 687.232168] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 687.237168] ? pcpu_alloc+0xc9/0x1190 [ 687.240952] ? __lockdep_init_map+0x100/0x5a0 [ 687.245436] mount_fs+0xa3/0x310 [ 687.248881] vfs_kern_mount.part.0+0x68/0x470 [ 687.253449] do_mount+0x115c/0x2f50 [ 687.257066] ? cmp_ex_sort+0xc0/0xc0 [ 687.260775] ? __do_page_fault+0x180/0xd60 [ 687.265011] ? copy_mount_string+0x40/0x40 [ 687.269240] ? memset+0x20/0x40 [ 687.272513] ? copy_mount_options+0x26f/0x380 [ 687.277001] ksys_mount+0xcf/0x130 [ 687.280531] __x64_sys_mount+0xba/0x150 [ 687.284496] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 687.289065] do_syscall_64+0xf9/0x620 [ 687.292853] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 687.298026] RIP: 0033:0x7f85e029463a [ 687.301724] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 687.320698] RSP: 002b:00007f85dec07f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 687.328396] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f85e029463a [ 687.335653] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85dec07fe0 [ 687.342919] RBP: 00007f85dec08020 R08: 00007f85dec08020 R09: 0000000020000000 [ 687.350173] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 10:32:40 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x136, 0x0, 0x0) 10:32:40 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = gettid() syz_mount_image$ocfs2(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000280)='a?,', 0x3}, {&(0x7f00000002c0)="48e672b52087a993c76437f1862f8fbdfe889a3a6296bb94e70781a6e6c85e2905de8703b41deffb6eea437e269124db8ed7d20f2e874c705e", 0x39}], 0x400, &(0x7f0000000600)={[{'cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EO\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c'}]}) read(0xffffffffffffffff, &(0x7f0000000740)=""/212, 0xd4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) [ 687.357453] R13: 0000000020000100 R14: 00007f85dec07fe0 R15: 0000000020000740 [ 687.364715] Modules linked in: [ 687.393519] ---[ end trace ecadb40d5a903e41 ]--- 10:32:40 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x137, 0x0, 0x0) [ 687.408394] RIP: 0010:close_fs_devices.part.0+0x6b0/0x8e0 [ 687.415294] Code: 03 0f 8e 27 01 00 00 48 8b 44 24 20 c7 80 10 01 00 00 00 00 00 00 48 83 c4 48 5b 5d 41 5c 41 5d 41 5e 41 5f c3 e8 70 ad 71 fe <0f> 0b e8 69 ad 71 fe 0f 0b e8 22 8d a7 fe e9 17 fd ff ff 48 8b 7c [ 687.438990] RSP: 0018:ffff888057c6f838 EFLAGS: 00010246 [ 687.444364] RAX: 0000000000040000 RBX: 0000000000000001 RCX: ffffc9000631b000 [ 687.452276] RDX: 0000000000040000 RSI: ffffffff82f0d800 RDI: 0000000000000007 [ 687.460197] RBP: ffff8880b1b93780 R08: 0000000000000000 R09: fffffffffffff000 [ 687.467474] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 687.475011] R13: fffffffffffffff4 R14: dffffc0000000000 R15: ffff8880ae666040 [ 687.482340] FS: 00007f85dec08700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 687.490606] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 687.496488] CR2: 00007ffcbe46dbb8 CR3: 00000000ae447000 CR4: 00000000003406f0 [ 687.503917] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 687.511361] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 687.520975] Kernel panic - not syncing: Fatal exception [ 687.526524] Kernel Offset: disabled [ 687.530142] Rebooting in 86400 seconds..