0x217, 0x3, 0x9, 0x40, 0x0, 0x3ff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x9, 0x1, 0x0, 0x36, 0x0, 0x33631d0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x7e0000003}, 0x0, 0x100000000, 0x8000, 0x0, 0x2, 0xfffffff9, 0xff81}, r0, 0x1, r2, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x98, 0x4, 0x0, 0x81, 0x0, 0x800, 0x0, 0xa, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x10040, 0x7e, 0x9, 0x4, 0xff, 0xffffff9b, 0x7f66}, r0, 0x9, 0xffffffffffffffff, 0x1) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcsu\x00', 0x4400, 0x0) perf_event_open(0x0, r0, 0x2, 0xffffffffffffffff, 0x9) setxattr$trusted_overlay_opaque(0x0, &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) mount$overlay(0x0, &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='overlay\x00', 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB='workdir=./fime0,lowerdir=./file0/file0,dont_hash,obj_role=ext4\x00,context=system_u,measure,fscontext=unconfined_u,\x00']) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xffffff7f}, 0x0) 23:08:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x11}, 0x0) [ 544.018590][T16384] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:07 executing program 2: chdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) r1 = perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x43, 0xcc, 0x0, 0x0, 0x99c, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10001}, 0x9020, 0x217, 0x3, 0x9, 0x40}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x9, 0x1, 0x0, 0x0, 0x0, 0x33631d0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x7e0000003}, 0x0, 0x100000000, 0x0, 0x0, 0x2, 0xfffffff9, 0xff81}, r0, 0x1, r1, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x4, 0x0, 0x81, 0x0, 0x800, 0x0, 0xa, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x10040, 0x7e, 0x9, 0x4, 0xff, 0xffffff9b, 0x7f66}, r0, 0x9, 0xffffffffffffffff, 0x1) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcsu\x00', 0x4400, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x1, 0x7, 0x20, 0x0, 0x0, 0x0, 0x280, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x401, 0x8001}, 0x10008, 0x3, 0x7, 0x6, 0x9, 0x0, 0x7}, r0, 0x0, 0xffffffffffffffff, 0x9) setxattr$trusted_overlay_opaque(0x0, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) mount$overlay(0x0, 0x0, &(0x7f0000000300)='overlay\x00', 0x1, &(0x7f0000000340)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0/file0'}}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@xino_on='xino=on'}, {@nfs_export_off='nfs_export=off'}], [{@dont_hash='dont_hash'}, {@obj_role={'obj_role', 0x3d, 'ext4\x00'}}, {@context={'context', 0x3d, 'system_u'}}, {@measure='measure'}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) r2 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="400000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="000000000000b803008a12800b000100677265746170000004000280f8ff00000180c200000064e1"], 0x40}}, 0x0) ftruncate(r3, 0x3) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700000000ffffc0fe00000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:07 executing program 3: chdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r2 = perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x43, 0xcc, 0x0, 0x0, 0x99c, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10001}, 0x9020, 0x217, 0x3, 0x9, 0x40, 0x0, 0x3ff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x9, 0x1, 0x0, 0x36, 0x0, 0x33631d0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x7e0000003}, 0x0, 0x100000000, 0x8000, 0x0, 0x2, 0xfffffff9, 0xff81}, r0, 0x1, r2, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x98, 0x4, 0x0, 0x81, 0x0, 0x800, 0x0, 0xa, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x10040, 0x7e, 0x9, 0x4, 0xff, 0xffffff9b, 0x7f66}, r0, 0x9, 0xffffffffffffffff, 0x1) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcsu\x00', 0x4400, 0x0) perf_event_open(0x0, r0, 0x2, 0xffffffffffffffff, 0x9) setxattr$trusted_overlay_opaque(0x0, &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) mount$overlay(0x0, &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='overlay\x00', 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB='workdir=./fime0,lowerdir=./file0/file0,dont_hash,obj_role=ext4\x00,context=system_u,measure,fscontext=unconfined_u,\x00']) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x12}, 0x0) [ 544.130609][T16393] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:07 executing program 2: chdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) r1 = perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x43, 0xcc, 0x0, 0x0, 0x99c, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10001}, 0x9020, 0x217, 0x3, 0x9, 0x40}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x9, 0x1, 0x0, 0x0, 0x0, 0x33631d0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x7e0000003}, 0x0, 0x100000000, 0x0, 0x0, 0x2, 0xfffffff9, 0xff81}, r0, 0x1, r1, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x4, 0x0, 0x81, 0x0, 0x800, 0x0, 0xa, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x10040, 0x7e, 0x9, 0x4, 0xff, 0xffffff9b, 0x7f66}, r0, 0x9, 0xffffffffffffffff, 0x1) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcsu\x00', 0x4400, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x1, 0x7, 0x20, 0x0, 0x0, 0x0, 0x280, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x401, 0x8001}, 0x10008, 0x3, 0x7, 0x6, 0x9, 0x0, 0x7}, r0, 0x0, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) mount$overlay(0x0, &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='overlay\x00', 0x1, &(0x7f0000000340)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0/file0'}}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@xino_on='xino=on'}, {@nfs_export_off='nfs_export=off'}], [{@dont_hash='dont_hash'}, {@obj_role={'obj_role', 0x3d, 'ext4\x00'}}, {@context={'context', 0x3d, 'system_u'}}, {@measure='measure'}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) r2 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="400000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="000000000000b803008a12800b000100677265746170000004000280f8ff00000180c200000064e1"], 0x40}}, 0x0) ftruncate(r3, 0x3) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xffffff81}, 0x0) 23:08:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 544.294216][T16411] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000000000000fffe00000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:07 executing program 2: chdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) r1 = perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x43, 0xcc, 0x0, 0x0, 0x99c, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10001}, 0x9020, 0x217, 0x3, 0x9, 0x40}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x9, 0x1, 0x0, 0x0, 0x0, 0x33631d0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x7e0000003}, 0x0, 0x100000000, 0x0, 0x0, 0x2, 0xfffffff9, 0xff81}, r0, 0x1, r1, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x4, 0x0, 0x81, 0x0, 0x800, 0x0, 0xa, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x10040, 0x7e, 0x9, 0x4, 0xff, 0xffffff9b, 0x7f66}, r0, 0x9, 0xffffffffffffffff, 0x1) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcsu\x00', 0x4400, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x1, 0x7, 0x20, 0x0, 0x0, 0x0, 0x280, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x401, 0x8001}, 0x10008, 0x3, 0x7, 0x6, 0x9, 0x0, 0x7}, r0, 0x0, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) mount$overlay(0x0, &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='overlay\x00', 0x1, &(0x7f0000000340)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0/file0'}}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@xino_on='xino=on'}, {@nfs_export_off='nfs_export=off'}], [{@dont_hash='dont_hash'}, {@obj_role={'obj_role', 0x3d, 'ext4\x00'}}, {@context={'context', 0x3d, 'system_u'}}, {@measure='measure'}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) r2 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="400000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="000000000000b803008a12800b000100677265746170000004000280f8ff00000180c200000064e1"], 0x40}}, 0x0) ftruncate(r3, 0x3) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:07 executing program 3: chdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r2 = perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x43, 0xcc, 0x0, 0x0, 0x99c, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10001}, 0x9020, 0x217, 0x3, 0x9, 0x40, 0x0, 0x3ff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x9, 0x1, 0x0, 0x36, 0x0, 0x33631d0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x7e0000003}, 0x0, 0x100000000, 0x8000, 0x0, 0x2, 0xfffffff9, 0xff81}, r0, 0x1, r2, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x98, 0x4, 0x0, 0x81, 0x0, 0x800, 0x0, 0xa, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x10040, 0x7e, 0x9, 0x4, 0xff, 0xffffff9b, 0x7f66}, r0, 0x9, 0xffffffffffffffff, 0x1) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcsu\x00', 0x4400, 0x0) perf_event_open(0x0, r0, 0x2, 0xffffffffffffffff, 0x9) setxattr$trusted_overlay_opaque(0x0, &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) mount$overlay(0x0, &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='overlay\x00', 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB='workdir=./fime0,lowerdir=./file0/file0,dont_hash,obj_role=ext4\x00,context=system_u,measure,fscontext=unconfined_u,\x00']) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x1b}, 0x0) 23:08:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xffffff9e}, 0x0) 23:08:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 544.422955][T16428] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:07 executing program 3: chdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r2 = perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x43, 0xcc, 0x0, 0x0, 0x99c, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10001}, 0x9020, 0x217, 0x3, 0x9, 0x40, 0x0, 0x3ff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x9, 0x1, 0x0, 0x36, 0x0, 0x33631d0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x7e0000003}, 0x0, 0x100000000, 0x8000, 0x0, 0x2, 0xfffffff9, 0xff81}, r0, 0x1, r2, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x98, 0x4, 0x0, 0x81, 0x0, 0x800, 0x0, 0xa, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x10040, 0x7e, 0x9, 0x4, 0xff, 0xffffff9b, 0x7f66}, r0, 0x9, 0xffffffffffffffff, 0x1) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcsu\x00', 0x4400, 0x0) perf_event_open(0x0, r0, 0x2, 0xffffffffffffffff, 0x9) setxattr$trusted_overlay_opaque(0x0, &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) mount$overlay(0x0, &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='overlay\x00', 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB='workdir=./fime0,lowerdir=./file0/file0,dont_hash,obj_role=ext4\x00,context=system_u,measure,fscontext=unconfined_u,\x00']) close(0xffffffffffffffff) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0xa100, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}}, 0x0) 23:08:07 executing program 3: chdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r2 = perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x43, 0xcc, 0x0, 0x0, 0x99c, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10001}, 0x9020, 0x217, 0x3, 0x9, 0x40, 0x0, 0x3ff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x9, 0x1, 0x0, 0x36, 0x0, 0x33631d0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x7e0000003}, 0x0, 0x100000000, 0x8000, 0x0, 0x2, 0xfffffff9, 0xff81}, r0, 0x1, r2, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x98, 0x4, 0x0, 0x81, 0x0, 0x800, 0x0, 0xa, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x10040, 0x7e, 0x9, 0x4, 0xff, 0xffffff9b, 0x7f66}, r0, 0x9, 0xffffffffffffffff, 0x1) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcsu\x00', 0x4400, 0x0) perf_event_open(0x0, r0, 0x2, 0xffffffffffffffff, 0x9) setxattr$trusted_overlay_opaque(0x0, &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) mount$overlay(0x0, &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='overlay\x00', 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB='workdir=./fime0,lowerdir=./file0/file0,dont_hash,obj_role=ext4\x00,context=system_u,measure,fscontext=unconfined_u,\x00']) close(0xffffffffffffffff) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 544.512910][T16449] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x25}, 0x0) 23:08:07 executing program 3: chdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r2 = perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x43, 0xcc, 0x0, 0x0, 0x99c, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10001}, 0x9020, 0x217, 0x3, 0x9, 0x40, 0x0, 0x3ff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x9, 0x1, 0x0, 0x36, 0x0, 0x33631d0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x7e0000003}, 0x0, 0x100000000, 0x8000, 0x0, 0x2, 0xfffffff9, 0xff81}, r0, 0x1, r2, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x98, 0x4, 0x0, 0x81, 0x0, 0x800, 0x0, 0xa, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x10040, 0x7e, 0x9, 0x4, 0xff, 0xffffff9b, 0x7f66}, r0, 0x9, 0xffffffffffffffff, 0x1) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcsu\x00', 0x4400, 0x0) perf_event_open(0x0, r0, 0x2, 0xffffffffffffffff, 0x9) setxattr$trusted_overlay_opaque(0x0, &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) mount$overlay(0x0, &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='overlay\x00', 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB='workdir=./fime0,lowerdir=./file0/file0,dont_hash,obj_role=ext4\x00,context=system_u,measure,fscontext=unconfined_u,\x00']) close(0xffffffffffffffff) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700000000fffffffe00000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 544.640637][T16456] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:07 executing program 3: chdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r2 = perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x43, 0xcc, 0x0, 0x0, 0x99c, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10001}, 0x9020, 0x217, 0x3, 0x9, 0x40, 0x0, 0x3ff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x9, 0x1, 0x0, 0x36, 0x0, 0x33631d0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x7e0000003}, 0x0, 0x100000000, 0x8000, 0x0, 0x2, 0xfffffff9, 0xff81}, r0, 0x1, r2, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x98, 0x4, 0x0, 0x81, 0x0, 0x800, 0x0, 0xa, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x10040, 0x7e, 0x9, 0x4, 0xff, 0xffffff9b, 0x7f66}, r0, 0x9, 0xffffffffffffffff, 0x1) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcsu\x00', 0x4400, 0x0) perf_event_open(0x0, r0, 0x2, 0xffffffffffffffff, 0x9) setxattr$trusted_overlay_opaque(0x0, &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r3) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xffffffe0}, 0x0) 23:08:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:07 executing program 2: chdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) r1 = perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x43, 0xcc, 0x0, 0x0, 0x99c, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10001}, 0x9020, 0x217, 0x3, 0x9, 0x40}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x9, 0x1, 0x0, 0x0, 0x0, 0x33631d0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x7e0000003}, 0x0, 0x100000000, 0x0, 0x0, 0x2, 0xfffffff9, 0xff81}, r0, 0x1, r1, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x4, 0x0, 0x81, 0x0, 0x800, 0x0, 0xa, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x10040, 0x7e, 0x9, 0x4, 0xff, 0xffffff9b, 0x7f66}, r0, 0x9, 0xffffffffffffffff, 0x1) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcsu\x00', 0x4400, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x1, 0x7, 0x20, 0x0, 0x0, 0x0, 0x280, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x0, 0x8001}, 0x10008, 0x3, 0x7, 0x6, 0x9, 0x2, 0x7}, r0, 0x2, r2, 0x9) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) mount$overlay(0x0, &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='overlay\x00', 0x1, &(0x7f0000000340)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0/file0'}}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@xino_on='xino=on'}, {@nfs_export_off='nfs_export=off'}], [{@dont_hash='dont_hash'}, {@obj_role={'obj_role', 0x3d, 'ext4\x00'}}, {@context={'context', 0x3d, 'system_u'}}, {@measure='measure'}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) r3 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r3) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="400000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="000000000000b803008a12800b000100677265746170000004000280f8ff00000180c200000064e1"], 0x40}}, 0x0) ftruncate(r4, 0x3) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:07 executing program 3: chdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r2 = perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x43, 0xcc, 0x0, 0x0, 0x99c, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10001}, 0x9020, 0x217, 0x3, 0x9, 0x40, 0x0, 0x3ff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x9, 0x1, 0x0, 0x36, 0x0, 0x33631d0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x7e0000003}, 0x0, 0x100000000, 0x8000, 0x0, 0x2, 0xfffffff9, 0xff81}, r0, 0x1, r2, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x98, 0x4, 0x0, 0x81, 0x0, 0x800, 0x0, 0xa, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x10040, 0x7e, 0x9, 0x4, 0xff, 0xffffff9b, 0x7f66}, r0, 0x9, 0xffffffffffffffff, 0x1) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcsu\x00', 0x4400, 0x0) perf_event_open(0x0, r0, 0x2, 0xffffffffffffffff, 0x9) r3 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r3) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x2a}, 0x0) 23:08:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f00000000000000020000000200002e008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:08 executing program 2 (fault-call:3 fault-nth:0): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 544.789266][T16483] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xffffffea}, 0x0) 23:08:08 executing program 3: chdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r2 = perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x43, 0xcc, 0x0, 0x0, 0x99c, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10001}, 0x9020, 0x217, 0x3, 0x9, 0x40, 0x0, 0x3ff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x9, 0x1, 0x0, 0x36, 0x0, 0x33631d0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x7e0000003}, 0x0, 0x100000000, 0x8000, 0x0, 0x2, 0xfffffff9, 0xff81}, r0, 0x1, r2, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x98, 0x4, 0x0, 0x81, 0x0, 0x800, 0x0, 0xa, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x10040, 0x7e, 0x9, 0x4, 0xff, 0xffffff9b, 0x7f66}, r0, 0x9, 0xffffffffffffffff, 0x1) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcsu\x00', 0x4400, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r3) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700000000000000ff00000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xffffffef}, 0x0) 23:08:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x2f}, 0x0) [ 544.953728][T16509] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 544.960332][T16500] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 544.977951][T16509] FAULT_INJECTION: forcing a failure. [ 544.977951][T16509] name failslab, interval 1, probability 0, space 0, times 0 [ 545.013336][T16509] CPU: 0 PID: 16509 Comm: syz-executor.2 Not tainted 5.4.105-syzkaller-00495-g11abbf486c2e #0 [ 545.024035][T16509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.034201][T16509] Call Trace: [ 545.037478][T16509] dump_stack+0x1d8/0x24e [ 545.041972][T16509] ? devkmsg_release+0x11c/0x11c [ 545.047159][T16509] ? show_regs_print_info+0x12/0x12 [ 545.052513][T16509] ? proc_fail_nth_write+0x1d5/0x240 [ 545.057787][T16509] should_fail+0x6f6/0x860 [ 545.062195][T16509] ? setup_fault_attr+0x3d0/0x3d0 [ 545.067339][T16509] ? memset+0x1f/0x40 [ 545.071848][T16509] ? getname_flags+0xba/0x640 [ 545.076521][T16509] should_failslab+0x5/0x20 [ 545.081028][T16509] kmem_cache_alloc+0x36/0x290 [ 545.085866][T16509] getname_flags+0xba/0x640 [ 545.090633][T16509] user_path_mountpoint_at+0x22/0x40 [ 545.095991][T16509] ksys_umount+0x162/0xfa0 [ 545.100391][T16509] ? vfs_write+0x422/0x4e0 [ 545.104822][T16509] ? fput_many+0x42/0x1a0 [ 545.109497][T16509] ? check_preemption_disabled+0x154/0x330 [ 545.115404][T16509] ? namespace_unlock+0x4f0/0x4f0 [ 545.120424][T16509] ? __ia32_sys_read+0x80/0x80 [ 545.125458][T16509] __x64_sys_umount+0x56/0x60 [ 545.130126][T16509] do_syscall_64+0xcb/0x1e0 [ 545.134646][T16509] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 545.140520][T16509] RIP: 0033:0x465f69 23:08:08 executing program 2 (fault-call:3 fault-nth:1): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:08 executing program 3: chdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r2 = perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x43, 0xcc, 0x0, 0x0, 0x99c, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10001}, 0x9020, 0x217, 0x3, 0x9, 0x40, 0x0, 0x3ff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x9, 0x1, 0x0, 0x36, 0x0, 0x33631d0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x7e0000003}, 0x0, 0x100000000, 0x8000, 0x0, 0x2, 0xfffffff9, 0xff81}, r0, 0x1, r2, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x98, 0x4, 0x0, 0x81, 0x0, 0x800, 0x0, 0xa, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x10040, 0x7e, 0x9, 0x4, 0xff, 0xffffff9b, 0x7f66}, r0, 0x9, 0xffffffffffffffff, 0x1) r3 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r3) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 545.144393][T16509] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 545.164584][T16509] RSP: 002b:00007fc94b99f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 545.173264][T16509] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465f69 [ 545.181382][T16509] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 545.189531][T16509] RBP: 00007fc94b99f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 545.197553][T16509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 545.205626][T16509] R13: 00007ffdbc922a5f R14: 00007fc94b99f300 R15: 0000000000022000 23:08:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xfffffff0}, 0x0) 23:08:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x3a}, 0x0) 23:08:08 executing program 3: chdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r2 = perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x43, 0xcc, 0x0, 0x0, 0x99c, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10001}, 0x9020, 0x217, 0x3, 0x9, 0x40, 0x0, 0x3ff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x9, 0x1, 0x0, 0x36, 0x0, 0x33631d0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x7e0000003}, 0x0, 0x100000000, 0x8000, 0x0, 0x2, 0xfffffff9, 0xff81}, r0, 0x1, r2, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r3) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 545.322410][T16533] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 545.367230][T16539] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 545.381209][T16533] FAULT_INJECTION: forcing a failure. [ 545.381209][T16533] name failslab, interval 1, probability 0, space 0, times 0 [ 545.396692][T16533] CPU: 1 PID: 16533 Comm: syz-executor.2 Not tainted 5.4.105-syzkaller-00495-g11abbf486c2e #0 [ 545.407296][T16533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.417333][T16533] Call Trace: [ 545.420620][T16533] dump_stack+0x1d8/0x24e [ 545.425022][T16533] ? devkmsg_release+0x11c/0x11c [ 545.430119][T16533] ? check_preemption_disabled+0x9e/0x330 [ 545.436019][T16533] ? show_regs_print_info+0x12/0x12 [ 545.441324][T16533] ? __perf_event_task_sched_in+0x57c/0x5e0 [ 545.447618][T16533] should_fail+0x6f6/0x860 [ 545.452170][T16533] ? setup_fault_attr+0x3d0/0x3d0 [ 545.457208][T16533] ? mempool_alloc_slab+0x16/0x20 [ 545.462783][T16533] should_failslab+0x5/0x20 [ 545.467519][T16533] kmem_cache_alloc+0x36/0x290 [ 545.472363][T16533] ? mempool_free+0x380/0x380 [ 545.477164][T16533] mempool_alloc_slab+0x16/0x20 [ 545.482250][T16533] mempool_alloc+0x113/0x680 [ 545.486831][T16533] ? _raw_spin_lock_irq+0xa4/0x1b0 [ 545.492020][T16533] ? check_preemption_disabled+0x9e/0x330 [ 545.497844][T16533] ? mempool_resize+0x900/0x900 [ 545.502764][T16533] bio_alloc_bioset+0x1db/0x640 [ 545.507597][T16533] ? dquot_writeback_dquots+0xb63/0xc40 [ 545.513117][T16533] ? bio_chain_endio+0xf0/0xf0 [ 545.517857][T16533] ? dqput+0x770/0x770 [ 545.522003][T16533] blkdev_issue_flush+0xc6/0x300 [ 545.527270][T16533] ext4_sync_fs+0x3ed/0x620 [ 545.532047][T16533] ? filemap_fdatawrite_range+0x390/0x390 [ 545.538228][T16533] ? ext4_put_super+0xbf0/0xbf0 [ 545.543310][T16533] ? get_nr_dirty_inodes+0x23b/0x2a0 [ 545.548807][T16533] ? ext4_put_super+0xbf0/0xbf0 [ 545.553644][T16533] sync_filesystem+0x19e/0x200 [ 545.558498][T16533] generic_shutdown_super+0x6b/0x2a0 [ 545.563780][T16533] kill_block_super+0x79/0xd0 [ 545.568626][T16533] deactivate_locked_super+0xaf/0x100 [ 545.574183][T16533] deactivate_super+0x1b3/0x270 [ 545.579015][T16533] ? deactivate_locked_super+0x100/0x100 [ 545.585036][T16533] ? dput+0x4de/0x5d0 [ 545.589011][T16533] ? _raw_spin_lock_irqsave+0x210/0x210 [ 545.594805][T16533] ? find_next_bit+0xc6/0x110 [ 545.599506][T16533] cleanup_mnt+0x432/0x4e0 [ 545.604154][T16533] ? __ia32_sys_read+0x80/0x80 [ 545.609122][T16533] task_work_run+0x186/0x1b0 [ 545.613697][T16533] prepare_exit_to_usermode+0x2b0/0x310 [ 545.619662][T16533] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 545.625629][T16533] RIP: 0033:0x465f69 [ 545.629636][T16533] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 545.649348][T16533] RSP: 002b:00007fc94b99f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 545.659215][T16533] RAX: 0000000000000000 RBX: 000000000056bf60 RCX: 0000000000465f69 23:08:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f000000000000000200000002000040008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000081404000001007d60b7030000000000006a0a00fe00000000850000001f000000b70000000000000095000000000000006623848adf1dab62931d861531fddf0180000071ff31f1622271d5518193e09483c5a020c3aa305d73869de3b1c7937c34f8c76334d9ce8205b01ddaa54d8756568836077b8471b6b69819782748b376358c0dc6d6c6317189b4c00733dc33c9753bfd989b1ca58949a54d5827df14feecea46a5c53e9c37251732f1061b973ef07bf7f53ce129a9ecd3b4dd15100ff2452f98526a0d8cacdaff79b4c5008652a7b4c0974486a8d203bddc62bb2d555a363adbc33b49e13fbd1757b2701acad0e2684120b99b8cff3f48c9411670c34faf7851b290feb3045aef0d6c169e33b870d1ff4a4d371b622f20c41d8418bc4159c14025422835e81c3573ae77dbae047913474be30000b5a981ff0000749289b44e97dba73f148ae8206afe120c1437492ac52903971b323f60332eb7ab5124d18e4eb69122b42f2173184c1d0fb3287c99b645f6e80e14e5d7c917c6695ebe4d94a85551714768383f465992c8862f66fa2a4a8ae4b4c84d9bee16a171ec36baddad3ec959de7bca54feea9adda9c99781750cf37cfc79d27f06843440f975fcb687bbc51cb98984670f194fb6a9dd457005444fdd23287a36c2e7b5f4f08cce000200000a502505f9db90ebf4efd5368425b1306e3d1cfd06963b1860049064703c47c184e9e7167874e765b1c3062e6c0000000000b400000000000000000000000000001b7f96b53b4e869c5b69dc0b3b334e34913ba4ea36dba4cfa318ee9d23378ffc32e52b86e625442f32f084e1f591fd08328f3f1853e8d4c7bbfbe6b5a0bde94d200ca1e721f9f26870deb8ed7bd52f2bf66fe4a8402fe388f4850cb454653d0e22be9af12f58d1ede97da8efcf8e060b0a0067782bd85b2b9168f1afffcaf0084e171c8befc0a8d9b7370c395189d388d63d318b1832b4fdbdba62d5380ec243d8619c76b38fdd112a2b7d73e3f13f9aba97fbaf99c64777be8311750e2985aca5c3f04fba58a9c2047a3e663046df9a3751506c054d666d84"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="48000000100005070000000000000fff00000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xfffffffe}, 0x0) 23:08:08 executing program 2 (fault-call:3 fault-nth:2): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 545.667501][T16533] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 545.675605][T16533] RBP: 00007fc94b99f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 545.684069][T16533] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 545.692588][T16533] R13: 00007ffdbc922a5f R14: 00007fc94b99f300 R15: 0000000000022000 23:08:08 executing program 3: chdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r2 = perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x43, 0xcc, 0x0, 0x0, 0x99c, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10001}, 0x9020, 0x217, 0x3, 0x9, 0x40, 0x0, 0x3ff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x9, 0x1, 0x0, 0x36, 0x0, 0x33631d0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x7e0000003}, 0x0, 0x100000000, 0x8000, 0x0, 0x2, 0xfffffff9, 0xff81}, r0, 0x1, r2, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r3) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x48}, 0x0) 23:08:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f000000000000000200000002000244008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 545.813561][T16556] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 545.831267][T16560] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 545.866179][T16560] FAULT_INJECTION: forcing a failure. [ 545.866179][T16560] name failslab, interval 1, probability 0, space 0, times 0 [ 545.882996][T16560] CPU: 0 PID: 16560 Comm: syz-executor.2 Not tainted 5.4.105-syzkaller-00495-g11abbf486c2e #0 [ 545.893980][T16560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.904644][T16560] Call Trace: [ 545.908111][T16560] dump_stack+0x1d8/0x24e [ 545.912540][T16560] ? devkmsg_release+0x11c/0x11c [ 545.917487][T16560] ? memset+0x1f/0x40 [ 545.921482][T16560] ? show_regs_print_info+0x12/0x12 [ 545.926676][T16560] ? truncate_inode_pages_range+0x13d2/0x1590 [ 545.932748][T16560] ? check_preemption_disabled+0x154/0x330 [ 545.938567][T16560] should_fail+0x6f6/0x860 [ 545.943010][T16560] ? setup_fault_attr+0x3d0/0x3d0 [ 545.948315][T16560] ? mempool_alloc_slab+0x16/0x20 [ 545.953344][T16560] should_failslab+0x5/0x20 [ 545.957824][T16560] kmem_cache_alloc+0x36/0x290 [ 545.962844][T16560] ? ext4_da_release_space+0x19b/0x410 [ 545.968411][T16560] ? mempool_free+0x380/0x380 [ 545.973069][T16560] mempool_alloc_slab+0x16/0x20 [ 545.977902][T16560] mempool_alloc+0x113/0x680 [ 545.982680][T16560] ? mempool_resize+0x900/0x900 [ 545.987823][T16560] ? check_preemption_disabled+0x154/0x330 [ 545.993713][T16560] ? debug_smp_processor_id+0x20/0x20 [ 545.999585][T16560] ? check_preemption_disabled+0x9e/0x330 [ 546.005751][T16560] bio_alloc_bioset+0x1db/0x640 [ 546.010680][T16560] ? debug_smp_processor_id+0x20/0x20 [ 546.016326][T16560] ? bio_chain_endio+0xf0/0xf0 [ 546.021087][T16560] ? __xa_set_mark+0x499/0x580 [ 546.025915][T16560] ? __mod_memcg_state+0x87/0x170 [ 546.030914][T16560] submit_bh_wbc+0x1ba/0x790 [ 546.035479][T16560] ? __set_page_dirty+0x200/0x250 [ 546.040737][T16560] __sync_dirty_buffer+0x1d2/0x2d0 [ 546.045826][T16560] ext4_commit_super+0x850/0xa30 [ 546.050773][T16560] ext4_put_super+0x31e/0xbf0 [ 546.055448][T16560] ? ext4_drop_inode+0x1c0/0x1c0 [ 546.060374][T16560] generic_shutdown_super+0x11b/0x2a0 [ 546.065982][T16560] kill_block_super+0x79/0xd0 [ 546.070650][T16560] deactivate_locked_super+0xaf/0x100 [ 546.076021][T16560] deactivate_super+0x1b3/0x270 [ 546.080859][T16560] ? deactivate_locked_super+0x100/0x100 [ 546.086819][T16560] ? dput+0x4de/0x5d0 [ 546.090788][T16560] ? _raw_spin_lock_irqsave+0x210/0x210 [ 546.096310][T16560] ? find_next_bit+0xc6/0x110 [ 546.100977][T16560] cleanup_mnt+0x432/0x4e0 [ 546.105399][T16560] ? __ia32_sys_read+0x80/0x80 [ 546.110360][T16560] task_work_run+0x186/0x1b0 [ 546.114955][T16560] prepare_exit_to_usermode+0x2b0/0x310 [ 546.120642][T16560] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 546.126520][T16560] RIP: 0033:0x465f69 [ 546.130399][T16560] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 546.150271][T16560] RSP: 002b:00007fc94b99f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 546.158941][T16560] RAX: 0000000000000000 RBX: 000000000056bf60 RCX: 0000000000465f69 23:08:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:09 executing program 3: chdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r2 = perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x43, 0xcc, 0x0, 0x0, 0x99c, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10001}, 0x9020, 0x217, 0x3, 0x9, 0x40, 0x0, 0x3ff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x9, 0x1, 0x0, 0x36, 0x0, 0x33631d0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x7e0000003}, 0x0, 0x100000000, 0x8000, 0x0, 0x2, 0xfffffff9, 0xff81}, r0, 0x1, r2, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r3) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 546.167377][T16560] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 546.175467][T16560] RBP: 00007fc94b99f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 546.183417][T16560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 546.191622][T16560] R13: 00007ffdbc922a5f R14: 00007fc94b99f300 R15: 0000000000022000 23:08:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x30000000000}, 0x0) [ 546.211937][T16573] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="48000000100005070000000000007fff00000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x4c}, 0x0) 23:08:09 executing program 2 (fault-call:3 fault-nth:3): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xffff00000000}, 0x0) 23:08:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 546.337097][T16584] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:09 executing program 3: chdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x43, 0xcc, 0x0, 0x0, 0x99c, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10001}, 0x9020, 0x217, 0x3, 0x9, 0x40, 0x0, 0x3ff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r1) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4, r0}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 546.393330][T16595] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 546.407813][T16599] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x68}, 0x0) 23:08:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:09 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:09 executing program 3: chdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r1 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r1) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4, r0}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x4000000000000}, 0x0) 23:08:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000000007fffffff00000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x6c}, 0x0) 23:08:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 546.565741][T16619] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 546.595746][T16627] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:09 executing program 3: chdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x40030000000000}, 0x0) 23:08:09 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) 23:08:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x70}, 0x0) 23:08:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700000000ffffffff00000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 546.733672][T16644] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:10 executing program 3: chdir(&(0x7f0000000000)='./file0/file0\x00') r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x100000000000000}, 0x0) [ 546.796180][T16654] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x3) 23:08:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x74}, 0x0) [ 546.867915][T16664] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:10 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x200000000000000}, 0x0) 23:08:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 546.973723][T16680] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 546.977261][T16687] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 23:08:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000081404000001007d60b7030000000000006a0a00fe00000000850000001f000000b70000000000000095000000000000006623848adf1dab62931d861531fddf0180000071ff31f1622271d5518193e09483c5a020c3aa305d73869de3b1c7937c34f8c76334d9ce8205b01ddaa54d8756568836077b8471b6b69819782748b376358c0dc6d6c6317189b4c00733dc33c9753bfd989b1ca58949a54d5827df14feecea46a5c53e9c37251732f1061b973ef07bf7f53ce129a9ecd3b4dd15100ff2452f98526a0d8cacdaff79b4c5008652a7b4c0974486a8d203bddc62bb2d555a363adbc33b49e13fbd1757b2701acad0e2684120b99b8cff3f48c9411670c34faf7851b290feb3045aef0d6c169e33b870d1ff4a4d371b622f20c41d8418bc4159c14025422835e81c3573ae77dbae047913474be30000b5a981ff0000749289b44e97dba73f148ae8206afe120c1437492ac52903971b323f60332eb7ab5124d18e4eb69122b42f2173184c1d0fb3287c99b645f6e80e14e5d7c917c6695ebe4d94a85551714768383f465992c8862f66fa2a4a8ae4b4c84d9bee16a171ec36baddad3ec959de7bca54feea9adda9c99781750cf37cfc79d27f06843440f975fcb687bbc51cb98984670f194fb6a9dd457005444fdd23287a36c2e7b5f4f08cce000200000a502505f9db90ebf4efd5368425b1306e3d1cfd06963b1860049064703c47c184e9e7167874e765b1c3062e6c0000000000b400000000000000000000000000001b7f96b53b4e869c5b69dc0b3b334e34913ba4ea36dba4cfa318ee9d23378ffc32e52b86e625442f32f084e1f591fd08328f3f1853e8d4c7bbfbe6b5a0bde94d200ca1e721f9f26870deb8ed7bd52f2bf66fe4a8402fe388f4850cb454653d0e22be9af12f58d1ede97da8efcf8e060b0a0067782bd85b2b9168f1afffcaf0084e171c8befc0a8d9b7370c395189d388d63d318b1832b4fdbdba62d5380ec243d8619c76b38fdd112a2b7d73e3f13f9aba97fbaf99c64777be8311750e2985aca5c3f04fba58a9c2047a3e663046df9a3751506c054d666d84"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="48000000100005070fffffffffffffff00000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x7a}, 0x0) 23:08:10 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x5) [ 547.132038][T16705] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x300000000000000}, 0x0) 23:08:10 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 547.176123][T16709] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:10 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x82}, 0x0) 23:08:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x400000000000000}, 0x0) 23:08:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000200"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 547.297652][T16725] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x6) 23:08:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 547.365113][T16734] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xba}, 0x0) 23:08:10 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', 0x0, 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x500000000000000}, 0x0) 23:08:10 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', 0x0, 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x7) 23:08:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f000000000000000200000002000499008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 547.511987][T16755] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 547.537372][T16754] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:10 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', 0x0, 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xfc}, 0x0) 23:08:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x600000000000000}, 0x0) 23:08:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000300"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:10 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x8) [ 547.683414][T16779] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f00000000000000020000000200049a008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x6e810c600000000}, 0x0) 23:08:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x136}, 0x0) 23:08:11 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 547.761468][T16794] EXT4-fs (loop3): bad geometry: block count 256 exceeds size of device (11 blocks) [ 547.777980][T16798] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xa) [ 547.830957][T16803] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f0000000000000002000000020001bb008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:11 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x700000000000000}, 0x0) 23:08:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x192}, 0x0) 23:08:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000400"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 547.939205][T16816] EXT4-fs (loop3): bad geometry: block count 256 exceeds size of device (11 blocks) [ 547.945713][T16812] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xd) 23:08:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x800000000000000}, 0x0) [ 548.034125][T16826] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:11 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x10) [ 548.103033][T16841] EXT4-fs (loop3): bad geometry: block count 256 exceeds size of device (11 blocks) [ 548.118907][T16840] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f000000000000000200000002000002008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:11 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x196}, 0x0) [ 548.156352][T16847] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:11 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x900000000000000}, 0x0) 23:08:11 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000500"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x300) 23:08:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x1c6}, 0x0) [ 548.290394][T16866] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 548.312836][T16863] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xa00000000000000}, 0x0) 23:08:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 548.415386][T16883] __nla_validate_parse: 150 callbacks suppressed [ 548.415393][T16883] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 548.441890][T16891] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 548.450357][T16879] EXT4-fs error (device loop3): ext4_fill_super:4589: inode #2: comm syz-executor.3: iget: root inode unallocated 23:08:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x500) [ 548.464242][T16879] EXT4-fs (loop3): get root inode failed 23:08:11 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 548.487991][T16879] EXT4-fs (loop3): mount failed [ 548.510584][T16892] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 548.543264][T16890] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 23:08:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 548.560733][T16900] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 548.587663][T16898] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 548.601676][T16894] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 23:08:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x600) [ 548.617213][T16906] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 548.645033][T16906] EXT4-fs mount: 75 callbacks suppressed [ 548.645045][T16906] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xb00000000000000}, 0x0) 23:08:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:11 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 548.645740][T16907] EXT4-fs error (device loop3): ext4_fill_super:4589: inode #2: comm syz-executor.3: iget: root inode unallocated [ 548.672589][T16907] EXT4-fs (loop3): get root inode failed [ 548.678354][T16907] EXT4-fs (loop3): mount failed [ 548.684730][T16914] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 548.693793][T16901] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 548.717790][T16900] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 548.751427][T16920] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 548.796344][T16905] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 548.817863][T16924] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 548.828566][T16931] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 23:08:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000600"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x1ca}, 0x0) 23:08:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xc00000000000000}, 0x0) 23:08:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x700) 23:08:12 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 548.830975][T16925] EXT4-fs error (device loop3): ext4_fill_super:4589: inode #2: comm syz-executor.3: iget: root inode unallocated [ 548.838724][T16926] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 548.858598][T16925] EXT4-fs (loop3): get root inode failed [ 548.864639][T16925] EXT4-fs (loop3): mount failed [ 548.870218][T16926] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x1d0}, 0x0) 23:08:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xa00) [ 548.993275][T16947] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 549.006644][T16947] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 549.026239][T16952] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xd00000000000000}, 0x0) [ 549.038893][T16953] EXT4-fs error (device loop3): ext4_fill_super:4589: inode #2: comm syz-executor.3: iget: root inode unallocated [ 549.053923][T16953] EXT4-fs (loop3): get root inode failed [ 549.060324][T16953] EXT4-fs (loop3): mount failed 23:08:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f000000000000000200000002000007008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:12 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xe00000000000000}, 0x0) [ 549.154341][T16967] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 549.173872][T16967] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 549.191646][T16973] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x1e2}, 0x0) 23:08:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xd00) 23:08:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:12 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 549.224837][T16976] EXT4-fs error (device loop3): ext4_fill_super:4589: inode #2: comm syz-executor.3: iget: root inode unallocated [ 549.240302][T16976] EXT4-fs (loop3): get root inode failed [ 549.247794][T16976] EXT4-fs (loop3): mount failed 23:08:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xfffffffffffffff}, 0x0) 23:08:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2000) 23:08:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 549.351032][T16996] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 549.357032][T16997] EXT4-fs error (device loop3): ext4_fill_super:4589: inode #2: comm syz-executor.3: iget: root inode unallocated [ 549.374251][T16996] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 549.381922][T16995] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x23a}, 0x0) [ 549.399693][T16997] EXT4-fs (loop3): get root inode failed [ 549.406559][T16997] EXT4-fs (loop3): mount failed 23:08:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x1000000000000000}, 0x0) 23:08:12 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080), 0x0, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000800"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:12 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080), 0x0, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f00000000000000020000000200000a008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x3f00) [ 549.571688][T17019] EXT4-fs error (device loop3): ext4_fill_super:4589: inode #2: comm syz-executor.3: iget: root inode unallocated [ 549.582396][T17020] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 549.587230][T17019] EXT4-fs (loop3): get root inode failed [ 549.592305][T17022] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 549.599741][T17019] EXT4-fs (loop3): mount failed [ 549.612603][T17022] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x23c}, 0x0) 23:08:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x1100000000000000}, 0x0) [ 549.757329][T17041] EXT4-fs error (device loop3): ext4_fill_super:4589: inode #2: comm syz-executor.3: iget: root inode unallocated [ 549.773398][T17043] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 549.783319][T17041] EXT4-fs (loop3): get root inode failed [ 549.791247][T17041] EXT4-fs (loop3): mount failed 23:08:13 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080), 0x0, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f00000000000000020000000200000b008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x250}, 0x0) [ 549.862956][T17052] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 549.888024][T17052] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 549.888461][T17065] EXT4-fs error (device loop3): ext4_fill_super:4589: inode #2: comm syz-executor.3: iget: root inode unallocated 23:08:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000900"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:13 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f465", 0xf, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x1200000000000000}, 0x0) 23:08:13 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x4000) [ 549.910105][T17065] EXT4-fs (loop3): get root inode failed [ 549.918088][T17065] EXT4-fs (loop3): mount failed [ 549.992210][T17070] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 550.014765][T17076] EXT4-fs error (device loop3): ext4_fill_super:4589: inode #2: comm syz-executor.3: iget: root inode unallocated [ 550.034446][T17076] EXT4-fs (loop3): get root inode failed 23:08:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f00000000000000020000000200000c008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 550.040269][T17076] EXT4-fs (loop3): mount failed 23:08:13 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f465", 0xf, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x2500000000000000}, 0x0) 23:08:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x258}, 0x0) 23:08:13 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xff00) [ 550.136323][T17086] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 550.157973][T17086] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f00000000000000020000000200000d008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000a00"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 550.190073][T17097] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 550.208381][T17096] EXT4-fs error (device loop3): ext4_fill_super:4589: inode #2: comm syz-executor.3: iget: root inode unallocated [ 550.221765][T17096] EXT4-fs (loop3): get root inode failed [ 550.230735][T17096] EXT4-fs (loop3): mount failed 23:08:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x2f00000000000000}, 0x0) 23:08:13 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f465", 0xf, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:13 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x20000) 23:08:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x262}, 0x0) [ 550.328641][T17115] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 550.351861][T17111] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 550.361800][T17111] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 550.399375][T17130] EXT4-fs error (device loop3): ext4_fill_super:4589: inode #2: comm syz-executor.3: iget: root inode unallocated [ 550.413326][T17130] EXT4-fs (loop3): get root inode failed [ 550.424810][T17130] EXT4-fs (loop3): mount failed 23:08:13 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f0001", 0x16, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x3206000000000000}, 0x0) 23:08:13 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x40000) 23:08:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f000000000000000200000002000010008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 550.448843][T17133] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 550.464658][T17136] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 550.474553][T17136] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x2ca}, 0x0) 23:08:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000081404000001007d60b7030000000000006a0a00fe00000000850000001f000000b70000000000000095000000000000006623848adf1dab62931d861531fddf0180000071ff31f1622271d5518193e09483c5a020c3aa305d73869de3b1c7937c34f8c76334d9ce8205b01ddaa54d8756568836077b8471b6b69819782748b376358c0dc6d6c6317189b4c00733dc33c9753bfd989b1ca58949a54d5827df14feecea46a5c53e9c37251732f1061b973ef07bf7f53ce129a9ecd3b4dd15100ff2452f98526a0d8cacdaff79b4c5008652a7b4c0974486a8d203bddc62bb2d555a363adbc33b49e13fbd1757b2701acad0e2684120b99b8cff3f48c9411670c34faf7851b290feb3045aef0d6c169e33b870d1ff4a4d371b622f20c41d8418bc4159c14025422835e81c3573ae77dbae047913474be30000b5a981ff0000749289b44e97dba73f148ae8206afe120c1437492ac52903971b323f60332eb7ab5124d18e4eb69122b42f2173184c1d0fb3287c99b645f6e80e14e5d7c917c6695ebe4d94a85551714768383f465992c8862f66fa2a4a8ae4b4c84d9bee16a171ec36baddad3ec959de7bca54feea9adda9c99781750cf37cfc79d27f06843440f975fcb687bbc51cb98984670f194fb6a9dd457005444fdd23287a36c2e7b5f4f08cce000200000a502505f9db90ebf4efd5368425b1306e3d1cfd06963b1860049064703c47c184e9e7167874e765b1c3062e6c0000000000b400000000000000000000000000001b7f96b53b4e869c5b69dc0b3b334e34913ba4ea36dba4cfa318ee9d23378ffc32e52b86e625442f32f084e1f591fd08328f3f1853e8d4c7bbfbe6b5a0bde94d200ca1e721f9f26870deb8ed7bd52f2bf66fe4a8402fe388f4850cb454653d0e22be9af12f58d1ede97da8efcf8e060b0a0067782bd85b2b9168f1afffcaf0084e171c8befc0a8d9b7370c395189d388d63d318b1832b4fdbdba62d5380ec243d8619c76b38fdd112a2b7d73e3f13f9aba97fbaf99c64777be8311750e2985aca5c3f04fba58a9c2047a3e663046df9a3751506c054d666d84"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000b00"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:13 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f0001", 0x16, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f000000000000000200000002000011008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 550.598142][T17151] EXT4-fs error (device loop3): ext4_fill_super:4589: inode #2: comm syz-executor.3: iget: root inode unallocated [ 550.613213][T17153] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 550.620030][T17151] EXT4-fs (loop3): get root inode failed [ 550.628235][T17151] EXT4-fs (loop3): mount failed [ 550.650198][T17156] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x3a00000000000000}, 0x0) 23:08:13 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x80000) [ 550.690901][T17156] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 550.714262][T17171] EXT4-fs error (device loop3): ext4_fill_super:4589: inode #2: comm syz-executor.3: iget: root inode unallocated 23:08:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x300}, 0x0) 23:08:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000c00"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 550.744770][T17172] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 550.749857][T17171] EXT4-fs (loop3): get root inode failed [ 550.760849][T17171] EXT4-fs (loop3): mount failed 23:08:14 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f0001", 0x16, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x3c02000000000000}, 0x0) 23:08:14 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x80040) 23:08:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f000000000000000200000002000012008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 550.818871][T17181] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 550.837190][T17181] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f000000000000000200000002000022008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 550.902460][T17199] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 550.914861][T17196] EXT4-fs error (device loop3): ext4_fill_super:4589: inode #2: comm syz-executor.3: iget: root inode unallocated [ 550.927867][T17196] EXT4-fs (loop3): get root inode failed [ 550.933943][T17196] EXT4-fs (loop3): mount failed 23:08:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x3ba}, 0x0) 23:08:14 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000", 0x1a, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 550.969644][T17203] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 550.997221][T17203] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x4000000000000000}, 0x0) 23:08:14 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xa0000) 23:08:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f000000000000000200000002000025008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 551.038416][T17214] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:14 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000", 0x1a, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000d00"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 551.118990][T17217] EXT4-fs error (device loop3): ext4_fill_super:4589: inode #2: comm syz-executor.3: iget: root inode unallocated [ 551.133367][T17217] EXT4-fs (loop3): get root inode failed [ 551.139292][T17217] EXT4-fs (loop3): mount failed 23:08:14 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x1000000) 23:08:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x3c4}, 0x0) 23:08:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x4800000000000000}, 0x0) [ 551.225259][T17230] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 551.238640][T17230] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 551.257156][T17235] EXT4-fs error (device loop3): ext4_fill_super:4589: inode #2: comm syz-executor.3: iget: root inode unallocated 23:08:14 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000", 0x1a, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 551.273814][T17238] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 551.288468][T17235] EXT4-fs (loop3): get root inode failed [ 551.300419][T17235] EXT4-fs (loop3): mount failed 23:08:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f00000000000000020000000200002e008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x3c6}, 0x0) 23:08:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000e00"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x4c00000000000000}, 0x0) 23:08:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 551.428583][T17258] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 551.431780][T17257] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 551.461688][T17260] EXT4-fs error (device loop3): ext4_fill_super:4589: inode #2: comm syz-executor.3: iget: root inode unallocated 23:08:14 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x15cfcff) 23:08:14 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f0001000000000400", 0x1c, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 551.462176][T17258] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 551.481270][T17260] EXT4-fs (loop3): get root inode failed [ 551.492735][T17260] EXT4-fs (loop3): mount failed 23:08:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 551.557638][T17274] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x3d2}, 0x0) 23:08:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x4e03000000000000}, 0x0) 23:08:14 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f0001000000000400", 0x1c, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:14 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2000000) [ 551.639965][T17284] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 551.654796][T17284] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 551.667738][T17283] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 551.671652][T17288] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 551.674443][T17283] EXT4-fs (loop3): mount failed 23:08:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507001000"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x5c00000000000000}, 0x0) 23:08:15 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f0001000000000400", 0x1c, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x3d4}, 0x0) 23:08:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f000000000000000200000002000068008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 551.800001][T17305] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 551.814055][T17298] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 551.821610][T17310] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 551.835010][T17298] EXT4-fs (loop3): mount failed 23:08:15 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x25cfcff) [ 551.863071][T17310] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x6202000000000000}, 0x0) 23:08:15 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f00000000000000020000000200006c008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 551.918086][T17320] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 551.928166][T17320] EXT4-fs (loop3): mount failed [ 551.942016][T17328] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x3da}, 0x0) 23:08:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507001100"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x6800000000000000}, 0x0) 23:08:15 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x3000000) 23:08:15 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 552.051441][T17335] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 552.061513][T17335] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 552.066357][T17337] EXT4-fs error (device loop3): ext4_fill_super:4589: inode #2: comm syz-executor.3: iget: root inode unallocated [ 552.083041][T17337] EXT4-fs (loop3): get root inode failed [ 552.090446][T17337] EXT4-fs (loop3): mount failed 23:08:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x3e4}, 0x0) 23:08:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 552.194903][T17345] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 552.208259][T17358] EXT4-fs error (device loop3): ext4_fill_super:4589: inode #2: comm syz-executor.3: iget: root inode unallocated [ 552.220950][T17358] EXT4-fs (loop3): get root inode failed [ 552.227395][T17358] EXT4-fs (loop3): mount failed 23:08:15 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:15 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x35cfcff) [ 552.243695][T17355] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 552.253667][T17355] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x6c00000000000000}, 0x0) 23:08:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x3ea}, 0x0) [ 552.338356][T17371] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 552.363467][T17374] EXT4-fs error (device loop3): ext4_fill_super:4589: inode #2: comm syz-executor.3: iget: root inode unallocated [ 552.365380][T17379] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 552.389369][T17379] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 552.390685][T17374] EXT4-fs (loop3): get root inode failed [ 552.404660][T17374] EXT4-fs (loop3): mount failed 23:08:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507001200"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:15 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x4000000) 23:08:15 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x7400000000000000}, 0x0) 23:08:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 552.526402][T17389] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 552.590878][T17396] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 552.615272][T17396] EXT4-fs (loop3): group descriptors corrupted! 23:08:15 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:15 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x5000000) [ 552.637225][T17405] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 552.649284][T17405] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x3ec}, 0x0) 23:08:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x7a00000000000000}, 0x0) [ 552.682708][T17408] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000081404000001007d60b7030000000000006a0a00fe00000000850000001f000000b70000000000000095000000000000006623848adf1dab62931d861531fddf0180000071ff31f1622271d5518193e09483c5a020c3aa305d73869de3b1c7937c34f8c76334d9ce8205b01ddaa54d8756568836077b8471b6b69819782748b376358c0dc6d6c6317189b4c00733dc33c9753bfd989b1ca58949a54d5827df14feecea46a5c53e9c37251732f1061b973ef07bf7f53ce129a9ecd3b4dd15100ff2452f98526a0d8cacdaff79b4c5008652a7b4c0974486a8d203bddc62bb2d555a363adbc33b49e13fbd1757b2701acad0e2684120b99b8cff3f48c9411670c34faf7851b290feb3045aef0d6c169e33b870d1ff4a4d371b622f20c41d8418bc4159c14025422835e81c3573ae77dbae047913474be30000b5a981ff0000749289b44e97dba73f148ae8206afe120c1437492ac52903971b323f60332eb7ab5124d18e4eb69122b42f2173184c1d0fb3287c99b645f6e80e14e5d7c917c6695ebe4d94a85551714768383f465992c8862f66fa2a4a8ae4b4c84d9bee16a171ec36baddad3ec959de7bca54feea9adda9c99781750cf37cfc79d27f06843440f975fcb687bbc51cb98984670f194fb6a9dd457005444fdd23287a36c2e7b5f4f08cce000200000a502505f9db90ebf4efd5368425b1306e3d1cfd06963b1860049064703c47c184e9e7167874e765b1c3062e6c0000000000b400000000000000000000000000001b7f96b53b4e869c5b69dc0b3b334e34913ba4ea36dba4cfa318ee9d23378ffc32e52b86e625442f32f084e1f591fd08328f3f1853e8d4c7bbfbe6b5a0bde94d200ca1e721f9f26870deb8ed7bd52f2bf66fe4a8402fe388f4850cb454653d0e22be9af12f58d1ede97da8efcf8e060b0a0067782bd85b2b9168f1afffcaf0084e171c8befc0a8d9b7370c395189d388d63d318b1832b4fdbdba62d5380ec243d8619c76b38fdd112a2b7d73e3f13f9aba97fbaf99c64777be8311750e2985aca5c3f04fba58a9c2047a3e663046df9a3751506c054d666d84"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507001800"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:16 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 552.788431][T17419] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 552.800295][T17419] EXT4-fs (loop3): group descriptors corrupted! [ 552.803878][T17426] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 552.812912][T17431] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 552.825103][T17431] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x8000000000000000}, 0x0) 23:08:16 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x6000000) 23:08:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x3ee}, 0x0) 23:08:16 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x8100000000000000}, 0x0) [ 552.961565][T17441] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 552.967476][T17447] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 552.984709][T17441] EXT4-fs (loop3): group descriptors corrupted! 23:08:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:16 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x7000000) 23:08:16 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 553.069494][T17450] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 553.089101][T17450] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 553.106115][T17458] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 23:08:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x3f2}, 0x0) [ 553.110246][T17464] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 553.119294][T17458] EXT4-fs (loop3): group descriptors corrupted! 23:08:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507002500"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x81ffffff00000000}, 0x0) [ 553.255965][T17473] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 553.268389][T17473] EXT4-fs (loop3): group descriptors corrupted! [ 553.280084][T17480] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 553.281096][T17482] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:16 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:16 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x8000000) [ 553.305553][T17482] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 553.342851][T17492] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x500}, 0x0) 23:08:16 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507002f00"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 553.415704][T17497] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 553.432041][T17497] EXT4-fs (loop3): group descriptors corrupted! [ 553.449032][T17503] __nla_validate_parse: 148 callbacks suppressed 23:08:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x8200000000000000}, 0x0) [ 553.449038][T17503] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 553.490963][T17505] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 553.526020][T17504] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:16 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xd000000) [ 553.539574][T17504] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 553.551238][T17508] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 553.553281][T17513] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x600}, 0x0) [ 553.590936][T17517] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 553.614439][T17516] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 23:08:16 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 553.636997][T17516] EXT4-fs (loop3): group descriptors corrupted! [ 553.654028][T17522] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 553.674436][T17518] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 23:08:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f00000000000000020000000200009a048000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:16 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x10000000) [ 553.710353][T17524] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 553.718755][T17527] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 553.734976][T17530] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 553.735215][T17527] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x8a02000000000000}, 0x0) 23:08:17 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 553.786025][T17538] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 553.801339][T17538] EXT4-fs (loop3): group descriptors corrupted! [ 553.809270][T17528] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 553.821312][T17541] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 553.840446][T17543] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 553.881788][T17545] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 23:08:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x634}, 0x0) 23:08:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507003a00"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:17 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x9601000000000000}, 0x0) 23:08:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 553.934037][T17549] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 553.948300][T17555] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 553.953178][T17549] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 553.959023][T17555] EXT4-fs (loop3): group descriptors corrupted! 23:08:17 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x20000000) [ 554.015095][T17556] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 554.079929][T17570] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 554.094747][T17571] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 554.112429][T17571] EXT4-fs (loop3): group descriptors corrupted! 23:08:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x700}, 0x0) 23:08:17 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x9effffff00000000}, 0x0) 23:08:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507004800"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 554.248090][T17582] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f000000000000000200000002000000098000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:17 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 554.297354][T17584] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 554.316475][T17587] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 554.327309][T17595] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 554.335770][T17587] EXT4-fs (loop3): group descriptors corrupted! 23:08:17 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x3f000000) 23:08:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x900}, 0x0) [ 554.350185][T17584] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xc203000000000000}, 0x0) [ 554.400583][T17608] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 554.481012][T17611] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 554.508808][T17611] EXT4-fs (loop3): group descriptors corrupted! 23:08:17 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:17 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x40000000) 23:08:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507004c00"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 554.525835][T17617] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 554.543028][T17617] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 554.567218][T17624] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xa00}, 0x0) 23:08:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:17 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 554.587856][T17630] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 554.603822][T17630] EXT4-fs (loop3): group descriptors corrupted! 23:08:17 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x40000800) 23:08:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xc403000000000000}, 0x0) [ 554.682958][T17637] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 554.693609][T17637] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:17 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 554.733660][T17647] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 554.745446][T17647] EXT4-fs (loop3): group descriptors corrupted! [ 554.769138][T17646] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x8cffffff) 23:08:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 554.816968][T17656] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 554.828543][T17656] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000081404000001007d60b7030000000000006a0a00fe00000000850000001f000000b70000000000000095000000000000006623848adf1dab62931d861531fddf0180000071ff31f1622271d5518193e09483c5a020c3aa305d73869de3b1c7937c34f8c76334d9ce8205b01ddaa54d8756568836077b8471b6b69819782748b376358c0dc6d6c6317189b4c00733dc33c9753bfd989b1ca58949a54d5827df14feecea46a5c53e9c37251732f1061b973ef07bf7f53ce129a9ecd3b4dd15100ff2452f98526a0d8cacdaff79b4c5008652a7b4c0974486a8d203bddc62bb2d555a363adbc33b49e13fbd1757b2701acad0e2684120b99b8cff3f48c9411670c34faf7851b290feb3045aef0d6c169e33b870d1ff4a4d371b622f20c41d8418bc4159c14025422835e81c3573ae77dbae047913474be30000b5a981ff0000749289b44e97dba73f148ae8206afe120c1437492ac52903971b323f60332eb7ab5124d18e4eb69122b42f2173184c1d0fb3287c99b645f6e80e14e5d7c917c6695ebe4d94a85551714768383f465992c8862f66fa2a4a8ae4b4c84d9bee16a171ec36baddad3ec959de7bca54feea9adda9c99781750cf37cfc79d27f06843440f975fcb687bbc51cb98984670f194fb6a9dd457005444fdd23287a36c2e7b5f4f08cce000200000a502505f9db90ebf4efd5368425b1306e3d1cfd06963b1860049064703c47c184e9e7167874e765b1c3062e6c0000000000b400000000000000000000000000001b7f96b53b4e869c5b69dc0b3b334e34913ba4ea36dba4cfa318ee9d23378ffc32e52b86e625442f32f084e1f591fd08328f3f1853e8d4c7bbfbe6b5a0bde94d200ca1e721f9f26870deb8ed7bd52f2bf66fe4a8402fe388f4850cb454653d0e22be9af12f58d1ede97da8efcf8e060b0a0067782bd85b2b9168f1afffcaf0084e171c8befc0a8d9b7370c395189d388d63d318b1832b4fdbdba62d5380ec243d8619c76b38fdd112a2b7d73e3f13f9aba97fbaf99c64777be8311750e2985aca5c3f04fba58a9c2047a3e663046df9a3751506c054d666d84"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507006800"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xb00}, 0x0) 23:08:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xc603000000000000}, 0x0) [ 554.883930][T17661] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 554.895128][T17661] EXT4-fs (loop3): group descriptors corrupted! 23:08:18 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xd25cfcff) [ 554.931407][T17669] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 554.942383][T17675] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 554.953943][T17675] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:18 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xc00}, 0x0) 23:08:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xf4ffffff) 23:08:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xca01000000000000}, 0x0) [ 555.066571][T17689] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 555.075026][T17688] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 555.085798][T17688] EXT4-fs (loop3): group descriptors corrupted! [ 555.093050][T17695] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 555.105445][T17695] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000081404000001007d60b7030000000000006a0a00fe00000000850000001f000000b70000000000000095000000000000006623848adf1dab62931d861531fddf0180000071ff31f1622271d5518193e09483c5a020c3aa305d73869de3b1c7937c34f8c76334d9ce8205b01ddaa54d8756568836077b8471b6b69819782748b376358c0dc6d6c6317189b4c00733dc33c9753bfd989b1ca58949a54d5827df14feecea46a5c53e9c37251732f1061b973ef07bf7f53ce129a9ecd3b4dd15100ff2452f98526a0d8cacdaff79b4c5008652a7b4c0974486a8d203bddc62bb2d555a363adbc33b49e13fbd1757b2701acad0e2684120b99b8cff3f48c9411670c34faf7851b290feb3045aef0d6c169e33b870d1ff4a4d371b622f20c41d8418bc4159c14025422835e81c3573ae77dbae047913474be30000b5a981ff0000749289b44e97dba73f148ae8206afe120c1437492ac52903971b323f60332eb7ab5124d18e4eb69122b42f2173184c1d0fb3287c99b645f6e80e14e5d7c917c6695ebe4d94a85551714768383f465992c8862f66fa2a4a8ae4b4c84d9bee16a171ec36baddad3ec959de7bca54feea9adda9c99781750cf37cfc79d27f06843440f975fcb687bbc51cb98984670f194fb6a9dd457005444fdd23287a36c2e7b5f4f08cce000200000a502505f9db90ebf4efd5368425b1306e3d1cfd06963b1860049064703c47c184e9e7167874e765b1c3062e6c0000000000b400000000000000000000000000001b7f96b53b4e869c5b69dc0b3b334e34913ba4ea36dba4cfa318ee9d23378ffc32e52b86e625442f32f084e1f591fd08328f3f1853e8d4c7bbfbe6b5a0bde94d200ca1e721f9f26870deb8ed7bd52f2bf66fe4a8402fe388f4850cb454653d0e22be9af12f58d1ede97da8efcf8e060b0a0067782bd85b2b9168f1afffcaf0084e171c8befc0a8d9b7370c395189d388d63d318b1832b4fdbdba62d5380ec243d8619c76b38fdd112a2b7d73e3f13f9aba97fbaf99c64777be8311750e2985aca5c3f04fba58a9c2047a3e663046df9a3751506c054d666d84"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507006c00"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 555.207013][T17705] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 555.217553][T17703] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 555.220807][T17710] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xf6ffffff) 23:08:18 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 555.252982][T17705] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 555.255337][T17703] EXT4-fs (loop3): group descriptors corrupted! 23:08:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xd00}, 0x0) 23:08:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xd001000000000000}, 0x0) 23:08:18 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 555.376744][T17725] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507007000"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 555.432435][T17734] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 555.443181][T17734] EXT4-fs (loop3): group descriptors corrupted! 23:08:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f000000000000000200000002000000128000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xe00}, 0x0) [ 555.499709][T17736] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 555.499833][T17749] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 555.533604][T17750] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 23:08:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xfbffffff) 23:08:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xda03000000000000}, 0x0) [ 555.560489][T17736] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 555.581109][T17750] EXT4-fs (loop3): group descriptors corrupted! [ 555.588249][T17759] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x1100}, 0x0) 23:08:18 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f000000000000000200000002000000208000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xfeffffff) 23:08:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xe0ffffff00000000}, 0x0) [ 555.720363][T17774] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 555.731561][T17774] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507007400"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 555.784795][T17783] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x1200}, 0x0) 23:08:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xe203000000000000}, 0x0) [ 555.875395][T17781] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 555.887692][T17781] EXT4-fs (loop3): group descriptors corrupted! [ 555.896113][T17794] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 555.916977][T17794] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:19 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:19 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xff000000) 23:08:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 555.967364][T17808] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x1b00}, 0x0) 23:08:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507007a00"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 556.064929][T17817] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 556.078317][T17813] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 556.093933][T17813] EXT4-fs (loop3): group descriptors corrupted! [ 556.101012][T17817] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:19 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:19 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xfffbffff) 23:08:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xe403000000000000}, 0x0) [ 556.106364][T17824] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f000000000000000200000002000000258000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x2000}, 0x0) 23:08:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xe687feff00000000}, 0x0) 23:08:19 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 556.231433][T17832] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 23:08:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:19 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xfffc5c01) [ 556.298891][T17842] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 556.321288][T17848] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700fc00"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 556.343266][T17842] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 556.347475][T17856] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 556.381102][T17862] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xe803000000000000}, 0x0) 23:08:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:19 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x2500}, 0x0) 23:08:19 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 556.520148][T17873] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 556.527411][T17878] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 556.540549][T17879] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 556.549485][T17873] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xea03000000000000}, 0x0) 23:08:19 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xfffc5c02) 23:08:19 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 556.650860][T17893] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 23:08:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000081404000001007d60b7030000000000006a0a00fe00000000850000001f000000b70000000000000095000000000000006623848adf1dab62931d861531fddf0180000071ff31f1622271d5518193e09483c5a020c3aa305d73869de3b1c7937c34f8c76334d9ce8205b01ddaa54d8756568836077b8471b6b69819782748b376358c0dc6d6c6317189b4c00733dc33c9753bfd989b1ca58949a54d5827df14feecea46a5c53e9c37251732f1061b973ef07bf7f53ce129a9ecd3b4dd15100ff2452f98526a0d8cacdaff79b4c5008652a7b4c0974486a8d203bddc62bb2d555a363adbc33b49e13fbd1757b2701acad0e2684120b99b8cff3f48c9411670c34faf7851b290feb3045aef0d6c169e33b870d1ff4a4d371b622f20c41d8418bc4159c14025422835e81c3573ae77dbae047913474be30000b5a981ff0000749289b44e97dba73f148ae8206afe120c1437492ac52903971b323f60332eb7ab5124d18e4eb69122b42f2173184c1d0fb3287c99b645f6e80e14e5d7c917c6695ebe4d94a85551714768383f465992c8862f66fa2a4a8ae4b4c84d9bee16a171ec36baddad3ec959de7bca54feea9adda9c99781750cf37cfc79d27f06843440f975fcb687bbc51cb98984670f194fb6a9dd457005444fdd23287a36c2e7b5f4f08cce000200000a502505f9db90ebf4efd5368425b1306e3d1cfd06963b1860049064703c47c184e9e7167874e765b1c3062e6c0000000000b400000000000000000000000000001b7f96b53b4e869c5b69dc0b3b334e34913ba4ea36dba4cfa318ee9d23378ffc32e52b86e625442f32f084e1f591fd08328f3f1853e8d4c7bbfbe6b5a0bde94d200ca1e721f9f26870deb8ed7bd52f2bf66fe4a8402fe388f4850cb454653d0e22be9af12f58d1ede97da8efcf8e060b0a0067782bd85b2b9168f1afffcaf0084e171c8befc0a8d9b7370c395189d388d63d318b1832b4fdbdba62d5380ec243d8619c76b38fdd112a2b7d73e3f13f9aba97fbaf99c64777be8311750e2985aca5c3f04fba58a9c2047a3e663046df9a3751506c054d666d84"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000003000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x2a00}, 0x0) 23:08:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xeaffffff00000000}, 0x0) [ 556.712678][T17890] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:20 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:20 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xfffc5c03) [ 556.774276][T17905] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 556.781189][T17902] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 556.809321][T17902] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 556.845299][T17915] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:20 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xec03000000000000}, 0x0) 23:08:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x2f00}, 0x0) [ 556.926199][T17923] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 23:08:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507007803000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 556.973104][T17933] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 556.996832][T17932] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 557.002263][T17933] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 557.016239][T17938] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 23:08:20 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xfffc5cd2) 23:08:20 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xee03000000000000}, 0x0) 23:08:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:20 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xfffffbff) 23:08:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x3406}, 0x0) [ 557.139533][T17956] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 557.154453][T17956] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 557.175624][T17961] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:20 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700c203000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 557.234315][T17962] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 23:08:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 557.286288][T17972] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 557.302805][T17984] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 557.324866][T17972] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:20 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xffffff8c) 23:08:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xefffffff00000000}, 0x0) 23:08:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x3601}, 0x0) [ 557.330502][T17980] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 23:08:20 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1", 0x2d, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f0000000000000002000000020000006c8000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:20 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xfffffff4) 23:08:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xf087feff00000000}, 0x0) [ 557.449915][T17992] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 557.484817][T18004] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:20 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1", 0x2d, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 557.495658][T18004] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 557.509176][T18005] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 23:08:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700ce03000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f0000000000000002000000020000886c8000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x3a00}, 0x0) [ 557.541154][T18012] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:20 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xfffffff6) [ 557.597474][T18018] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 557.618494][T18018] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xf0ffffff00000000}, 0x0) [ 557.641553][T18022] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 23:08:20 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1", 0x2d, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x3a02}, 0x0) 23:08:20 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f", 0x44, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 557.744958][T18031] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 557.764667][T18043] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 557.765066][T18041] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xf203000000000000}, 0x0) 23:08:21 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xfffffffb) 23:08:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700e003000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 557.795275][T18041] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x3c02}, 0x0) [ 557.875828][T18061] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 557.899683][T18052] EXT4-fs error (device loop3): ext4_fill_super:4589: inode #2: comm syz-executor.3: iget: root inode unallocated 23:08:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xf603000000000000}, 0x0) 23:08:21 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f", 0x44, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 557.921251][T18052] EXT4-fs (loop3): get root inode failed [ 557.927888][T18052] EXT4-fs (loop3): mount failed 23:08:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:21 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xfffffffe) [ 558.005784][T18069] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 558.025781][T18069] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x4000}, 0x0) [ 558.053938][T18083] EXT4-fs error (device loop3): ext4_fill_super:4589: inode #2: comm syz-executor.3: iget: root inode unallocated [ 558.068476][T18083] EXT4-fs (loop3): get root inode failed [ 558.074774][T18083] EXT4-fs (loop3): mount failed 23:08:21 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f", 0x44, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000005000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xfa03000000000000}, 0x0) [ 558.097746][T18088] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 558.165766][T18091] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 558.201359][T18104] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:21 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x80000000000) 23:08:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:21 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 558.204439][T18091] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 558.221501][T18107] EXT4-fs error (device loop3): ext4_fill_super:4589: inode #2: comm syz-executor.3: iget: root inode unallocated [ 558.235892][T18107] EXT4-fs (loop3): get root inode failed [ 558.242895][T18107] EXT4-fs (loop3): mount failed 23:08:21 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x4800}, 0x0) 23:08:21 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xfc00000000000000}, 0x0) 23:08:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 558.338573][T18117] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 558.357991][T18122] EXT4-fs (loop3): invalid first ino: 0 [ 558.368386][T18123] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:21 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x1000000000000) 23:08:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000006000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 558.394771][T18117] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 558.407472][T18130] EXT4-fs (loop3): invalid first ino: 0 [ 558.468747][T18139] __nla_validate_parse: 152 callbacks suppressed [ 558.468754][T18139] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 23:08:21 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 558.515064][T18147] EXT4-fs (loop3): invalid first ino: 0 [ 558.520546][T18148] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 558.531838][T18148] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 558.543668][T18146] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 23:08:21 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2000000000000) 23:08:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x4c00}, 0x0) [ 558.570447][T18145] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 558.595569][T18153] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 23:08:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xfe80ffff00000000}, 0x0) [ 558.625865][T18154] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 558.649479][T18161] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 558.680883][T18167] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 558.695841][T18157] EXT4-fs (loop3): unsupported inode size: 0 [ 558.702651][T18160] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 558.707709][T18157] EXT4-fs (loop3): blocksize: 1024 [ 558.718323][T18166] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:21 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:21 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x4000000000000) [ 558.728677][T18166] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 558.738075][T18154] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 558.757671][T18172] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 23:08:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000007000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 558.821403][T18180] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 558.829462][T18181] EXT4-fs (loop3): unsupported inode size: 0 [ 558.836470][T18181] EXT4-fs (loop3): blocksize: 1024 [ 558.839163][T18174] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 23:08:22 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x5002}, 0x0) [ 558.884161][T18176] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 23:08:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xfec0ffff00000000}, 0x0) 23:08:22 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x7ffffffffffff) [ 558.956978][T18187] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 558.961110][T18192] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 558.975683][T18187] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 559.018727][T18201] EXT4-fs (loop3): unsupported inode size: 0 [ 559.029311][T18201] EXT4-fs (loop3): blocksize: 1024 23:08:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000009000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:22 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xfeff000000000000}, 0x0) 23:08:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x5802}, 0x0) 23:08:22 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xa000000000000) [ 559.142143][T18212] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 559.143680][T18208] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 559.166422][T18208] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:22 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 559.209683][T18221] EXT4-fs (loop3): unsupported inode size: 0 [ 559.220163][T18221] EXT4-fs (loop3): blocksize: 1024 [ 559.282810][T18232] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 559.322486][T18238] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xfeffffff00000000}, 0x0) 23:08:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700000a000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 559.346203][T18248] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 559.362946][T18249] EXT4-fs (loop3): unsupported inode size: 0 [ 559.370334][T18238] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 559.370391][T18249] EXT4-fs (loop3): blocksize: 1024 23:08:22 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x6202}, 0x0) 23:08:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xff00000000000000}, 0x0) 23:08:22 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x100000000000000) [ 559.454332][T18259] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:22 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 559.545938][T18266] EXT4-fs (loop3): unsupported inode size: 0 [ 559.553443][T18266] EXT4-fs (loop3): blocksize: 1024 23:08:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xff03000000000000}, 0x0) [ 559.589632][T18277] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 559.602287][T18276] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 559.604979][T18277] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:22 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x15cfcff00000000) 23:08:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x6800}, 0x0) 23:08:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700000b000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 559.721876][T18288] EXT4-fs (loop3): unsupported inode size: 0 [ 559.735761][T18288] EXT4-fs (loop3): blocksize: 1024 23:08:22 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xff0f000000000000}, 0x0) 23:08:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x6c00}, 0x0) 23:08:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:23 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x200000000000000) [ 559.805906][T18301] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 559.818572][T18305] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 559.837596][T18301] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:23 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 559.886061][T18314] EXT4-fs (loop3): unsupported inode size: 0 [ 559.900422][T18314] EXT4-fs (loop3): blocksize: 1024 [ 559.910823][T18325] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x7000}, 0x0) 23:08:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xff7f000000000000}, 0x0) 23:08:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:23 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x25cfcff00000000) 23:08:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000081404000001007d60b7030000000000006a0a00fe00000000850000001f000000b70000000000000095000000000000006623848adf1dab62931d861531fddf0180000071ff31f1622271d5518193e09483c5a020c3aa305d73869de3b1c7937c34f8c76334d9ce8205b01ddaa54d8756568836077b8471b6b69819782748b376358c0dc6d6c6317189b4c00733dc33c9753bfd989b1ca58949a54d5827df14feecea46a5c53e9c37251732f1061b973ef07bf7f53ce129a9ecd3b4dd15100ff2452f98526a0d8cacdaff79b4c5008652a7b4c0974486a8d203bddc62bb2d555a363adbc33b49e13fbd1757b2701acad0e2684120b99b8cff3f48c9411670c34faf7851b290feb3045aef0d6c169e33b870d1ff4a4d371b622f20c41d8418bc4159c14025422835e81c3573ae77dbae047913474be30000b5a981ff0000749289b44e97dba73f148ae8206afe120c1437492ac52903971b323f60332eb7ab5124d18e4eb69122b42f2173184c1d0fb3287c99b645f6e80e14e5d7c917c6695ebe4d94a85551714768383f465992c8862f66fa2a4a8ae4b4c84d9bee16a171ec36baddad3ec959de7bca54feea9adda9c99781750cf37cfc79d27f06843440f975fcb687bbc51cb98984670f194fb6a9dd457005444fdd23287a36c2e7b5f4f08cce000200000a502505f9db90ebf4efd5368425b1306e3d1cfd06963b1860049064703c47c184e9e7167874e765b1c3062e6c0000000000b400000000000000000000000000001b7f96b53b4e869c5b69dc0b3b334e34913ba4ea36dba4cfa318ee9d23378ffc32e52b86e625442f32f084e1f591fd08328f3f1853e8d4c7bbfbe6b5a0bde94d200ca1e721f9f26870deb8ed7bd52f2bf66fe4a8402fe388f4850cb454653d0e22be9af12f58d1ede97da8efcf8e060b0a0067782bd85b2b9168f1afffcaf0084e171c8befc0a8d9b7370c395189d388d63d318b1832b4fdbdba62d5380ec243d8619c76b38fdd112a2b7d73e3f13f9aba97fbaf99c64777be8311750e2985aca5c3f04fba58a9c2047a3e663046df9a3751506c054d666d84"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700000c000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 560.003998][T18329] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 560.019122][T18329] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f0000000000000002000000020000000b8000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 560.107160][T18341] EXT4-fs (loop3): unsupported inode size: 0 [ 560.112224][T18349] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 560.118549][T18341] EXT4-fs (loop3): blocksize: 1024 23:08:23 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xff87feff00000000}, 0x0) 23:08:23 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x300000000000000) [ 560.152296][T18355] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 560.162988][T18355] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x7400}, 0x0) 23:08:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700000d000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xffffff7f00000000}, 0x0) [ 560.266717][T18368] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 560.274923][T18369] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 23:08:23 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:23 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x35cfcff00000000) [ 560.320434][T18376] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 560.333009][T18376] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:23 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 560.431216][T18389] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 560.438322][T18393] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 560.463468][T18397] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xffffffff00000000}, 0x0) [ 560.485180][T18397] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:23 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x400000000000000) 23:08:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x7a00}, 0x0) [ 560.586725][T18411] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 560.599846][T18408] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 23:08:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700000e000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xffffffffffffff0f}, 0x0) 23:08:23 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, 0x0) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f000000000000000200000002000000118000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:23 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, 0x0) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:23 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x500000000000000) [ 560.673091][T18428] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 560.680357][T18425] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 560.695128][T18425] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x8100}, 0x0) 23:08:24 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, 0x0) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x2}, 0x0) 23:08:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 560.812062][T18444] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 560.821428][T18448] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 560.849302][T18448] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x8200}, 0x0) 23:08:24 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x600000000000000) 23:08:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(0xffffffffffffffff) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x3}, 0x0) 23:08:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000011000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x9201}, 0x0) 23:08:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 561.005112][T18472] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x4}, 0x0) [ 561.061408][T18476] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 561.076786][T18476] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:08:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:24 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x700000000000000) 23:08:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(0xffffffffffffffff) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x9601}, 0x0) [ 561.157785][T18492] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(0xffffffffffffffff) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x5}, 0x0) 23:08:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000012000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 561.258859][T18506] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 561.262831][T18505] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xba00}, 0x0) 23:08:24 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x800000000000000) 23:08:24 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(0x0, &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 561.366218][T18520] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x6}, 0x0) 23:08:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xba03}, 0x0) 23:08:24 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(0x0, &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f0000000000000002000000020000004c8000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 561.486230][T18536] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 561.499040][T18539] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000081404000001007d60b7030000000000006a0a00fe00000000850000001f000000b70000000000000095000000000000006623848adf1dab62931d861531fddf0180000071ff31f1622271d5518193e09483c5a020c3aa305d73869de3b1c7937c34f8c76334d9ce8205b01ddaa54d8756568836077b8471b6b69819782748b376358c0dc6d6c6317189b4c00733dc33c9753bfd989b1ca58949a54d5827df14feecea46a5c53e9c37251732f1061b973ef07bf7f53ce129a9ecd3b4dd15100ff2452f98526a0d8cacdaff79b4c5008652a7b4c0974486a8d203bddc62bb2d555a363adbc33b49e13fbd1757b2701acad0e2684120b99b8cff3f48c9411670c34faf7851b290feb3045aef0d6c169e33b870d1ff4a4d371b622f20c41d8418bc4159c14025422835e81c3573ae77dbae047913474be30000b5a981ff0000749289b44e97dba73f148ae8206afe120c1437492ac52903971b323f60332eb7ab5124d18e4eb69122b42f2173184c1d0fb3287c99b645f6e80e14e5d7c917c6695ebe4d94a85551714768383f465992c8862f66fa2a4a8ae4b4c84d9bee16a171ec36baddad3ec959de7bca54feea9adda9c99781750cf37cfc79d27f06843440f975fcb687bbc51cb98984670f194fb6a9dd457005444fdd23287a36c2e7b5f4f08cce000200000a502505f9db90ebf4efd5368425b1306e3d1cfd06963b1860049064703c47c184e9e7167874e765b1c3062e6c0000000000b400000000000000000000000000001b7f96b53b4e869c5b69dc0b3b334e34913ba4ea36dba4cfa318ee9d23378ffc32e52b86e625442f32f084e1f591fd08328f3f1853e8d4c7bbfbe6b5a0bde94d200ca1e721f9f26870deb8ed7bd52f2bf66fe4a8402fe388f4850cb454653d0e22be9af12f58d1ede97da8efcf8e060b0a0067782bd85b2b9168f1afffcaf0084e171c8befc0a8d9b7370c395189d388d63d318b1832b4fdbdba62d5380ec243d8619c76b38fdd112a2b7d73e3f13f9aba97fbaf99c64777be8311750e2985aca5c3f04fba58a9c2047a3e663046df9a3751506c054d666d84"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000018000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x7}, 0x0) 23:08:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xc403}, 0x0) [ 561.604046][T18536] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 561.614547][T18536] EXT4-fs: failed to create workqueue [ 561.642382][T18565] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 561.664342][T18536] EXT4-fs (loop2): mount failed 23:08:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x8}, 0x0) 23:08:24 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xd00000000000000) 23:08:24 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(0x0, &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f000000000000000200000002000000688000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000025000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 561.806397][T18583] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 561.821952][T18574] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:25 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x1000000000000000) 23:08:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x9}, 0x0) 23:08:25 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xc601}, 0x0) 23:08:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 561.933864][T18594] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:25 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0xa}, 0x0) [ 561.983614][T18604] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:25 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2000000000000000) 23:08:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xc603}, 0x0) 23:08:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700002f000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:25 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 562.066384][T18614] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0xb}, 0x0) 23:08:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:25 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 562.189099][T18631] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 562.207077][T18641] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:25 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x3f00000000000000) 23:08:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0xc}, 0x0) 23:08:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xca01}, 0x0) 23:08:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700003a000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 562.340825][T18655] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:25 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 562.382143][T18661] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0xd}, 0x0) [ 562.442694][T18668] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xca02}, 0x0) 23:08:25 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0xe}, 0x0) 23:08:25 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x4000000000000000) [ 562.547754][T18661] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 562.577057][T18661] EXT4-fs: failed to create workqueue [ 562.584436][T18661] EXT4-fs (loop2): mount failed 23:08:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000040000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x10}, 0x0) 23:08:25 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x4000080000000000) 23:08:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xd001}, 0x0) [ 562.632759][T18694] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 562.667528][T18707] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:25 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x11}, 0x0) 23:08:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x7fffffffffffffff) 23:08:26 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {}, [{0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x34, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 562.815287][T18724] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 562.846127][T18728] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x12}, 0x0) 23:08:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xd203}, 0x0) 23:08:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f000000000000000200000002000000008005000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x8000000000000000) 23:08:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000048000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x25}, 0x0) [ 563.015089][T18747] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 563.035391][T18753] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xd403}, 0x0) 23:08:26 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {}, [], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x2c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x8cffffff00000000) 23:08:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:26 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {}, [], {}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x2c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 563.181958][T18765] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 563.206937][T18772] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x2f}, 0x0) 23:08:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xda03}, 0x0) 23:08:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000081404000001007d60b7030000000000006a0a00fe00000000850000001f000000b70000000000000095000000000000006623848adf1dab62931d861531fddf0180000071ff31f1622271d5518193e09483c5a020c3aa305d73869de3b1c7937c34f8c76334d9ce8205b01ddaa54d8756568836077b8471b6b69819782748b376358c0dc6d6c6317189b4c00733dc33c9753bfd989b1ca58949a54d5827df14feecea46a5c53e9c37251732f1061b973ef07bf7f53ce129a9ecd3b4dd15100ff2452f98526a0d8cacdaff79b4c5008652a7b4c0974486a8d203bddc62bb2d555a363adbc33b49e13fbd1757b2701acad0e2684120b99b8cff3f48c9411670c34faf7851b290feb3045aef0d6c169e33b870d1ff4a4d371b622f20c41d8418bc4159c14025422835e81c3573ae77dbae047913474be30000b5a981ff0000749289b44e97dba73f148ae8206afe120c1437492ac52903971b323f60332eb7ab5124d18e4eb69122b42f2173184c1d0fb3287c99b645f6e80e14e5d7c917c6695ebe4d94a85551714768383f465992c8862f66fa2a4a8ae4b4c84d9bee16a171ec36baddad3ec959de7bca54feea9adda9c99781750cf37cfc79d27f06843440f975fcb687bbc51cb98984670f194fb6a9dd457005444fdd23287a36c2e7b5f4f08cce000200000a502505f9db90ebf4efd5368425b1306e3d1cfd06963b1860049064703c47c184e9e7167874e765b1c3062e6c0000000000b400000000000000000000000000001b7f96b53b4e869c5b69dc0b3b334e34913ba4ea36dba4cfa318ee9d23378ffc32e52b86e625442f32f084e1f591fd08328f3f1853e8d4c7bbfbe6b5a0bde94d200ca1e721f9f26870deb8ed7bd52f2bf66fe4a8402fe388f4850cb454653d0e22be9af12f58d1ede97da8efcf8e060b0a0067782bd85b2b9168f1afffcaf0084e171c8befc0a8d9b7370c395189d388d63d318b1832b4fdbdba62d5380ec243d8619c76b38fdd112a2b7d73e3f13f9aba97fbaf99c64777be8311750e2985aca5c3f04fba58a9c2047a3e663046df9a3751506c054d666d84"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700004c000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:26 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {}, [], {}, [], {0x10, 0x5}, {0x20, 0x4}}, 0x24, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 563.332231][T18788] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 563.345037][T18789] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xd25cfcff00000000) 23:08:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x3a}, 0x0) 23:08:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 563.470047][T18811] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 563.493898][T18813] __nla_validate_parse: 165 callbacks suppressed [ 563.493902][T18813] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 563.502757][T18820] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:26 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {}, [], {}, [], {}, {0x20, 0x4}}, 0x24, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xe201}, 0x0) [ 563.523076][T18817] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 563.559801][T18813] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 23:08:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 563.586766][T18825] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 563.611899][T18831] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 563.614560][T18829] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x48}, 0x0) 23:08:26 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {}, [], {}, [], {}, {0x20, 0x4}}, 0x24, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 563.644965][T18820] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 563.654490][T18820] EXT4-fs: failed to create workqueue [ 563.660034][T18820] EXT4-fs (loop2): mount failed [ 563.662101][T18832] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 23:08:26 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {}, [], {}, [], {}, {0x20, 0x4}}, 0x24, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000068000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xf4ffffff00000000) [ 563.702955][T18843] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 563.735760][T18845] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 563.747325][T18846] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 23:08:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xe403}, 0x0) 23:08:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x4c}, 0x0) [ 563.773879][T18850] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 563.808365][T18852] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 23:08:27 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400), 0x24, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 563.871869][T18857] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:27 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xf6ffffff00000000) 23:08:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xea03}, 0x0) 23:08:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x5c}, 0x0) [ 563.930743][T18866] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:27 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400), 0x24, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700006c000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:27 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xfbffffff00000000) [ 564.037929][T18883] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 564.046289][T18884] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:27 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400), 0x24, 0x0) umount2(0x0, 0x0) 23:08:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xec03}, 0x0) 23:08:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x68}, 0x0) [ 564.139560][T18904] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 564.142535][T18898] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:27 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xfeffffff00000000) 23:08:27 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400), 0x24, 0x0) umount2(0x0, 0x0) 23:08:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xee03}, 0x0) 23:08:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x6c}, 0x0) 23:08:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000070000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:27 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400), 0x24, 0x0) umount2(0x0, 0x0) 23:08:27 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xff00000000000000) [ 564.326997][T18922] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 564.328962][T18924] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:27 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xfffbffff00000000) 23:08:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x68}, 0x0) [ 564.454244][T18946] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 564.483938][T18952] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x74}, 0x0) 23:08:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xf203}, 0x0) 23:08:27 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {}, [], {}, [], {}, {0x20, 0x4}}, 0x24, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 564.559978][T18958] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:27 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xffffffff00000000) 23:08:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000074000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 564.607336][T18965] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x7a}, 0x0) 23:08:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xfc00}, 0x0) 23:08:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:27 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f0001", 0x16, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 564.763704][T18985] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 564.784232][T18995] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 564.790032][T18998] EXT4-fs error (device loop3): ext4_fill_super:4589: inode #2: comm syz-executor.3: iget: root inode unallocated [ 564.805110][T18998] EXT4-fs (loop3): get root inode failed 23:08:28 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x8) 23:08:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x82}, 0x0) [ 564.811128][T18998] EXT4-fs (loop3): mount failed 23:08:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:28 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xffffffffffff0700) 23:08:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xfeff}, 0x0) 23:08:28 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x5) 23:08:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0xfc}, 0x0) [ 564.937618][T19013] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem 23:08:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000081404000001007d60b7030000000000006a0a00fe00000000850000001f000000b70000000000000095000000000000006623848adf1dab62931d861531fddf0180000071ff31f1622271d5518193e09483c5a020c3aa305d73869de3b1c7937c34f8c76334d9ce8205b01ddaa54d8756568836077b8471b6b69819782748b376358c0dc6d6c6317189b4c00733dc33c9753bfd989b1ca58949a54d5827df14feecea46a5c53e9c37251732f1061b973ef07bf7f53ce129a9ecd3b4dd15100ff2452f98526a0d8cacdaff79b4c5008652a7b4c0974486a8d203bddc62bb2d555a363adbc33b49e13fbd1757b2701acad0e2684120b99b8cff3f48c9411670c34faf7851b290feb3045aef0d6c169e33b870d1ff4a4d371b622f20c41d8418bc4159c14025422835e81c3573ae77dbae047913474be30000b5a981ff0000749289b44e97dba73f148ae8206afe120c1437492ac52903971b323f60332eb7ab5124d18e4eb69122b42f2173184c1d0fb3287c99b645f6e80e14e5d7c917c6695ebe4d94a85551714768383f465992c8862f66fa2a4a8ae4b4c84d9bee16a171ec36baddad3ec959de7bca54feea9adda9c99781750cf37cfc79d27f06843440f975fcb687bbc51cb98984670f194fb6a9dd457005444fdd23287a36c2e7b5f4f08cce000200000a502505f9db90ebf4efd5368425b1306e3d1cfd06963b1860049064703c47c184e9e7167874e765b1c3062e6c0000000000b400000000000000000000000000001b7f96b53b4e869c5b69dc0b3b334e34913ba4ea36dba4cfa318ee9d23378ffc32e52b86e625442f32f084e1f591fd08328f3f1853e8d4c7bbfbe6b5a0bde94d200ca1e721f9f26870deb8ed7bd52f2bf66fe4a8402fe388f4850cb454653d0e22be9af12f58d1ede97da8efcf8e060b0a0067782bd85b2b9168f1afffcaf0084e171c8befc0a8d9b7370c395189d388d63d318b1832b4fdbdba62d5380ec243d8619c76b38fdd112a2b7d73e3f13f9aba97fbaf99c64777be8311750e2985aca5c3f04fba58a9c2047a3e663046df9a3751506c054d666d84"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000378000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:28 executing program 3: chdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r2 = perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x43, 0xcc, 0x0, 0x0, 0x99c, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10001}, 0x9020, 0x217, 0x3, 0x9, 0x40, 0x0, 0x3ff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x9, 0x1, 0x0, 0x36, 0x0, 0x33631d0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x7e0000003}, 0x0, 0x100000000, 0x8000, 0x0, 0x2, 0xfffffff9, 0xff81}, r0, 0x1, r2, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r3) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x4}], {0x4, 0x4}, [{}], {0x10, 0x5}, {0x20, 0x4}}, 0x3c, 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:28 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xffffffffffffff7f) 23:08:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xff00}, 0x0) [ 565.000003][T19016] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 565.008352][T19020] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 565.024217][T19026] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem 23:08:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x196}, 0x0) 23:08:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f00000000000000020000000200000000802e000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x2a}, 0x0) [ 565.157259][T19039] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x1ca}, 0x0) 23:08:28 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff) 23:08:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700007a000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xff0f}, 0x0) [ 565.272849][T19053] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 565.296303][T19058] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x1d0}, 0x0) 23:08:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f000000000000000200000002000000008048000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:28 executing program 3 (fault-call:3 fault-nth:0): r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400), 0x24, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:28 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000340)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000000200)="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", 0x13d, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed410007000000000000005fd1f4655fd1f4651ff40000000000040002", 0xfffffe18, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @link_local}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)={'syz0', "4fb218f6a3a86721c5a45f698c9d38a95f94aa118fcdc1c8a87220cd63158bf980955902c2747b1e56f0cc0ddfdf9ee2cfb7295e80c867e9e0ebe7cc4002c39572b3c240504dea"}, 0x4b) [ 565.391495][T19068] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 565.430840][T19082] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 565.516280][T19086] FAULT_INJECTION: forcing a failure. [ 565.516280][T19086] name failslab, interval 1, probability 0, space 0, times 0 [ 565.530444][T19086] CPU: 1 PID: 19086 Comm: syz-executor.3 Not tainted 5.4.105-syzkaller-00495-g11abbf486c2e #0 [ 565.540693][T19086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 565.551028][T19086] Call Trace: [ 565.554457][T19086] dump_stack+0x1d8/0x24e [ 565.558970][T19086] ? devkmsg_release+0x11c/0x11c [ 565.564257][T19086] ? show_regs_print_info+0x12/0x12 [ 565.569468][T19086] ? proc_fail_nth_write+0x1d5/0x240 [ 565.574757][T19086] should_fail+0x6f6/0x860 [ 565.579173][T19086] ? setup_fault_attr+0x3d0/0x3d0 [ 565.584193][T19086] ? memset+0x1f/0x40 [ 565.587510][T19094] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 565.588190][T19086] ? getname_flags+0xba/0x640 [ 565.599510][T19086] should_failslab+0x5/0x20 [ 565.604349][T19086] kmem_cache_alloc+0x36/0x290 [ 565.609133][T19086] getname_flags+0xba/0x640 [ 565.613628][T19086] user_path_mountpoint_at+0x22/0x40 [ 565.618943][T19086] ksys_umount+0x162/0xfa0 [ 565.623374][T19086] ? vfs_write+0x422/0x4e0 [ 565.627775][T19086] ? fput_many+0x42/0x1a0 [ 565.632131][T19086] ? check_preemption_disabled+0x154/0x330 [ 565.638263][T19086] ? namespace_unlock+0x4f0/0x4f0 [ 565.643371][T19086] ? __ia32_sys_read+0x80/0x80 [ 565.648470][T19086] __x64_sys_umount+0x56/0x60 [ 565.653230][T19086] do_syscall_64+0xcb/0x1e0 [ 565.658098][T19086] entry_SYSCALL_64_after_hwframe+0x44/0xa9 23:08:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000004000000003000000300000000f00000000000000020000000200000000804c000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000eaf4655f000000000000000001000000000000000b00000000023e8af5e46772507274b0d12b8fc9300b80e1192dd6b66cd2878e3107d1b452209e695f35a176fc839c00d6d8c8d48b3d61360580af6c229f3121ae0464d564c6fb11038e16f70bb99bac465b8701a36b3bff51cd39f083789141be98ab47a6099dbaa18210a813d010ebfa07bc9d2b9caa5d00c27ce3e527f9bbfee70600000000000000000000006816c9c75571cd6086fe6f3d4aaeeaeca5e86b7917feb23ec8d923a125574397458175d8468d1120a6bbe74b4116da6949a769846e50034c808d3272c9851d326c9318201ab353ea453cd84ef4a5bfd538fe9351755bd2e25b6195ba3748fe8ad047f31022fb102bf9e3b93c2ad833fda7e6920ca4be7613de22a7", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xff7f}, 0x0) [ 565.663971][T19086] RIP: 0033:0x465f69 [ 565.668007][T19086] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 565.687765][T19086] RSP: 002b:00007f92ce11f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 565.696196][T19086] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465f69 [ 565.704934][T19086] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 23:08:28 executing program 3 (fault-call:3 fault-nth:1): r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400), 0x24, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:28 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) open(&(0x7f0000000000)='./file0\x00', 0x300, 0x100) 23:08:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x23c}, 0x0) [ 565.713172][T19086] RBP: 00007f92ce11f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 565.721422][T19086] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 565.729578][T19086] R13: 00007ffe33ed7e4f R14: 00007f92ce11f300 R15: 0000000000022000 23:08:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="4800000010000507000081000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0xfffe}, 0x0) 23:08:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x262}, 0x0) [ 565.832712][T19104] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 565.859133][T19111] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:29 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="30000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f46501000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 565.917937][T19113] FAULT_INJECTION: forcing a failure. [ 565.917937][T19113] name failslab, interval 1, probability 0, space 0, times 0 [ 565.937086][T19127] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 565.959075][T19113] CPU: 1 PID: 19113 Comm: syz-executor.3 Not tainted 5.4.105-syzkaller-00495-g11abbf486c2e #0 [ 565.969590][T19113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 565.979768][T19113] Call Trace: [ 565.983064][T19113] dump_stack+0x1d8/0x24e [ 565.987387][T19113] ? devkmsg_release+0x11c/0x11c [ 565.992330][T19113] ? show_regs_print_info+0x12/0x12 [ 565.997621][T19113] ? is_bpf_text_address+0x280/0x2a0 [ 566.003214][T19113] should_fail+0x6f6/0x860 [ 566.008023][T19113] ? setup_fault_attr+0x3d0/0x3d0 [ 566.013279][T19113] ? arch_stack_walk+0xf8/0x140 [ 566.018224][T19113] ? mempool_alloc_slab+0x16/0x20 [ 566.023340][T19113] should_failslab+0x5/0x20 [ 566.027834][T19113] kmem_cache_alloc+0x36/0x290 [ 566.032679][T19113] ? stack_trace_save+0x120/0x1f0 [ 566.037951][T19113] ? mempool_free+0x380/0x380 [ 566.042606][T19113] mempool_alloc_slab+0x16/0x20 [ 566.048283][T19113] mempool_alloc+0x113/0x680 [ 566.053153][T19113] ? check_preemption_disabled+0x154/0x330 [ 566.059123][T19113] ? debug_smp_processor_id+0x20/0x20 [ 566.064477][T19113] ? check_preemption_disabled+0x154/0x330 [ 566.070355][T19113] ? mempool_resize+0x900/0x900 [ 566.075552][T19113] ? __rcu_read_lock+0x50/0x50 [ 566.081044][T19113] bio_alloc_bioset+0x1db/0x640 [ 566.086064][T19113] ? __test_set_page_writeback+0x897/0x9e0 [ 566.091875][T19113] ? bio_chain_endio+0xf0/0xf0 [ 566.096669][T19113] ? test_clear_page_writeback+0x7a0/0x7a0 [ 566.102546][T19113] ? wake_up_bit+0x97/0x1c0 [ 566.107273][T19113] ? rmap_walk+0xd0/0xd0 [ 566.111580][T19113] submit_bh_wbc+0x1ba/0x790 [ 566.116494][T19113] ? create_page_buffers+0x156/0x1c0 [ 566.121792][T19113] __block_write_full_page+0x862/0xe50 [ 566.127236][T19113] ? mark_buffer_write_io_error+0x1e0/0x1e0 [ 566.133222][T19113] ? blkdev_direct_IO+0x1e60/0x1e60 [ 566.138687][T19113] __writepage+0x5d/0x110 [ 566.142998][T19113] write_cache_pages+0x7d9/0xdc0 [ 566.148262][T19113] ? generic_writepages+0x160/0x160 [ 566.153450][T19113] ? tag_pages_for_writeback+0x570/0x570 [ 566.159058][T19113] ? dequeue_entity+0x892/0xdf0 [ 566.163981][T19113] ? _raw_spin_lock+0x1b0/0x1b0 [ 566.169010][T19113] generic_writepages+0xf8/0x160 [ 566.173935][T19113] ? clear_page_dirty_for_io+0x650/0x650 [ 566.179544][T19113] ? blkdev_readpage+0x20/0x20 [ 566.184289][T19113] do_writepages+0x13a/0x280 [ 566.189123][T19113] ? __writepage+0x110/0x110 [ 566.193925][T19113] ? dqput+0x770/0x770 [ 566.198155][T19113] filemap_flush+0x274/0x340 [ 566.202757][T19113] ? filemap_fdatawrite_range+0x390/0x390 [ 566.208862][T19113] ? ext4_put_super+0xbf0/0xbf0 [ 566.214065][T19113] ? get_nr_dirty_inodes+0x23b/0x2a0 [ 566.219532][T19113] ? ext4_put_super+0xbf0/0xbf0 [ 566.224563][T19113] sync_filesystem+0x131/0x200 [ 566.229413][T19113] generic_shutdown_super+0x6b/0x2a0 [ 566.235029][T19113] kill_block_super+0x79/0xd0 [ 566.239703][T19113] deactivate_locked_super+0xaf/0x100 [ 566.245068][T19113] deactivate_super+0x1b3/0x270 [ 566.249909][T19113] ? deactivate_locked_super+0x100/0x100 [ 566.255515][T19113] ? dput+0x4de/0x5d0 [ 566.259476][T19113] ? _raw_spin_lock_irqsave+0x210/0x210 [ 566.265098][T19113] ? find_next_bit+0xc6/0x110 [ 566.269750][T19113] cleanup_mnt+0x432/0x4e0 [ 566.274164][T19113] ? __ia32_sys_read+0x80/0x80 [ 566.279006][T19113] task_work_run+0x186/0x1b0 [ 566.283574][T19113] prepare_exit_to_usermode+0x2b0/0x310 [ 566.289502][T19113] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 566.295529][T19113] RIP: 0033:0x465f69 [ 566.299406][T19113] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:08:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 566.319772][T19113] RSP: 002b:00007f92ce11f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 566.328365][T19113] RAX: 0000000000000000 RBX: 000000000056bf60 RCX: 0000000000465f69 [ 566.336693][T19113] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 566.345422][T19113] RBP: 00007f92ce11f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 566.353653][T19113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 566.361602][T19113] R13: 00007ffe33ed7e4f R14: 00007f92ce11f300 R15: 0000000000022000 23:08:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x30000}, 0x0) 23:08:29 executing program 3 (fault-call:3 fault-nth:2): r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400), 0x24, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:29 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 23:08:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x28a}, 0x0) [ 566.466198][T19138] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 566.502211][T19146] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 566.548051][T19148] FAULT_INJECTION: forcing a failure. [ 566.548051][T19148] name failslab, interval 1, probability 0, space 0, times 0 [ 566.569039][T19154] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 566.570138][T19148] CPU: 0 PID: 19148 Comm: syz-executor.3 Not tainted 5.4.105-syzkaller-00495-g11abbf486c2e #0 [ 566.587446][T19148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 566.597498][T19148] Call Trace: [ 566.600787][T19148] dump_stack+0x1d8/0x24e [ 566.605128][T19148] ? devkmsg_release+0x11c/0x11c [ 566.610152][T19148] ? show_regs_print_info+0x12/0x12 [ 566.615364][T19148] ? update_io_ticks+0x1c5/0x1e0 [ 566.620297][T19148] ? blk_account_io_start+0x436/0x4f0 [ 566.625753][T19148] should_fail+0x6f6/0x860 [ 566.630182][T19148] ? setup_fault_attr+0x3d0/0x3d0 [ 566.635356][T19148] ? mempool_alloc_slab+0x16/0x20 [ 566.640443][T19148] should_failslab+0x5/0x20 [ 566.645132][T19148] kmem_cache_alloc+0x36/0x290 [ 566.649977][T19148] ? mempool_free+0x380/0x380 [ 566.654733][T19148] mempool_alloc_slab+0x16/0x20 [ 566.659735][T19148] mempool_alloc+0x113/0x680 [ 566.664477][T19148] ? check_preemption_disabled+0x154/0x330 [ 566.670257][T19148] ? blk_mq_requeue_work+0x9c0/0x9c0 [ 566.675516][T19148] ? debug_smp_processor_id+0x20/0x20 [ 566.680996][T19148] ? check_preemption_disabled+0x154/0x330 [ 566.686803][T19148] ? mempool_resize+0x900/0x900 [ 566.691658][T19148] ? __rcu_read_lock+0x50/0x50 [ 566.696670][T19148] bio_alloc_bioset+0x1db/0x640 [ 566.701631][T19148] ? __test_set_page_writeback+0x897/0x9e0 [ 566.707625][T19148] ? bio_chain_endio+0xf0/0xf0 [ 566.712372][T19148] ? test_clear_page_writeback+0x7a0/0x7a0 [ 566.718244][T19148] ? wake_up_bit+0x97/0x1c0 [ 566.722726][T19148] ? rmap_walk+0xd0/0xd0 [ 566.726963][T19148] submit_bh_wbc+0x1ba/0x790 [ 566.731653][T19148] ? create_page_buffers+0x156/0x1c0 [ 566.737015][T19148] __block_write_full_page+0x862/0xe50 [ 566.743331][T19148] ? mark_buffer_write_io_error+0x1e0/0x1e0 [ 566.749197][T19148] ? blkdev_direct_IO+0x1e60/0x1e60 [ 566.754370][T19148] __writepage+0x5d/0x110 [ 566.758672][T19148] write_cache_pages+0x7d9/0xdc0 [ 566.763587][T19148] ? generic_writepages+0x160/0x160 [ 566.768759][T19148] ? tag_pages_for_writeback+0x570/0x570 [ 566.774377][T19148] ? _raw_spin_lock+0x1b0/0x1b0 [ 566.779212][T19148] generic_writepages+0xf8/0x160 [ 566.784150][T19148] ? clear_page_dirty_for_io+0x650/0x650 [ 566.789858][T19148] ? blkdev_readpage+0x20/0x20 [ 566.794604][T19148] do_writepages+0x13a/0x280 [ 566.799260][T19148] ? __writepage+0x110/0x110 [ 566.804458][T19148] ? dqput+0x770/0x770 [ 566.809204][T19148] filemap_flush+0x274/0x340 [ 566.813869][T19148] ? filemap_fdatawrite_range+0x390/0x390 [ 566.819800][T19148] ? ext4_put_super+0xbf0/0xbf0 [ 566.824627][T19148] ? get_nr_dirty_inodes+0x23b/0x2a0 [ 566.829984][T19148] ? ext4_put_super+0xbf0/0xbf0 [ 566.834924][T19148] sync_filesystem+0x131/0x200 [ 566.839694][T19148] generic_shutdown_super+0x6b/0x2a0 [ 566.845243][T19148] kill_block_super+0x79/0xd0 [ 566.849984][T19148] deactivate_locked_super+0xaf/0x100 [ 566.855333][T19148] deactivate_super+0x1b3/0x270 [ 566.860266][T19148] ? deactivate_locked_super+0x100/0x100 [ 566.866244][T19148] ? dput+0x4de/0x5d0 [ 566.870562][T19148] ? _raw_spin_lock_irqsave+0x210/0x210 [ 566.876172][T19148] ? find_next_bit+0xc6/0x110 [ 566.880833][T19148] cleanup_mnt+0x432/0x4e0 [ 566.885509][T19148] ? __ia32_sys_read+0x80/0x80 [ 566.890823][T19148] task_work_run+0x186/0x1b0 [ 566.895402][T19148] prepare_exit_to_usermode+0x2b0/0x310 [ 566.900927][T19148] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 566.907091][T19148] RIP: 0033:0x465f69 [ 566.910961][T19148] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 566.931757][T19148] RSP: 002b:00007f92ce11f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 566.940378][T19148] RAX: 0000000000000000 RBX: 000000000056bf60 RCX: 0000000000465f69 23:08:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)=@v1={0x0, @aes256, 0x1, @desc4='\x85\xba\xa1t\xf0\xcb\x11B'}) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="48000000100005070003c2000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x34000}, 0x0) [ 566.948484][T19148] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 566.956874][T19148] RBP: 00007f92ce11f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 566.965082][T19148] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 566.973220][T19148] R13: 00007ffe33ed7e4f R14: 00007f92ce11f300 R15: 0000000000022000 23:08:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x300}, 0x0) 23:08:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:30 executing program 3 (fault-call:3 fault-nth:3): r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400), 0x24, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 567.030674][T19165] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 567.097365][T19170] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x34e}, 0x0) 23:08:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/191, 0xbf}, {&(0x7f0000000480)=""/241, 0xf1}], 0x3, 0x7, 0x1) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 567.152877][T19180] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x40000}, 0x0) 23:08:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="48000000100005070003ce000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:30 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400), 0x24, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x3c2}, 0x0) 23:08:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 567.322419][T19194] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x3c4}, 0x0) 23:08:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x400300}, 0x0) 23:08:30 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400), 0x24, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) [ 567.407011][T19204] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 567.427476][T19217] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x804}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x2800051, &(0x7f0000012900)=ANY=[]) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0xff, 0x0, 0x11, 0x0, 0x0, 0x10000, 0x9, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8, 0x3}, 0x8000, 0x4, 0x3, 0x7, 0xcddd, 0x7, 0x200}, 0x0, 0x8, 0xffffffffffffffff, 0x9) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x3c6}, 0x0) 23:08:30 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400), 0x24, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x3) 23:08:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000004, 0x10, r1, 0x79c78000) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="48000000100005070003e0000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) 23:08:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x1000000}, 0x0) [ 567.568074][T19237] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 567.586105][T19237] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 567.598833][T19237] EXT4-fs (loop2): group descriptors corrupted! 23:08:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @link_local}]}, 0x40}}, 0x0) write$binfmt_script(r1, &(0x7f0000000480)={'#! ', './file0', [{0x20, 'ext2\x00'}, {0x20, './'}, {0x20, '/)+]\\%,*{$&'}, {0x20, '^\\@..#.-'}, {0x20, '%'}], 0xa, "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"}, 0x102b) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 567.642196][T19239] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x3da}, 0x0) 23:08:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:30 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400), 0x24, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 23:08:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x2000000}, 0x0) 23:08:31 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400), 0x24, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x5) [ 567.801097][T19271] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x3e2}, 0x0) 23:08:31 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r1) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x7f, 0x8, 0x7f, 0x20, 0x0, 0x4, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xdca, 0x4, @perf_config_ext={0x4, 0x2}, 0x2600, 0x0, 0x3, 0x5, 0x6, 0x3, 0x9}, 0x0, 0x4, r0, 0x2) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 23:08:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="48000000100005070000fc000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 567.860499][T19277] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x3000000}, 0x0) 23:08:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:31 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400), 0x24, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x6) 23:08:31 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) r1 = perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x43, 0xcc, 0x0, 0x0, 0x99c, 0x0, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10001}, 0x9020, 0x217, 0x3, 0x9, 0x40, 0x0, 0x3ff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x9, 0x1, 0x0, 0x36, 0x0, 0x33631d0, 0x80400, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x7e0000003}, 0x1, 0x100000000, 0x8000, 0x0, 0x2, 0xfffffff9, 0xff81}, r0, 0x1, r1, 0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x98, 0x4, 0x0, 0x81, 0x0, 0x800, 0x8, 0xa, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x10040, 0x7e, 0x9, 0x4, 0xff, 0xffffff9b, 0x7f66}, r0, 0x9, 0xffffffffffffffff, 0x1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f00000001c0)='.log\x00', 0x140, 0x101) perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0xc, 0x81, 0xb1, 0x0, 0x0, 0xd537, 0x4141, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5be17f48, 0x4, @perf_config_ext={0xa35f, 0x97f}, 0x8000, 0x3, 0x80000001, 0x0, 0x401, 0x7, 0x101}, r0, 0x9, r2, 0x8) r3 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r3) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$incfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='incremental-fs\x00', 0x1004005, &(0x7f0000000280)={[{@rlog_pages={'rlog_pages', 0x3d, 0x2}}], [{@audit='audit'}, {@fowner_gt={'fowner>', 0xee00}}, {@euid_eq={'euid', 0x3d, r4}}]}) 23:08:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x3e4}, 0x0) [ 568.014625][T19303] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 568.046533][T19303] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 23:08:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) [ 568.063224][T19312] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x4000000}, 0x0) 23:08:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}, 0x1, 0x0, 0x3e8}, 0x0) 23:08:31 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) close(r0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000400), 0x24, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x7) [ 568.175407][T19333] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 568.190903][T19333] incfs: Options parsing error. -22 [ 568.202795][T19332] EXT4-fs (loop1): Unrecognized mount option "" or missing value 23:08:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[]) 23:08:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700fffe000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100a8dd25f1462cb73fe05bc8d83f50aee37f4bd1bcd1c0257cae2d497e189e1ce1cf27b40440f6ff4edd9a2d4c8d4b78310f3ce8511fec46baecde896df6a31d2961", @ANYRES32=r5, @ANYBLOB], 0x48}}, 0x0) [ 568.226464][T19343] incfs: Can't find or create .index dir in ./file0 23:08:31 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0xd35, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x400, &(0x7f0000012900)=ANY=[]) close(r0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x110, r1, 0xb6a73000) r2 = creat(&(0x7f0000000000)='./file0\x00', 0xc0) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) fstat(r3, &(0x7f0000000800)) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @link_local}]}, 0x40}}, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) fstat(r6, &(0x7f0000000800)) io_submit(0x0, 0x3, &(0x7f00000003c0)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x3, 0x5, r2, &(0x7f0000000200)="18f69245a52ec76d6b67205193bf6d8a20972ed5ae34f1b7d444400f1af85ce12b09f571f2bcc30972896c8ddec627b7ab39c233198bbdbb092d8ceb9c018551f45a6fe436aad5af84a03f8e6ec3bf22cab2236692bae35f50eab6eb815ccb9f9e270d903f50106407fee255012ed80167823a5777fadc804e7df65f2427c10308", 0x81, 0x3ff, 0x0, 0x2, r3}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2, 0x0, r4, &(0x7f00000000c0)="6906ef8ce4bc5d5388c9413e153e38cc8e8b5e2a10584638e36a4f4e96ae4c35293fd1702387b41f", 0x28, 0x4, 0x0, 0x2}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0xff, r5, &(0x7f00000002c0)="d4c00bfe474476c214d82f104298b56893cac12e33cbaa3c768ffe466adb8043d6d48fc4746bfc1c348deed012d48b616a66abcb0930ee46664e4af715d468d3c270b1753a528fbead881dddff5d33dba972d3c22bfc76221fe1b5b2bb0fadd3e508b6135e6d431e35afa12fe4a7ef6076b0844bef4b8ef9a006ae66d84ba95c7d96b7bdf8be5a1be8a9b7a83c24d10d94", 0x91, 0x0, 0x0, 0x1, r6}]) [ 568.311119][ T359] BUG: Dentry ffff88819bb16aa0{i=0,n=.index} still in use (1) [unmount of ext2 loop2] [ 568.320925][ T359] ------------[ cut here ]------------ [ 568.326693][ T359] WARNING: CPU: 1 PID: 359 at fs/dcache.c:1597 umount_check+0x179/0x1c0 [ 568.335183][ T359] Kernel panic - not syncing: panic_on_warn set ... [ 568.341969][ T359] CPU: 1 PID: 359 Comm: syz-executor.2 Not tainted 5.4.105-syzkaller-00495-g11abbf486c2e #0 [ 568.352275][ T359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 568.362843][ T359] Call Trace: [ 568.366348][ T359] dump_stack+0x1d8/0x24e [ 568.370692][ T359] ? devkmsg_release+0x11c/0x11c [ 568.375708][ T359] ? show_regs_print_info+0x12/0x12 [ 568.380891][ T359] ? vprintk_store+0x680/0x680 [ 568.385736][ T359] ? console_trylock+0x166/0x1c0 [ 568.390742][ T359] ? umount_check+0x150/0x1c0 [ 568.395405][ T359] ? umount_check+0x150/0x1c0 [ 568.400166][ T359] panic+0x285/0x740 [ 568.404045][ T359] ? __warn+0xfa/0x200 [ 568.408093][ T359] ? nmi_panic+0x90/0x90 [ 568.412409][ T359] ? devkmsg_release+0x11c/0x11c [ 568.417332][ T359] ? is_valid_bugaddr+0xa0/0x150 [ 568.422343][ T359] ? umount_check+0x179/0x1c0 [ 568.427151][ T359] __warn+0x1f1/0x200 [ 568.431256][ T359] ? umount_check+0x179/0x1c0 [ 568.436017][ T359] report_bug+0x380/0x4d0 [ 568.440422][ T359] ? umount_check+0x179/0x1c0 [ 568.445076][ T359] do_invalid_op+0x6e/0x110 [ 568.449903][ T359] invalid_op+0x1e/0x30 [ 568.454041][ T359] RIP: 0010:umount_check+0x179/0x1c0 [ 568.459400][ T359] Code: ff 4c 8b 0b 48 81 c5 20 04 00 00 48 c7 c7 60 e9 e8 84 4c 89 fe 4c 89 f2 4c 89 f9 45 89 e8 31 c0 55 e8 b7 e9 af ff 48 83 c4 08 <0f> 0b e9 fd fe ff ff 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c d4 fe ff [ 568.479189][ T359] RSP: 0000:ffff8881a8aa7c58 EFLAGS: 00010282 [ 568.485247][ T359] RAX: 0000000000000054 RBX: ffffffff85fa92e0 RCX: f072619751906e00 [ 568.493374][ T359] RDX: 0000000000000000 RSI: 0000000080000002 RDI: 0000000000000000 [ 568.501440][ T359] RBP: ffff8881693a9420 R08: ffffffff814e8047 R09: ffffed103ede5e08 [ 568.509490][ T359] R10: ffffed103ede5e08 R11: 0000000000000000 R12: dffffc0000000000 [ 568.517443][ T359] R13: 0000000000000001 R14: 0000000000000000 R15: ffff88819bb16aa0 [ 568.525532][ T359] ? vprintk_emit+0x457/0x4c0 [ 568.530192][ T359] d_walk+0x2d9/0x540 [ 568.534155][ T359] ? __d_free+0x20/0x20 [ 568.538291][ T359] shrink_dcache_for_umount+0x8a/0x1a0 [ 568.543728][ T359] generic_shutdown_super+0x63/0x2a0 [ 568.548993][ T359] kill_block_super+0x79/0xd0 [ 568.553656][ T359] deactivate_locked_super+0xaf/0x100 [ 568.559034][ T359] deactivate_super+0x1b3/0x270 [ 568.563869][ T359] ? deactivate_locked_super+0x100/0x100 [ 568.570262][ T359] ? dput+0x4de/0x5d0 [ 568.574225][ T359] ? _raw_spin_lock_irqsave+0x210/0x210 [ 568.579777][ T359] ? find_next_bit+0xc6/0x110 [ 568.584434][ T359] cleanup_mnt+0x432/0x4e0 [ 568.588918][ T359] task_work_run+0x186/0x1b0 [ 568.593489][ T359] prepare_exit_to_usermode+0x2b0/0x310 [ 568.599109][ T359] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 568.604979][ T359] RIP: 0033:0x4673c7 [ 568.608856][ T359] Code: ff d0 48 89 c7 b8 3c 00 00 00 0f 05 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 568.628629][ T359] RSP: 002b:00007ffdbc921ba8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 568.637401][ T359] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000004673c7 [ 568.645454][ T359] RDX: 00007ffdbc921c7c RSI: 0000000000000002 RDI: 00007ffdbc921c70 [ 568.653544][ T359] RBP: 00007ffdbc921c70 R08: 00000000ffffffff R09: 00007ffdbc921a40 [ 568.661777][ T359] R10: 0000000002237b9b R11: 0000000000000246 R12: 00000000004beb82 [ 568.669739][ T359] R13: 00007ffdbc922d40 R14: 0000000002237b00 R15: 00007ffdbc922d80 [ 568.678922][ T359] Kernel Offset: disabled [ 568.683245][ T359] Rebooting in 86400 seconds..