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", 0xffa, 0x1}, {&(0x7f0000001380)="0beab6621e1d9c0dc26e6c36af3eea68c63b4f3eadebb045752f644dc4fa1236f33d679b6eef51f9c3123c14fd41254d79fc50ecb818abf1a4ef7b39cce4e6158f55f639c8d228db3a4016cfe995d1237d2ffc886e9139c207cb966e31e2f545c3d168ceed6ea5fc42a5e03726f4a66462d5381eb1bae85e96b65c7236253c348f2b654feed4687660110f00c1f3d2423d4b5573d237e653f5cb0532a338a6d0dc22284f16292acf819f70bbde4e7be8dfd242d57cbf553c9401333b693042e09954622bc7869334d490108a358147e8d3ac886b4841c84a29f5e4827542d95577f18331f007909c40728e125859ec962c00000000", 0xf5, 0x2}], 0x0, &(0x7f0000002580)={[{@fat=@discard}, {@rodir}], [{@fsname={'fsname', 0x3d, 'ext4\x00'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@seclabel}, {@subj_user={'subj_user', 0x3d, ',}/'}}, {@uid_eq={'uid', 0x3d, r3}}, {@hash}, {@smackfsroot={'smackfsroot', 0x3d, 'fsname'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x80) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0x5d}, {&(0x7f0000000400)="0a9e886070070a68d14f25cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(r1, 0x0, 0x4dca) sendto$inet6(r1, &(0x7f0000000100)="3099096775a9865021c1e44f71cf43f824bc9eb0de5a4fbdb87d263cb07c8e9759a9c22fd063d4b320fe69fe1013ec3648ca55757625cc98d1405a774bc435c63786dab4003fb4ad8e3528398571dd0ec5a0abb026655fc74f66eeab8ad25a080cc871a3c8c3d174af39b14773f879758ea71fb0636e160c758e469e7387f206b3a60ce5c02e4f6cf638aa6ca49f1e4425dc24637980d408cd2f2250a7", 0x9d, 0x0, &(0x7f0000000080)={0xa, 0x4e21, 0x1, @mcast1, 0xfa}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f00000000c0)="044aac2f", 0x4, 0x20000fec, &(0x7f0000b63fe4)={0xa, 0x2, 0xe000000, @rand_addr, 0x1000000}, 0x1c) [ 560.107675][ T8778] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 560.139556][ T8782] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user 20:00:39 executing program 2: ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000040)={0x1ff, 0x5, 0xff}) syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) sync() mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f00000004c0)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x30060e5, &(0x7f0000001a40)=ANY=[@ANYBLOB="f0d5209b359d0f27d0ed704d0f7a1b0b6cbb8c682f40e1fe7be94d9bde3a1ffb07de6ff57682a2e6c6125a632ad25bc57b25ce287f0a57131040784f4ba277eedb66e71abab4ff642adfb6010e47b3883681d755e299"]) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000200)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0xfffff, r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000200)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0xfffff, r1) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000040), 0x0, 0x0, r1) add_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000200)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0xfffff, r2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85", 0xe3}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0x5d}, {&(0x7f0000000400)="0a9e886070070a68d14f25cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(r3, 0x0, 0x4dca) 20:00:39 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:39 executing program 4: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) 20:00:39 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x181002, 0x1) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) clone(0x280000, &(0x7f0000000080)="ff9dbf9d1b251cd201a38096eb4d98680b910c354392527bfda34e6801011c838228242d", &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000280)="2bf723a1b31ac5cacd8c0ab205b9cd129346403e087a936d1110e194b597e82bd71ef5aee4b3c823b8c33c76949bcf85a973ee108f7e0b758bd667168a6538a8224e12b0d356f507625e6e6f1a8743d5bc23024635f6efa06404fb3ad945e1702fd8ec96a235f8bb39b8848c857601022b0fc4cbe482c86bb3c7c60bf10c8c0e55a8402b8392fb5e0eada63277052835bb4bf68ce2908811b65e0fde524d432b991094bb8935d4ecb11a94213ebf6fb042e2b56da3691b2da8785d49b0a4f9a165e45ddc7ba8ffb55710681da23d6717c9b07c4471ba3f7290c64cb2e1cd9bd7a1c8cd656cbafc") syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x31388a0, &(0x7f0000000100)=ANY=[]) 20:00:39 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r4, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0xfffffffffffffdf0}, {&(0x7f0000000400)="0a9ee108d895327b29a025cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(r4, 0x0, 0x4dca) fcntl$addseals(r1, 0x409, 0x0) ioctl$BTRFS_IOC_RESIZE(r0, 0x50009403, &(0x7f0000001500)={{r4}, {@val, @max}}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfff, 0x4, &(0x7f0000000180)=[{&(0x7f0000000140)="bae29d449c42a60a13eada5b55ee9d8c49c06cc3f622ce", 0x17, 0x42508281}, {&(0x7f0000000280)="bbb43aa7ae5f5c43e05cd6cf9d38fcf53b6a345511143db4d9f8c6b7a797620fc1189735249c2172b5815ee2045fc5d259530f0bdd27da1e4b6c71d259cad16c3da4f7c5946337d502d890e61fd6b870cf8b4c16a5db25590ad68c23b10afe82b32014013de393bd31019767d7ef55d2c25e7eab7ba4ba32021dd798be6b542e5ee3c46a72ff503f09ffb0a92e56f4bc15b98d7e6249e9a8ffae1e45f023dab42c38de3d29a2ca22758a1ddc79b5d4d1d2241a752fa6662aafdf12429d7d1cea9e4c7eb08d9d2e3b3c2652b07a7ebf45cae7faa8347a2592aff9ca7d7185", 0xde, 0x2}, {&(0x7f0000000380)="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", 0xffa, 0x1}, {&(0x7f0000001380)="0beab6621e1d9c0dc26e6c36af3eea68c63b4f3eadebb045752f644dc4fa1236f33d679b6eef51f9c3123c14fd41254d79fc50ecb818abf1a4ef7b39cce4e6158f55f639c8d228db3a4016cfe995d1237d2ffc886e9139c207cb966e31e2f545c3d168ceed6ea5fc42a5e03726f4a66462d5381eb1bae85e96b65c7236253c348f2b654feed4687660110f00c1f3d2423d4b5573d237e653f5cb0532a338a6d0dc22284f16292acf819f70bbde4e7be8dfd242d57cbf553c9401333b693042e09954622bc7869334d490108a358147e8d3ac886b4841c84a29f5e4827542d95577f18331f007909c40728e125859ec962c00000000", 0xf5, 0x2}], 0x0, &(0x7f0000002580)={[{@fat=@discard}, {@rodir}], [{@fsname={'fsname', 0x3d, 'ext4\x00'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@seclabel}, {@subj_user={'subj_user', 0x3d, ',}/'}}, {@uid_eq={'uid', 0x3d, r3}}, {@hash}, {@smackfsroot={'smackfsroot', 0x3d, 'fsname'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x80) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000003c0)="20ad687326d16ea6aa1d12837be9a2677ed49d8a73e4b437c663923ba5c1e092ecbfbad4852c83db38dc0905a8ecbe4281a9df978cbf61463ecb7c13d8e34c7c47a1ad13deff08051d23fbb6224476a1fdfae795e3d520e4d4dc7232d66bfb85e7adbc6c29dd47de25dfb81bcbbf81dd6d9fbaff19dc9e8601e5287a5f0d63f13bdb76355b00965fceb9c2301e650e672e75fded9356e6176f64bea946bc4a35efe7cf97ac9871f925028d", 0xab, 0x44, &(0x7f0000000480)={0xa, 0x4e24, 0x566, @dev={0xfe, 0x80, '\x00', 0x25}, 0x5b}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f0000000040)=0x40, 0x4) r1 = syz_open_dev$vcsu(&(0x7f00000000c0), 0x5, 0x20000) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000100)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000140)="a0837778036ba079830259796006bb06c570a70638fd8745e09685682e710f4dbb171d209c790ceb15f0f26705fc5254d97f319da644d97aac8cc68759ccc83202cc248e4fd71778d5a3205222094d31595f15fef43aeff4ab0db51cc42216b78c701a4556544c448cfdd77d9fd5949720ab224a76184d5280cf142affc69af8cfc9c20caae8c8ae700000000000000000", 0x91, 0x538e6c5e7721ed56, &(0x7f0000b63fe4)={0xa, 0x4e21, 0xdfffffd, @mcast2, 0x1000000}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000340)={@local, 0x1, 0x0, 0xff, 0xa, 0x8001, 0x4}, 0x20) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r3, 0x0, r4, 0x0, 0xffffffff, 0x0) getsockopt$inet6_tcp_buf(r3, 0x6, 0xb, &(0x7f00000004c0)=""/170, &(0x7f0000000580)=0xaa) openat2(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', &(0x7f0000000380)={0x10b101, 0xa1}, 0x18) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x500ac220}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="080025bd70004a93f4c55211c5f57dbaab0cdb64fcdbdf25040000000800020080000000050005006100000010000400a289000000800000040000000800020007000000080003000300000005000500040000000500050001000000050006001f000000"], 0x5c}, 0x1, 0x0, 0x0, 0x40}, 0x80) 20:00:39 executing program 2: ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000040)={0x1ff, 0x5, 0xff}) syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) sync() mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f00000004c0)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x30060e5, &(0x7f0000001a40)=ANY=[@ANYBLOB="f0d5209b359d0f27d0ed704d0f7a1b0b6cbb8c682f40e1fe7be94d9bde3a1ffb07de6ff57682a2e6c6125a632ad25bc57b25ce287f0a57131040784f4ba277eedb66e71abab4ff642adfb6010e47b3883681d755e299"]) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000200)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0xfffff, r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000200)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0xfffff, r1) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000040), 0x0, 0x0, r1) add_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000200)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0xfffff, r2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f084", 0x5d}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0x5d}, {&(0x7f0000000400)="0a9e886070070a68d14f25cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(r3, 0x0, 0x4dca) [ 560.840318][ T8773] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 560.852107][ T8773] EXT4-fs: 8 callbacks suppressed [ 560.852116][ T8773] EXT4-fs (sda1): Remounting filesystem read-only 20:00:39 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000000)) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="044aac2f", 0x4, 0x20000fec, &(0x7f0000b63fe4)={0xa, 0x2, 0xe000000, @rand_addr, 0x1000000}, 0x1c) 20:00:39 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r4, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0xfffffffffffffdf0}, {&(0x7f0000000400)="0a9ee108d895327b29a025cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(r4, 0x0, 0x4dca) fcntl$addseals(r1, 0x409, 0x0) ioctl$BTRFS_IOC_RESIZE(r0, 0x50009403, &(0x7f0000001500)={{r4}, {@val, @max}}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfff, 0x4, &(0x7f0000000180)=[{&(0x7f0000000140)="bae29d449c42a60a13eada5b55ee9d8c49c06cc3f622ce", 0x17, 0x42508281}, {&(0x7f0000000280)="bbb43aa7ae5f5c43e05cd6cf9d38fcf53b6a345511143db4d9f8c6b7a797620fc1189735249c2172b5815ee2045fc5d259530f0bdd27da1e4b6c71d259cad16c3da4f7c5946337d502d890e61fd6b870cf8b4c16a5db25590ad68c23b10afe82b32014013de393bd31019767d7ef55d2c25e7eab7ba4ba32021dd798be6b542e5ee3c46a72ff503f09ffb0a92e56f4bc15b98d7e6249e9a8ffae1e45f023dab42c38de3d29a2ca22758a1ddc79b5d4d1d2241a752fa6662aafdf12429d7d1cea9e4c7eb08d9d2e3b3c2652b07a7ebf45cae7faa8347a2592aff9ca7d7185", 0xde, 0x2}, {&(0x7f0000000380)="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", 0xffa, 0x1}, {&(0x7f0000001380)="0beab6621e1d9c0dc26e6c36af3eea68c63b4f3eadebb045752f644dc4fa1236f33d679b6eef51f9c3123c14fd41254d79fc50ecb818abf1a4ef7b39cce4e6158f55f639c8d228db3a4016cfe995d1237d2ffc886e9139c207cb966e31e2f545c3d168ceed6ea5fc42a5e03726f4a66462d5381eb1bae85e96b65c7236253c348f2b654feed4687660110f00c1f3d2423d4b5573d237e653f5cb0532a338a6d0dc22284f16292acf819f70bbde4e7be8dfd242d57cbf553c9401333b693042e09954622bc7869334d490108a358147e8d3ac886b4841c84a29f5e4827542d95577f18331f007909c40728e125859ec962c00000000", 0xf5, 0x2}], 0x0, &(0x7f0000002580)={[{@fat=@discard}, {@rodir}], [{@fsname={'fsname', 0x3d, 'ext4\x00'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@seclabel}, {@subj_user={'subj_user', 0x3d, ',}/'}}, {@uid_eq={'uid', 0x3d, r3}}, {@hash}, {@smackfsroot={'smackfsroot', 0x3d, 'fsname'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x80) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 560.900371][ T8825] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user 20:00:39 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r4, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0xfffffffffffffdf0}, {&(0x7f0000000400)="0a9ee108d895327b29a025cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(r4, 0x0, 0x4dca) fcntl$addseals(r1, 0x409, 0x0) ioctl$BTRFS_IOC_RESIZE(r0, 0x50009403, &(0x7f0000001500)={{r4}, {@val, @max}}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfff, 0x4, &(0x7f0000000180)=[{&(0x7f0000000140)="bae29d449c42a60a13eada5b55ee9d8c49c06cc3f622ce", 0x17, 0x42508281}, {&(0x7f0000000280)="bbb43aa7ae5f5c43e05cd6cf9d38fcf53b6a345511143db4d9f8c6b7a797620fc1189735249c2172b5815ee2045fc5d259530f0bdd27da1e4b6c71d259cad16c3da4f7c5946337d502d890e61fd6b870cf8b4c16a5db25590ad68c23b10afe82b32014013de393bd31019767d7ef55d2c25e7eab7ba4ba32021dd798be6b542e5ee3c46a72ff503f09ffb0a92e56f4bc15b98d7e6249e9a8ffae1e45f023dab42c38de3d29a2ca22758a1ddc79b5d4d1d2241a752fa6662aafdf12429d7d1cea9e4c7eb08d9d2e3b3c2652b07a7ebf45cae7faa8347a2592aff9ca7d7185", 0xde, 0x2}, {&(0x7f0000000380)="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", 0xffa, 0x1}, {&(0x7f0000001380)="0beab6621e1d9c0dc26e6c36af3eea68c63b4f3eadebb045752f644dc4fa1236f33d679b6eef51f9c3123c14fd41254d79fc50ecb818abf1a4ef7b39cce4e6158f55f639c8d228db3a4016cfe995d1237d2ffc886e9139c207cb966e31e2f545c3d168ceed6ea5fc42a5e03726f4a66462d5381eb1bae85e96b65c7236253c348f2b654feed4687660110f00c1f3d2423d4b5573d237e653f5cb0532a338a6d0dc22284f16292acf819f70bbde4e7be8dfd242d57cbf553c9401333b693042e09954622bc7869334d490108a358147e8d3ac886b4841c84a29f5e4827542d95577f18331f007909c40728e125859ec962c00000000", 0xf5, 0x2}], 0x0, &(0x7f0000002580)={[{@fat=@discard}, {@rodir}], [{@fsname={'fsname', 0x3d, 'ext4\x00'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@seclabel}, {@subj_user={'subj_user', 0x3d, ',}/'}}, {@uid_eq={'uid', 0x3d, r3}}, {@hash}, {@smackfsroot={'smackfsroot', 0x3d, 'fsname'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x80) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:39 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:39 executing program 4: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) [ 560.941778][ T8825] EXT4-fs (sda1): Remounting filesystem read-only [ 560.963024][ T8823] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 560.984214][ T8823] EXT4-fs (sda1): Remounting filesystem read-only 20:00:39 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:39 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r4, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0xfffffffffffffdf0}, {&(0x7f0000000400)="0a9ee108d895327b29a025cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(r4, 0x0, 0x4dca) fcntl$addseals(r1, 0x409, 0x0) ioctl$BTRFS_IOC_RESIZE(r0, 0x50009403, &(0x7f0000001500)={{r4}, {@val, @max}}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfff, 0x4, &(0x7f0000000180)=[{&(0x7f0000000140)="bae29d449c42a60a13eada5b55ee9d8c49c06cc3f622ce", 0x17, 0x42508281}, {&(0x7f0000000280)="bbb43aa7ae5f5c43e05cd6cf9d38fcf53b6a345511143db4d9f8c6b7a797620fc1189735249c2172b5815ee2045fc5d259530f0bdd27da1e4b6c71d259cad16c3da4f7c5946337d502d890e61fd6b870cf8b4c16a5db25590ad68c23b10afe82b32014013de393bd31019767d7ef55d2c25e7eab7ba4ba32021dd798be6b542e5ee3c46a72ff503f09ffb0a92e56f4bc15b98d7e6249e9a8ffae1e45f023dab42c38de3d29a2ca22758a1ddc79b5d4d1d2241a752fa6662aafdf12429d7d1cea9e4c7eb08d9d2e3b3c2652b07a7ebf45cae7faa8347a2592aff9ca7d7185", 0xde, 0x2}, {&(0x7f0000000380)="dc7f7251e087fa589a873d7abb4f95a210304c504153caec8b36070642889fcff1c2e69a093c4983c0a51711c3911be7e8246b4004ced31ebf1a3ae11beb540f4f2e7c63d9fd1787133a666fccd075ed5b5f8b69dda05bbb5c806ab4dab7e6fccaa1311682850018962adbc8ed9905d986c014c21dd5b0d4c77e6066cc3b0ce1fbd566210bb174c11a6d245da847f174f5def3a08607c600759d6648f9c8b57a5e5aa4b026eb21865c4a76baff68df48f46a4a6ff022f91ae1e1dd1f5d8cf68293cb782a2d17bbb8d3c61d702b1ea6c428aa39a7b838205504b1db5e24b7aab4ad0a1d3a99ab698b85a363034e7bb5e50cbf74d188e99693c0af737bbad6d6c9e3465e0a72fcb019d5f8bb1188e1f2ec6e8a0cdf29e06bb7fe61e9f116b0c79fa8789c9bba8b901b5f97ad71691fb5bb14f511154758b4e7c353fe399a0a62aaf0d9f2e011dc9943ea29f424b9862a7ddee0f6a423315c2f42f5d7ab0b0e778001453ae6becb3ee7051dec2eaafd8657add5cce68cd1c9dbb675e5900395476435caa07098ed72e9d0bdbaca9b214c211fafae5ee8c3580c23292f3cf4dd6c8e96679374ff690c26c548f6ba5804a6dc557ca51121f844eb58c8871bb1c4fc437fca6c2300d641cfd352b1696c7331d2a7edd54eb651c9c6b756793e852d5b8957e6dc3b3f20100faad67339dcd0334e6edf0c3b12316ad4e0b40147c7b9eeb5354bc874813218ed887dc52c08393820b38c460c28b8edd3f48924f4f0c50a95b7900096fc0659218ccf340d0b8ce06e05d3277caefd290e384936faf019ad53ea50313767f7d333a7091de634423fddd08388ecaa8f4d1e40708bc6226e8d07fd5132d62b1d8af7b77f7093faa0b087b14d957b3a89b7c91e0c232fb64acc7719936fd623d5558980cd86a8221e7c2f89a10ba53e6c0c32040b9ed5b5ef309b4f9b13875cff4b6c468a98fb0d6acac7ee21d171155a2569a630fdd1723f00707e869327962110db15349175b4b69e8203948d8af8b0aa084e33b87da479542ca80d0fe1002b12e333dbb3218677a251684a866342062085ad111f6d02924a91a81290332633b8c61f566e01b0a701e22080bab9967a4dface669c22b9ffbbcceb2bb67324e470c09a12f94f1296893340f137b8cf1c5b5dd3682e59c5b5408e79230ec1271789aeb29c4d8575a6feba125f21ba21fe8b93e31a84d7bd0b0c23232e8dfae95aa82217fc8113a7145afb9209305cb697d58958a0718644c24059ff4de95007caa51761cb7e8c4f6c06e06c2ba9b62ed8bc19dd7f0721b384c86d087c821c81d7b0f65bf930585ce06c0e7c463f36b9b92f8e621e35a40a84ebcb0d29088f3c54412a86935ea7cef896ae464a6d1ff960fdc751fbc4940afb1bd44da40426786b9a7bc508fe539ff19a73dc566cf7a55938360d6318a8fef30638b8fcbf86cc4f2ce6cda3cb7871a96f9f0e4e24b22b6b1f108fa7721fc6acea81ad8da3ba8fd74a214c7fcf0995ead262bac1796dc5edaa271613507f7d6e20e1191c2c76d8e02c063447a20b29f904af6d865f20f292ec6963b3e4153e645c3405dbd3a3ec39eb1410a8468c11f62bbfaf693bb5b3d62e9dac3bf072d9b1a9118c92a02c6210b961588dae7c122430462d27ca974d31d8de6197c56ea6fdbff0309d6210ae010b6322fa663b64f26199f091692cabcff6f066e6bf52c6e9e7695faf1d6b5444b0e60ed2b12f45ba0b9c19a3a44219f41d5f36aac315f29b6fb041b52091f44fea7d95d8a3e6b2872ba57558494392849d9e8764deb343d08dea0fefdec8f7f0c67fc1a55e2513c8bbf45a8a6dd5e0f1b8d316ca743eb7711aed26a175bbd33c463545201c26d6642fed153a189b6b3ae0985505fd7382ea177a70c9a27998d8d0dd03ca34882ca07f6f7cf965d91754b4a59d738aadc2feb98554ab580bc0d1b594bc3f467cb4c0946a1e3a33ba7aadcbff8cccc217eb65dd5f992397c8afa68b030863e4e903c44b6f49bd6e8dc986e6733253b2a9693be8f1afd6e08a7aae1c3b15a4b7d14f5258830f3995ef7ea6d22346711585c77d8c528754f20dede8fa666620e57973900bd4032acd09867f59f6f285140bea02f4ac0cbe0b7f2ab5371381f87cdbdbea6c4f69b168c7fd9cf9576b7bf43421f874cb1b427af898b7bc3a93b0df09304e269882267f289ef64a68aafe94c81e6219aa29221c3e66747243364e20603794c16f1bd004973009b52722f2387c921a60900606b5a6a053599d641c5ef4d0dcc148d3d10ede411b7333cafd587884ec264cbea9e0337ce3cc254e0d1399fbe6b0e5f074bce7b332f17b40a6c1f30a577b2342685b803a49b661ea5e2f7dd864d3a24c434baedc002508712945fe062f3b244f75c3a2d56c91106d36022030c95cdb839b40433e5ec35a9f71d8bdac23f544bdfb4da698c433e3197230c5ee02323f29b6f19e48de5ad3181032710c13bd6de4bd8c269634fb6c1b22cb4132b49a41dde59c6c16f024dd1040e9ad793efb1a5075158ac163d85d4acc14e5c58a24209a1133e1df570982237b1a3fb94dba7bdd320c8dfb4f268f23b69aad6cc2a5329e478252e82a8965dfa5fe61155825b6bf054e996fd4f068ae4d97aed5db5df314a3a53d0b7f069d6df1066de4afa5b8399950d0849f4186fc85f2b202f2c1063d767cf6fef121839768fa393b71a1842237a90108cf59c8e07094d62e23f3e75d2200b08638bd394b02d89f477bde6b7a1d204e7911d71c2730b1719e869eb81db54edbf689112f83f7e4c41fe94eb186dca70114f4f27f9ae5ee8d7d418d137ef0b6c85363c4bfb0dc891c2bcc62cb62c07ea144d3e16336fdfa35365783062b524a56ad7da72dbfcecc357d1aa54918bd70161b332b3981c81238ffd1c10a54e664933093861ece6051dc6251ddac758d1f20cad9be6fa309f58dcfc421bda5aa3c920c5446181438c184af606fb2f1aac6ad08203d0b5d5b81da4b81a78f6727cc4b36692b5be4a382b9a649a678358f9c3df4c8b99a4d4cfb37bb0b4827dfb8c1eec7ce08eb84904e10151c9ceb2959b5e36b713557d2b7c832cdfce1bc5526ced90bbdf77cba19ed26f08eb3f9ed13c9a103dfd52255a9f7a97b08c3b23d89fb616aec44a2197fa9365dc4d25c62fde9cbbec3af5f3c9791e0abcfce3f2543c45a34056f33265bd9f9e5f964cf7cda71f0120ac4af1ddf596281fe6eae0eae6f5aa16adc528c7bfb0064717bd37beef51fc23e8d1564c2eefcfedaf629e55900ae75de8ecaab5a85bf5cf5167e06a18cfc5863779f90ff2540df94900662672c68ff25add680d67a01a18c32067a32d1d2c708c1613bdf7af43849a24c978d16dd9d2cfd4e4c4608fb18469cf8047db18eae0ec77628f9884744cb6a418a69717c94fd4bdd15688bb5847686255aeb45bd3eed5d2ca11e3dbbd2ba4f3a32abac9e0ef5d614fdd019de8af3b2a0c2a3c03eadfb26a5ca52c7c2024e81c89d9250d4200a7c42145c17db5920c1fc4b8d597f01ab7240270b32ac281fcb10d2def4e7bcdf4647c737d1cc524c53f076ce44cc2a8ecd50a4bb32081cd8e0c2f27c8af729cf4310b2f67ea1dd5f69e9cc2ffde86c788603833eed998603299988c9c9eca9d36e110d49860ee64d8b7c068d5a14a3675e29b09ae70300ea09956fbc6ae0601d23277b1a1c500d4160f3c7e108703ce089e4d47a0cb05924925d58c5887e4f6f36802f0715f70fde92bb0a07a43211c8667e175e7f08cdda51f0de6910e222352d96d67ad5ea992177e0cfaa8a3b55536deee60bf65b7aa6332cd0967e52128406716462a3ec1b426c40e4f858b5be4c0033707fab646031821ac78eeff6a7d9570a494c0b6e0ca9c7b7573acf459cdaa4ca8f1093d3e6a148a1b50d7c204e0a96f7d0761b47c8c40af46987c25f58f23718ff90699fc83309a81744a84f8a210a886991e22396cfd2ced6bc1e8dd7fef299baa99ffaa9a112a773c79167d4b01a9f822c744b5e595f8c96719588af5832aaa89e2a31ddb48cb1c0cbe88f1a129b85858993ccfd65ba856fe0ac7cea25cd4107d57c9d4f7cf06fa2363ca9da18321660cf7b7122d5f70e4c4ee54abddd849b421e0413d1050878150ab619119f9211d99c1edcfee35857926b66684699d4be96fcbbb57f2a28da47fb1289600329edc5610c97e8acacae5fa169455bd3e54251de56db36be8f04cefbd6f5e1bb9a4c7a797bc4abfc2a8797791d9e056e4f7f03d1944f3977eb5121c9b66442e8b7ba321bc518496dc6a28cfbcaba0eab3738160e31ee0217ff3da01625d1552e0635e9186ff4927bd4cb4cd783554bb1c7d5da3154e5711898706027903f98534106f5d185f81b6b9d5d34cc47931347f142abb5d89d6a2969326b8b595167f6a0fae1796a7c7e31a5027f0498121de8633f41b791afa5dd28ac02f9d8d64b2e357f37867659fdb965bc9f9f1fa822611cb6544d6902744c6e80d8163a8e1d2bee91e5c92cea605d820e05701f59816fc842abc1a01fc60779c813fc4bc78669c150d8b24dc8f7e01eefbb506c4f69eae7fe68d11166bb7b0a0574e71fb9b49154154967d666bac97a990c722ee7bd483ab1abf981489efded08f0a75c3fd3320426fad9bc2d71b157bafcab040cb8afd69ec628773fbe7d9a97390b4ddd3f151d9c9ab9fa4d306e58e435f8cce31d556276b5957dcf2614969c5a3bcd2a2fa3bb1021e69f618e38cff0aa306c2d193d1ed01688a46c9a630c536ab1ed959ea93fc2b8c6fca161751ed3ba2debb1449f0f9f8b4b1933af87dabc47275422342871ccd123da287f77abff692087b0d43ec7f029d78020fa0f60d9843007f4583d019fe2c898c75bd3d805f26d9eeae750d5962f0ffb0a9fec0e42d9edff3a6c1df54dcc3f8e9d85808de8a9c07936ec53aac825544f9c44e74fc026f7fa46689c0047cde442343bb38957535a31dd96382d96334e7aa86bc2418fa4c28c3f86505a134ecad5802cf7547f735710a2d8a8f09a23b58f3c57998b9fb50f35650fe29d9cffd2c05feb6b2bf939a250a9b025576f7bf195310bbf7326e00beead9eb8a2dcef305929cc509b2d1677d9d2997e22bfe2b536d9d8798af0b96195af15d1f850ebdca1edda6106994e356cfc41d5e255d0e9b5feb861b2bee9dfff40e04bd4f9b7fa3fabaf84532693ca7da0d4fbfd4cfd26084c4018e70c26f96020041544bcc1afcf9c8c986c94a6ccc41a3b4a7fac54bb6503f1c40643904bbf06e0884bb7109a8b7a3b44ef8e4671001c22cf5c36055eee337bad2d8fe28196c56422d3e14e9bae4c55aaa4ee60459f1ca88452549436e7b680aa33616d8ee84f0884c912605f38db05edd147ffc31c0eae4f9206d5efe99c87a5bf687cbf1e960c99f8c84d707e861c758947e0066d11397bdaf671a0e0595c043a043aa1d651574ffa85597f980ef2acf6d96a4ed57178f826b9598cd572b6ad059ea51d999ee3a78b3034869cbd6d4d5fec6fbe79621b606a74f83fa49c12ab115e727c0fcb37e66d1145e8b7b6c31c9642c18a8e35ca65c04520ad6261f5ac43900c1e329c8797841008923d9327795d22e65b45661b69ff98ebd746936262c47b0c3873505dc7781097c0717bfd03a6ef27d7032acd3b01150136b69b943444949c2e5adf876eab27ad96b06a316b032b12fcb8cfbca85bb583281f6739f859a923351d2dfe438a59af26cf0c78d0a0de1bf8215c69d7c8132fab34fefe892ba49d5f45638d6f00000000", 0xffa, 0x1}, {&(0x7f0000001380)="0beab6621e1d9c0dc26e6c36af3eea68c63b4f3eadebb045752f644dc4fa1236f33d679b6eef51f9c3123c14fd41254d79fc50ecb818abf1a4ef7b39cce4e6158f55f639c8d228db3a4016cfe995d1237d2ffc886e9139c207cb966e31e2f545c3d168ceed6ea5fc42a5e03726f4a66462d5381eb1bae85e96b65c7236253c348f2b654feed4687660110f00c1f3d2423d4b5573d237e653f5cb0532a338a6d0dc22284f16292acf819f70bbde4e7be8dfd242d57cbf553c9401333b693042e09954622bc7869334d490108a358147e8d3ac886b4841c84a29f5e4827542d95577f18331f007909c40728e125859ec962c00000000", 0xf5, 0x2}], 0x0, &(0x7f0000002580)={[{@fat=@discard}, {@rodir}], [{@fsname={'fsname', 0x3d, 'ext4\x00'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@seclabel}, {@subj_user={'subj_user', 0x3d, ',}/'}}, {@uid_eq={'uid', 0x3d, r3}}, {@hash}, {@smackfsroot={'smackfsroot', 0x3d, 'fsname'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) r1 = socket$inet6(0xa, 0x4, 0xd8f9) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000001100)={@in={{0x2, 0x4e21, @local}}, 0x0, 0x0, 0x39, 0x0, "3c1901a480aa48667e3169e49ae2f75ff58dd798aed8190ba443a9bf93e76d0f0f09f55e648d567aabccba6acc67192e83c88458c85c634f70fca6677bdf72fab807966265b97c357a3a67cd71fcf772"}, 0xd8) getsockopt$inet6_buf(r0, 0x29, 0x2a, &(0x7f0000000100)=""/4096, &(0x7f0000000000)=0x1000) sendto$inet6(r0, &(0x7f00000000c0)="044aac2f", 0x4, 0x2000c7ec, &(0x7f0000b63fe4)={0xa, 0x2, 0xe000000, @rand_addr, 0x1000000}, 0x1c) [ 561.071002][ T8852] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:00:40 executing program 5: ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000040)={0x1ff, 0x5, 0xff}) syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) sync() mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f00000004c0)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x30060e5, &(0x7f0000001a40)=ANY=[@ANYBLOB="f0d5209b359d0f27d0ed704d0f7a1b0b6cbb8c682f40e1fe7be94d9bde3a1ffb07de6ff57682a2e6c6125a632ad25bc57b25ce287f0a57131040784f4ba277eedb66e71abab4ff642adfb6010e47b3883681d755e299"]) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000200)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0xfffff, r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000200)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0xfffff, r1) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000040), 0x0, 0x0, r1) add_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000200)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0xfffff, r2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e", 0x53}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0x5d}, {&(0x7f0000000400)="0a9e886070070a68d14f25cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(r3, 0x0, 0x4dca) 20:00:40 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:40 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r4, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0xfffffffffffffdf0}, {&(0x7f0000000400)="0a9ee108d895327b29a025cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(r4, 0x0, 0x4dca) fcntl$addseals(r1, 0x409, 0x0) ioctl$BTRFS_IOC_RESIZE(r0, 0x50009403, &(0x7f0000001500)={{r4}, {@val, @max}}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfff, 0x4, &(0x7f0000000180)=[{&(0x7f0000000140)="bae29d449c42a60a13eada5b55ee9d8c49c06cc3f622ce", 0x17, 0x42508281}, {&(0x7f0000000280)="bbb43aa7ae5f5c43e05cd6cf9d38fcf53b6a345511143db4d9f8c6b7a797620fc1189735249c2172b5815ee2045fc5d259530f0bdd27da1e4b6c71d259cad16c3da4f7c5946337d502d890e61fd6b870cf8b4c16a5db25590ad68c23b10afe82b32014013de393bd31019767d7ef55d2c25e7eab7ba4ba32021dd798be6b542e5ee3c46a72ff503f09ffb0a92e56f4bc15b98d7e6249e9a8ffae1e45f023dab42c38de3d29a2ca22758a1ddc79b5d4d1d2241a752fa6662aafdf12429d7d1cea9e4c7eb08d9d2e3b3c2652b07a7ebf45cae7faa8347a2592aff9ca7d7185", 0xde, 0x2}, {&(0x7f0000000380)="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", 0xffa, 0x1}, {&(0x7f0000001380)="0beab6621e1d9c0dc26e6c36af3eea68c63b4f3eadebb045752f644dc4fa1236f33d679b6eef51f9c3123c14fd41254d79fc50ecb818abf1a4ef7b39cce4e6158f55f639c8d228db3a4016cfe995d1237d2ffc886e9139c207cb966e31e2f545c3d168ceed6ea5fc42a5e03726f4a66462d5381eb1bae85e96b65c7236253c348f2b654feed4687660110f00c1f3d2423d4b5573d237e653f5cb0532a338a6d0dc22284f16292acf819f70bbde4e7be8dfd242d57cbf553c9401333b693042e09954622bc7869334d490108a358147e8d3ac886b4841c84a29f5e4827542d95577f18331f007909c40728e125859ec962c00000000", 0xf5, 0x2}], 0x0, &(0x7f0000002580)={[{@fat=@discard}, {@rodir}], [{@fsname={'fsname', 0x3d, 'ext4\x00'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@seclabel}, {@subj_user={'subj_user', 0x3d, ',}/'}}, {@uid_eq={'uid', 0x3d, r3}}, {@hash}, {@smackfsroot={'smackfsroot', 0x3d, 'fsname'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x5}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="044aac2f", 0x4, 0x20000fec, &(0x7f0000b63fe4)={0xa, 0x2, 0xe000000, @rand_addr, 0x1000000}, 0x1c) 20:00:40 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) add_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000200)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, 0xfffffffffffffffc) [ 561.113280][ T8852] EXT4-fs (sda1): Remounting filesystem read-only [ 561.127780][ T8858] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user [ 561.141720][ T8858] EXT4-fs (sda1): Remounting filesystem read-only 20:00:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:40 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) [ 561.216847][ T8881] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user [ 561.229462][ T8881] EXT4-fs (sda1): Remounting filesystem read-only 20:00:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:40 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r4, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0xfffffffffffffdf0}, {&(0x7f0000000400)="0a9ee108d895327b29a025cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(r4, 0x0, 0x4dca) fcntl$addseals(r1, 0x409, 0x0) ioctl$BTRFS_IOC_RESIZE(r0, 0x50009403, &(0x7f0000001500)={{r4}, {@val, @max}}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfff, 0x4, &(0x7f0000000180)=[{&(0x7f0000000140)="bae29d449c42a60a13eada5b55ee9d8c49c06cc3f622ce", 0x17, 0x42508281}, {&(0x7f0000000280)="bbb43aa7ae5f5c43e05cd6cf9d38fcf53b6a345511143db4d9f8c6b7a797620fc1189735249c2172b5815ee2045fc5d259530f0bdd27da1e4b6c71d259cad16c3da4f7c5946337d502d890e61fd6b870cf8b4c16a5db25590ad68c23b10afe82b32014013de393bd31019767d7ef55d2c25e7eab7ba4ba32021dd798be6b542e5ee3c46a72ff503f09ffb0a92e56f4bc15b98d7e6249e9a8ffae1e45f023dab42c38de3d29a2ca22758a1ddc79b5d4d1d2241a752fa6662aafdf12429d7d1cea9e4c7eb08d9d2e3b3c2652b07a7ebf45cae7faa8347a2592aff9ca7d7185", 0xde, 0x2}, {&(0x7f0000000380)="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", 0xffa, 0x1}, {&(0x7f0000001380)="0beab6621e1d9c0dc26e6c36af3eea68c63b4f3eadebb045752f644dc4fa1236f33d679b6eef51f9c3123c14fd41254d79fc50ecb818abf1a4ef7b39cce4e6158f55f639c8d228db3a4016cfe995d1237d2ffc886e9139c207cb966e31e2f545c3d168ceed6ea5fc42a5e03726f4a66462d5381eb1bae85e96b65c7236253c348f2b654feed4687660110f00c1f3d2423d4b5573d237e653f5cb0532a338a6d0dc22284f16292acf819f70bbde4e7be8dfd242d57cbf553c9401333b693042e09954622bc7869334d490108a358147e8d3ac886b4841c84a29f5e4827542d95577f18331f007909c40728e125859ec962c00000000", 0xf5, 0x2}], 0x0, &(0x7f0000002580)={[{@fat=@discard}, {@rodir}], [{@fsname={'fsname', 0x3d, 'ext4\x00'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@seclabel}, {@subj_user={'subj_user', 0x3d, ',}/'}}, {@uid_eq={'uid', 0x3d, r3}}, {@hash}, {@smackfsroot={'smackfsroot', 0x3d, 'fsname'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:40 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) 20:00:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:40 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r4, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0xfffffffffffffdf0}, {&(0x7f0000000400)="0a9ee108d895327b29a025cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(r4, 0x0, 0x4dca) fcntl$addseals(r1, 0x409, 0x0) ioctl$BTRFS_IOC_RESIZE(r0, 0x50009403, &(0x7f0000001500)={{r4}, {@val, @max}}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfff, 0x4, &(0x7f0000000180)=[{&(0x7f0000000140)="bae29d449c42a60a13eada5b55ee9d8c49c06cc3f622ce", 0x17, 0x42508281}, {&(0x7f0000000280)="bbb43aa7ae5f5c43e05cd6cf9d38fcf53b6a345511143db4d9f8c6b7a797620fc1189735249c2172b5815ee2045fc5d259530f0bdd27da1e4b6c71d259cad16c3da4f7c5946337d502d890e61fd6b870cf8b4c16a5db25590ad68c23b10afe82b32014013de393bd31019767d7ef55d2c25e7eab7ba4ba32021dd798be6b542e5ee3c46a72ff503f09ffb0a92e56f4bc15b98d7e6249e9a8ffae1e45f023dab42c38de3d29a2ca22758a1ddc79b5d4d1d2241a752fa6662aafdf12429d7d1cea9e4c7eb08d9d2e3b3c2652b07a7ebf45cae7faa8347a2592aff9ca7d7185", 0xde, 0x2}, {&(0x7f0000000380)="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", 0xffa, 0x1}, {&(0x7f0000001380)="0beab6621e1d9c0dc26e6c36af3eea68c63b4f3eadebb045752f644dc4fa1236f33d679b6eef51f9c3123c14fd41254d79fc50ecb818abf1a4ef7b39cce4e6158f55f639c8d228db3a4016cfe995d1237d2ffc886e9139c207cb966e31e2f545c3d168ceed6ea5fc42a5e03726f4a66462d5381eb1bae85e96b65c7236253c348f2b654feed4687660110f00c1f3d2423d4b5573d237e653f5cb0532a338a6d0dc22284f16292acf819f70bbde4e7be8dfd242d57cbf553c9401333b693042e09954622bc7869334d490108a358147e8d3ac886b4841c84a29f5e4827542d95577f18331f007909c40728e125859ec962c00000000", 0xf5, 0x2}], 0x0, &(0x7f0000002580)={[{@fat=@discard}, {@rodir}], [{@fsname={'fsname', 0x3d, 'ext4\x00'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@seclabel}, {@subj_user={'subj_user', 0x3d, ',}/'}}, {@uid_eq={'uid', 0x3d, r3}}, {@hash}, {@smackfsroot={'smackfsroot', 0x3d, 'fsname'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x4000, 0x0, @loopback}}, 0x0, 0x0, 0x1e, 0x0, "de6b783ff172772af23d7d11045804a49a545e0207504de18d7767f74390cebd46da245d3b57ea97f78e7bb3be6b666982cc6f0a076859b4a531a7208ed231b037d4907842b50cf95689e40b0bf6825e"}, 0xd8) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000280)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x98, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0xe000000, @rand_addr, 0x1000000}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0xd05000, 0x140) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f00000000c0), 0x4) 20:00:40 executing program 0: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 561.358127][ T8891] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user 20:00:40 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r4, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0xfffffffffffffdf0}, {&(0x7f0000000400)="0a9ee108d895327b29a025cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(r4, 0x0, 0x4dca) fcntl$addseals(r1, 0x409, 0x0) ioctl$BTRFS_IOC_RESIZE(r0, 0x50009403, &(0x7f0000001500)={{r4}, {@val, @max}}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 561.410828][ T8891] EXT4-fs (sda1): Remounting filesystem read-only 20:00:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x80000, 0x1) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="044aac2f", 0x4, 0x20000fec, &(0x7f0000b63fe4)={0xa, 0x2, 0xe000000, @rand_addr, 0x1000000}, 0x1c) [ 562.697105][ T8922] cgroup: Unknown subsys name 'perf_event' [ 562.703423][ T8922] cgroup: Unknown subsys name 'net_cls' 20:00:42 executing program 2 (fault-call:5 fault-nth:0): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) 20:00:42 executing program 0: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:42 executing program 5 (fault-call:6 fault-nth:0): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:00:42 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0xfffffffffffffdf0}, {&(0x7f0000000400)="0a9ee108d895327b29a025cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(r3, 0x0, 0x4dca) fcntl$addseals(r0, 0x409, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:42 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) 20:00:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@timestamp, @timestamp, @mss={0x2, 0x4000000}, @timestamp, @mss={0x2, 0x2}, @sack_perm, @window={0x3, 0x200, 0x9}, @mss={0x2, 0x2}, @sack_perm], 0x9) sendto$inet6(r0, &(0x7f00000000c0)="044aac2f", 0x4, 0x20000fec, &(0x7f0000b63fe4)={0xa, 0x2, 0xe000000, @rand_addr, 0x1000000}, 0x1c) [ 563.884987][ T9385] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user [ 563.896136][ T9388] FAULT_INJECTION: forcing a failure. [ 563.896136][ T9388] name failslab, interval 1, probability 0, space 0, times 0 [ 563.908982][ T9388] CPU: 0 PID: 9388 Comm: syz-executor.2 Not tainted 5.13.0-rc3-syzkaller #0 [ 563.909231][ T9385] EXT4-fs (sda1): Remounting filesystem read-only [ 563.917669][ T9388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 563.917686][ T9388] Call Trace: [ 563.917694][ T9388] dump_stack+0x137/0x19d [ 563.934698][ T9389] FAULT_INJECTION: forcing a failure. [ 563.934698][ T9389] name failslab, interval 1, probability 0, space 0, times 0 [ 563.937440][ T9388] should_fail+0x23c/0x250 [ 563.959148][ T9388] ? getname_flags+0x84/0x3d0 [ 563.963834][ T9388] __should_failslab+0x81/0x90 [ 563.968602][ T9388] should_failslab+0x5/0x20 [ 563.973114][ T9388] kmem_cache_alloc+0x46/0x2f0 [ 563.977878][ T9388] getname_flags+0x84/0x3d0 [ 563.982443][ T9388] user_path_at_empty+0x28/0x50 [ 563.987299][ T9388] __se_sys_mount+0x209/0x2e0 [ 563.991974][ T9388] ? fput+0x2d/0x130 [ 563.996021][ T9388] ? ksys_write+0x157/0x180 [ 564.000711][ T9388] __x64_sys_mount+0x63/0x70 [ 564.005299][ T9388] do_syscall_64+0x4a/0x90 [ 564.009717][ T9388] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 564.015705][ T9388] RIP: 0033:0x4665d9 [ 564.019665][ T9388] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 564.039813][ T9388] RSP: 002b:00007f600102d188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 564.048517][ T9388] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 564.056501][ T9388] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 564.064569][ T9388] RBP: 00007f600102d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 564.072556][ T9388] R10: 0000000000010020 R11: 0000000000000246 R12: 0000000000000001 20:00:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) write(r0, &(0x7f0000000180)="e35fa0bb7ebc96bd66abd7304634ec195c3df8ac5c8d8b15587007c9c40c5fa6da7b522feccdcf15f3243f89bdfeca698bf7b58fc8628572737cf0981e7573ab98d98bb95e631ce84b10acd83e6c9520dde4ae", 0x53) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000100)="ba123fbf3c2fe9d305e0fae64f386e765b8604125a647674bb43dba2a7b570c746faf5c20653c6bc7d30cedfad4f7b33aef444ec2b65aea5a912db677e8da5b68e6f31ff3287", 0x46, 0x80880, &(0x7f0000000000)={0xa, 0x4e23, 0x80000001, @local, 0x70f}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)="044aac2f", 0x4, 0x20000fec, &(0x7f0000b63fe4)={0xa, 0x2, 0xe000000, @rand_addr, 0x1000000}, 0x1c) 20:00:42 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0xfffffffffffffdf0}, {&(0x7f0000000400)="0a9ee108d895327b29a025cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(r3, 0x0, 0x4dca) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 564.080532][ T9388] R13: 00007ffd1792d95f R14: 00007f600102d300 R15: 0000000000022000 [ 564.088629][ T9389] CPU: 1 PID: 9389 Comm: syz-executor.5 Not tainted 5.13.0-rc3-syzkaller #0 [ 564.097523][ T9389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 564.107582][ T9389] Call Trace: [ 564.110913][ T9389] dump_stack+0x137/0x19d [ 564.115261][ T9389] should_fail+0x23c/0x250 [ 564.119717][ T9389] ? getname_flags+0x84/0x3d0 [ 564.124409][ T9389] __should_failslab+0x81/0x90 [ 564.129187][ T9389] should_failslab+0x5/0x20 20:00:42 executing program 2 (fault-call:5 fault-nth:1): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) 20:00:43 executing program 0: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="044aac2f", 0x4, 0x20000fec, &(0x7f0000b63fe4)={0xa, 0x2, 0xe000000, @rand_addr, 0x1000000}, 0x1c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000100)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0x5d}, {&(0x7f0000000400)="0a9e886070070a68d14f25cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(r1, 0x0, 0x4dca) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000000), 0x4) [ 564.133694][ T9389] kmem_cache_alloc+0x46/0x2f0 [ 564.138580][ T9389] getname_flags+0x84/0x3d0 [ 564.143088][ T9389] do_mkdirat+0x3b/0x200 [ 564.147424][ T9389] ? ksys_write+0x157/0x180 [ 564.152053][ T9389] __x64_sys_mkdir+0x32/0x40 [ 564.156659][ T9389] do_syscall_64+0x4a/0x90 [ 564.161309][ T9389] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 564.167393][ T9389] RIP: 0033:0x4656e7 20:00:43 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 564.171310][ T9389] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 564.192252][ T9389] RSP: 002b:00007f8f7bbb3fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 564.200758][ T9389] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004656e7 [ 564.208733][ T9389] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000040 [ 564.216708][ T9389] RBP: 00007f8f7bbb4040 R08: 0000000000000000 R09: 00000000031388a0 [ 564.224788][ T9389] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000240 20:00:43 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 564.232763][ T9389] R13: 0000000020000040 R14: 00007f8f7bbb4000 R15: 0000000020000680 20:00:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000000)="ba846f910eaabd56111a9009d59eefde89c5733f6357c023ae7f908bd8448d141f3c7a1738f3b37659b8c16c732b4377129dd0094547174b40085890169160", 0x3f, 0x2810, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)="0428ac2f7f006c645ddbf42720b2af84aaad0b05e026bd074337492faafcaa82bce7f84535c782da5a9b02", 0x2b, 0x40000, &(0x7f00000000c0)={0xa, 0x4e24, 0xdfffffc, @loopback, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000100)="0ce45c14857153b9ed4c2419bf150ee5d3a32668108eb550d3d79138c90d12c836e7244287d084ed27c19db1aca84be828926b85ca3b398eea308ac311e3c2170a4c16546316fb149440cf", 0x4b, 0x2000c040, &(0x7f0000000080)={0xa, 0x4e21, 0x2, @private2, 0x7}, 0x1c) [ 564.294822][ T9414] FAULT_INJECTION: forcing a failure. [ 564.294822][ T9414] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 564.308285][ T9414] CPU: 1 PID: 9414 Comm: syz-executor.2 Not tainted 5.13.0-rc3-syzkaller #0 [ 564.311062][ T9389] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 564.317261][ T9414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 564.317277][ T9414] Call Trace: [ 564.317284][ T9414] dump_stack+0x137/0x19d [ 564.317312][ T9414] should_fail+0x23c/0x250 [ 564.349537][ T9414] should_fail_usercopy+0x16/0x20 [ 564.354646][ T9414] strncpy_from_user+0x21/0x250 [ 564.359516][ T9414] getname_flags+0xb8/0x3d0 [ 564.364035][ T9414] user_path_at_empty+0x28/0x50 [ 564.369313][ T9414] __se_sys_mount+0x209/0x2e0 [ 564.374079][ T9414] ? fput+0x2d/0x130 [ 564.378147][ T9414] ? ksys_write+0x157/0x180 [ 564.382652][ T9414] __x64_sys_mount+0x63/0x70 [ 564.387341][ T9414] do_syscall_64+0x4a/0x90 [ 564.391793][ T9414] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 564.397695][ T9414] RIP: 0033:0x4665d9 [ 564.401950][ T9414] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 564.422060][ T9414] RSP: 002b:00007f600102d188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 564.430590][ T9414] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 564.439061][ T9414] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 564.447294][ T9414] RBP: 00007f600102d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 564.455321][ T9414] R10: 0000000000010020 R11: 0000000000000246 R12: 0000000000000001 [ 564.463292][ T9414] R13: 00007ffd1792d95f R14: 00007f600102d300 R15: 0000000000022000 [ 564.471674][ T9389] EXT4-fs (sda1): Remounting filesystem read-only 20:00:43 executing program 5 (fault-call:6 fault-nth:1): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:00:43 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0xfffffffffffffdf0}, {&(0x7f0000000400)="0a9ee108d895327b29a025cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:43 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) 20:00:43 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000000)="04336a86cc37c9c1f7b25afe4aac2f", 0xf, 0x20000fec, &(0x7f0000b63fe4)={0xa, 0x2, 0x5, @rand_addr, 0x1000000}, 0x1c) 20:00:43 executing program 2 (fault-call:5 fault-nth:2): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) [ 564.511312][ T9426] FAULT_INJECTION: forcing a failure. [ 564.511312][ T9426] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 564.524509][ T9426] CPU: 1 PID: 9426 Comm: syz-executor.5 Not tainted 5.13.0-rc3-syzkaller #0 [ 564.533290][ T9426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 564.541978][ T9434] FAULT_INJECTION: forcing a failure. [ 564.541978][ T9434] name failslab, interval 1, probability 0, space 0, times 0 [ 564.543639][ T9426] Call Trace: [ 564.543650][ T9426] dump_stack+0x137/0x19d [ 564.543676][ T9426] should_fail+0x23c/0x250 [ 564.568647][ T9426] should_fail_usercopy+0x16/0x20 [ 564.573860][ T9426] strncpy_from_user+0x21/0x250 [ 564.578944][ T9426] getname_flags+0xb8/0x3d0 [ 564.584045][ T9426] do_mkdirat+0x3b/0x200 [ 564.588366][ T9426] ? ksys_write+0x157/0x180 [ 564.592874][ T9426] __x64_sys_mkdir+0x32/0x40 [ 564.597521][ T9426] do_syscall_64+0x4a/0x90 [ 564.601972][ T9426] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 564.607947][ T9426] RIP: 0033:0x4656e7 [ 564.611910][ T9426] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 564.631821][ T9426] RSP: 002b:00007f8f7bbb3fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 564.640319][ T9426] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004656e7 [ 564.648303][ T9426] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000040 [ 564.656356][ T9426] RBP: 00007f8f7bbb4040 R08: 0000000000000000 R09: 00000000031388a0 [ 564.664683][ T9426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000240 [ 564.673035][ T9426] R13: 0000000020000040 R14: 00007f8f7bbb4000 R15: 0000000020000680 [ 564.681914][ T9434] CPU: 0 PID: 9434 Comm: syz-executor.2 Not tainted 5.13.0-rc3-syzkaller #0 [ 564.690704][ T9434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 564.701454][ T9434] Call Trace: [ 564.704849][ T9434] dump_stack+0x137/0x19d [ 564.709187][ T9434] should_fail+0x23c/0x250 [ 564.713627][ T9434] __should_failslab+0x81/0x90 [ 564.718487][ T9434] ? alloc_fs_context+0x46/0x500 [ 564.718897][ T9426] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 564.723899][ T9434] should_failslab+0x5/0x20 [ 564.723923][ T9434] kmem_cache_alloc_trace+0x49/0x310 [ 564.744205][ T9434] alloc_fs_context+0x46/0x500 [ 564.747201][ T9426] EXT4-fs (sda1): Remounting filesystem read-only [ 564.749144][ T9434] ? security_capable+0x91/0xa0 [ 564.749173][ T9434] fs_context_for_reconfigure+0x42/0x50 [ 564.766837][ T9434] path_mount+0x1212/0x1ce0 [ 564.771525][ T9434] __se_sys_mount+0x23d/0x2e0 [ 564.776209][ T9434] ? fput+0x2d/0x130 [ 564.780175][ T9434] __x64_sys_mount+0x63/0x70 [ 564.784766][ T9434] do_syscall_64+0x4a/0x90 [ 564.789254][ T9434] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 564.795285][ T9434] RIP: 0033:0x4665d9 20:00:43 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:43 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) pipe(&(0x7f00000001c0)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="044aac2f", 0x4, 0x20000fec, &(0x7f0000b63fe4)={0xa, 0x2, 0xe000000, @rand_addr, 0x1000000}, 0x1c) 20:00:43 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) 20:00:43 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) [ 564.799295][ T9434] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 564.819538][ T9434] RSP: 002b:00007f600102d188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 564.828137][ T9434] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 564.836197][ T9434] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 564.844180][ T9434] RBP: 00007f600102d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 564.852266][ T9434] R10: 0000000000010020 R11: 0000000000000246 R12: 0000000000000001 20:00:43 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:43 executing program 5 (fault-call:6 fault-nth:2): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:00:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) recvmmsg(r0, &(0x7f0000002bc0)=[{{&(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @loopback}}}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000180)=""/240, 0xf0}, {&(0x7f0000000280)=""/166, 0xa6}, {&(0x7f0000000340)=""/226, 0xe2}], 0x3, &(0x7f0000000440)=""/139, 0x8b}, 0x10001}, {{&(0x7f0000000500)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000580)=""/158, 0x9e}, {&(0x7f0000000080)=""/62, 0x3e}, {&(0x7f0000000640)=""/200, 0xc8}, {&(0x7f0000000740)=""/56, 0x38}], 0x4, 0xfffffffffffffffc}, 0x9}, {{0x0, 0x0, &(0x7f0000001840)=[{&(0x7f00000007c0)=""/66, 0x42}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x2, &(0x7f0000001880)=""/120, 0x78}, 0x4}, {{&(0x7f0000001900)=@isdn, 0x80, &(0x7f0000002a80)=[{&(0x7f0000001980)=""/137, 0x89}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000002a40)}], 0x3, &(0x7f0000002ac0)=""/249, 0xf9}, 0x100}], 0x4, 0x2020, &(0x7f0000002cc0)={0x77359400}) sendto$inet6(r0, &(0x7f00000000c0)="044aac2f", 0x4, 0x20000fec, &(0x7f0000b63fe4)={0xa, 0x2, 0xe000000, @rand_addr, 0x1000000}, 0x1c) 20:00:43 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:43 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 564.860528][ T9434] R13: 00007ffd1792d95f R14: 00007f600102d300 R15: 0000000000022000 20:00:43 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 564.928456][ T9461] FAULT_INJECTION: forcing a failure. [ 564.928456][ T9461] name failslab, interval 1, probability 0, space 0, times 0 [ 564.941230][ T9461] CPU: 0 PID: 9461 Comm: syz-executor.5 Not tainted 5.13.0-rc3-syzkaller #0 [ 564.950032][ T9461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 564.960434][ T9461] Call Trace: [ 564.963757][ T9461] dump_stack+0x137/0x19d [ 564.968111][ T9461] should_fail+0x23c/0x250 [ 564.972535][ T9461] ? __se_sys_mount+0x4e/0x2e0 [ 564.977411][ T9461] __should_failslab+0x81/0x90 [ 564.982739][ T9461] should_failslab+0x5/0x20 [ 564.987251][ T9461] __kmalloc_track_caller+0x64/0x340 [ 564.992557][ T9461] ? strnlen_user+0x137/0x1c0 [ 564.997321][ T9461] strndup_user+0x73/0x120 [ 565.001753][ T9461] __se_sys_mount+0x4e/0x2e0 [ 565.006445][ T9461] ? do_mkdirat+0x69/0x200 [ 565.010870][ T9461] ? ksys_write+0x157/0x180 [ 565.015686][ T9461] __x64_sys_mount+0x63/0x70 [ 565.020408][ T9461] do_syscall_64+0x4a/0x90 [ 565.024840][ T9461] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 565.031128][ T9461] RIP: 0033:0x467afa [ 565.035025][ T9461] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 565.055085][ T9461] RSP: 002b:00007f8f7bbb3fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 565.063679][ T9461] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa 20:00:43 executing program 2 (fault-call:5 fault-nth:3): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) 20:00:43 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x3, @loopback}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$incfs(r1, &(0x7f0000000100)='.pending_reads\x00', 0x4f7010e2ded0c127, 0xa1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000200)={@in={{0x2, 0x4e20, @local}}, 0x0, 0x0, 0x817, 0x0, "6fca9dc8f057698eae9b80eda05a470d22ee454075b877c63bc2d1d8d15579231de592a6082491fe2c1adb8e86b1e46ec2ae0b8462128196937fd1398577ca9a6f379568c3895de5b8f3a4c0317e8b16"}, 0xd8) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000300)=0x40) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0xfffff001, 0x18e, 0x7ff, 0xfff, 0x80000001}, 0x14) sendto$inet6(r0, &(0x7f0000000000)="044aac2f", 0x4, 0x20000fec, &(0x7f0000b63fe4)={0xa, 0x2, 0xe000000, @mcast2, 0x1000000}, 0x1c) 20:00:43 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:43 executing program 4: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) 20:00:43 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:43 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 565.071742][ T9461] RDX: 0000000020000240 RSI: 0000000020000040 RDI: 0000000000000000 [ 565.080132][ T9461] RBP: 00007f8f7bbb4040 R08: 00007f8f7bbb4040 R09: 0000000020000240 [ 565.088375][ T9461] R10: 00000000031388a0 R11: 0000000000000202 R12: 0000000020000240 [ 565.096350][ T9461] R13: 0000000020000040 R14: 00007f8f7bbb4000 R15: 0000000020000680 20:00:44 executing program 5 (fault-call:6 fault-nth:3): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:00:44 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:44 executing program 4: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) [ 565.153630][ T9486] FAULT_INJECTION: forcing a failure. [ 565.153630][ T9486] name failslab, interval 1, probability 0, space 0, times 0 [ 565.166670][ T9486] CPU: 0 PID: 9486 Comm: syz-executor.2 Not tainted 5.13.0-rc3-syzkaller #0 [ 565.175461][ T9486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 565.185752][ T9486] Call Trace: [ 565.189039][ T9486] dump_stack+0x137/0x19d [ 565.193556][ T9486] should_fail+0x23c/0x250 [ 565.198090][ T9486] __should_failslab+0x81/0x90 20:00:44 executing program 4: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) 20:00:44 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 565.202946][ T9486] ? legacy_init_fs_context+0x2d/0x70 [ 565.208694][ T9486] should_failslab+0x5/0x20 [ 565.213321][ T9486] kmem_cache_alloc_trace+0x49/0x310 [ 565.218622][ T9486] ? kmem_cache_alloc_trace+0x215/0x310 [ 565.224288][ T9486] ? alloc_fs_context+0x46/0x500 [ 565.229273][ T9486] legacy_init_fs_context+0x2d/0x70 [ 565.234490][ T9486] alloc_fs_context+0x419/0x500 [ 565.239624][ T9486] fs_context_for_reconfigure+0x42/0x50 [ 565.245210][ T9486] path_mount+0x1212/0x1ce0 [ 565.249778][ T9486] __se_sys_mount+0x23d/0x2e0 [ 565.254621][ T9486] ? fput+0x2d/0x130 [ 565.258547][ T9486] __x64_sys_mount+0x63/0x70 [ 565.263203][ T9486] do_syscall_64+0x4a/0x90 [ 565.267677][ T9486] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 565.273605][ T9486] RIP: 0033:0x4665d9 [ 565.277516][ T9486] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 20:00:44 executing program 2 (fault-call:5 fault-nth:4): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) 20:00:44 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 565.297139][ T9486] RSP: 002b:00007f600102d188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 565.305676][ T9486] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 565.313665][ T9486] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 565.322456][ T9486] RBP: 00007f600102d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 565.330456][ T9486] R10: 0000000000010020 R11: 0000000000000246 R12: 0000000000000001 [ 565.338684][ T9486] R13: 00007ffd1792d95f R14: 00007f600102d300 R15: 0000000000022000 [ 565.382965][ T9508] FAULT_INJECTION: forcing a failure. [ 565.382965][ T9508] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 565.396378][ T9508] CPU: 1 PID: 9508 Comm: syz-executor.5 Not tainted 5.13.0-rc3-syzkaller #0 [ 565.397389][ T9514] FAULT_INJECTION: forcing a failure. [ 565.397389][ T9514] name failslab, interval 1, probability 0, space 0, times 0 [ 565.405153][ T9508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 565.405169][ T9508] Call Trace: [ 565.405177][ T9508] dump_stack+0x137/0x19d [ 565.405202][ T9508] should_fail+0x23c/0x250 [ 565.439938][ T9508] should_fail_usercopy+0x16/0x20 [ 565.444965][ T9508] _copy_from_user+0x1c/0xd0 [ 565.449558][ T9508] strndup_user+0xb0/0x120 [ 565.453994][ T9508] __se_sys_mount+0x4e/0x2e0 [ 565.458769][ T9508] ? do_mkdirat+0x69/0x200 [ 565.463198][ T9508] ? ksys_write+0x157/0x180 [ 565.467703][ T9508] __x64_sys_mount+0x63/0x70 [ 565.472295][ T9508] do_syscall_64+0x4a/0x90 [ 565.476740][ T9508] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 565.482850][ T9508] RIP: 0033:0x467afa [ 565.486750][ T9508] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 565.506756][ T9508] RSP: 002b:00007f8f7bbb3fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 565.515175][ T9508] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 565.523391][ T9508] RDX: 0000000020000240 RSI: 0000000020000040 RDI: 0000000000000000 [ 565.531519][ T9508] RBP: 00007f8f7bbb4040 R08: 00007f8f7bbb4040 R09: 0000000020000240 [ 565.539930][ T9508] R10: 00000000031388a0 R11: 0000000000000202 R12: 0000000020000240 [ 565.547913][ T9508] R13: 0000000020000040 R14: 00007f8f7bbb4000 R15: 0000000020000680 [ 565.555973][ T9514] CPU: 0 PID: 9514 Comm: syz-executor.2 Not tainted 5.13.0-rc3-syzkaller #0 [ 565.564687][ T9514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 565.575073][ T9514] Call Trace: [ 565.578349][ T9514] dump_stack+0x137/0x19d [ 565.582691][ T9514] should_fail+0x23c/0x250 [ 565.587270][ T9514] ? mempool_alloc_slab+0x16/0x20 [ 565.592390][ T9514] __should_failslab+0x81/0x90 [ 565.597195][ T9514] should_failslab+0x5/0x20 [ 565.601681][ T9514] kmem_cache_alloc+0x46/0x2f0 [ 565.606543][ T9514] mempool_alloc_slab+0x16/0x20 [ 565.611584][ T9514] ? mempool_free+0x130/0x130 [ 565.616448][ T9514] mempool_alloc+0x8c/0x300 [ 565.620962][ T9514] ? __d_rehash+0x125/0x180 [ 565.625459][ T9514] bio_alloc_bioset+0xcc/0x480 [ 565.630225][ T9514] submit_bh_wbc+0x130/0x330 [ 565.634826][ T9514] ? ext4_update_super+0x71c/0x740 [ 565.640005][ T9514] __sync_dirty_buffer+0x136/0x1e0 [ 565.645190][ T9514] ext4_commit_super+0x1e3/0x270 [ 565.651024][ T9514] ext4_handle_error+0x3d5/0x4d0 [ 565.656184][ T9514] __ext4_error+0xd7/0x1f0 [ 565.660598][ T9514] ? mem_cgroup_from_obj+0x125/0x160 [ 565.666479][ T9514] ? __list_add_valid+0x28/0x90 [ 565.671396][ T9514] ? list_lru_add+0xd6/0x2c0 [ 565.676101][ T9514] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 565.681374][ T9514] ext4_remount+0x64f/0x1840 [ 565.686020][ T9514] ? ext4_statfs+0x6b0/0x6b0 [ 565.690709][ T9514] legacy_reconfigure+0x8e/0xa0 [ 565.695549][ T9514] reconfigure_super+0x2d3/0x4f0 [ 565.700548][ T9514] path_mount+0x1442/0x1ce0 [ 565.705048][ T9514] __se_sys_mount+0x23d/0x2e0 [ 565.709742][ T9514] ? fput+0x2d/0x130 [ 565.713626][ T9514] __x64_sys_mount+0x63/0x70 [ 565.718224][ T9514] do_syscall_64+0x4a/0x90 [ 565.722782][ T9514] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 565.728692][ T9514] RIP: 0033:0x4665d9 [ 565.732586][ T9514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 565.752571][ T9514] RSP: 002b:00007f600102d188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 565.761410][ T9514] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 565.769417][ T9514] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 565.777404][ T9514] RBP: 00007f600102d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 565.785366][ T9514] R10: 0000000000010020 R11: 0000000000000246 R12: 0000000000000001 [ 565.793443][ T9514] R13: 00007ffd1792d95f R14: 00007f600102d300 R15: 0000000000022000 20:00:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x10000, @private0={0xfc, 0x0, '\x00', 0x1}, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) r3 = accept4(r1, &(0x7f00000001c0)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f0000000080)=0x80, 0x800) write(r3, &(0x7f0000000140)="4aa4046b019f450cf488b47e2a3e21913db92581a1157909a2bbc16b554f", 0x1e) sendto$inet6(r0, &(0x7f00000000c0)="044aac2f", 0x4, 0x20000fec, &(0x7f0000b63fe4)={0xa, 0x2, 0xe000000, @rand_addr, 0x1000000}, 0x1c) 20:00:44 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:44 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) 20:00:44 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:44 executing program 5 (fault-call:6 fault-nth:4): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:00:44 executing program 2 (fault-call:5 fault-nth:5): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) 20:00:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 566.005548][ T9530] FAULT_INJECTION: forcing a failure. [ 566.005548][ T9530] name failslab, interval 1, probability 0, space 0, times 0 [ 566.018421][ T9530] CPU: 0 PID: 9530 Comm: syz-executor.5 Not tainted 5.13.0-rc3-syzkaller #0 [ 566.027566][ T9530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 566.037640][ T9530] Call Trace: [ 566.041013][ T9530] dump_stack+0x137/0x19d [ 566.045389][ T9530] should_fail+0x23c/0x250 [ 566.049906][ T9530] __should_failslab+0x81/0x90 20:00:44 executing program 3: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:44 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 566.054692][ T9530] ? __se_sys_mount+0xf2/0x2e0 [ 566.059558][ T9530] should_failslab+0x5/0x20 [ 566.064277][ T9530] kmem_cache_alloc_trace+0x49/0x310 [ 566.069664][ T9530] ? _copy_from_user+0x94/0xd0 [ 566.074450][ T9530] __se_sys_mount+0xf2/0x2e0 [ 566.079052][ T9530] ? do_mkdirat+0x69/0x200 [ 566.083745][ T9530] ? ksys_write+0x157/0x180 [ 566.088251][ T9530] __x64_sys_mount+0x63/0x70 [ 566.092860][ T9530] do_syscall_64+0x4a/0x90 [ 566.097307][ T9530] entry_SYSCALL_64_after_hwframe+0x44/0xae 20:00:44 executing program 3: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 566.103210][ T9530] RIP: 0033:0x467afa [ 566.107107][ T9530] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 566.127126][ T9530] RSP: 002b:00007f8f7bbb3fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 566.135658][ T9530] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 566.144089][ T9530] RDX: 0000000020000240 RSI: 0000000020000040 RDI: 0000000000000000 [ 566.150858][ T9533] EXT4-fs error: 1 callbacks suppressed [ 566.150891][ T9533] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user [ 566.152172][ T9530] RBP: 00007f8f7bbb4040 R08: 00007f8f7bbb4040 R09: 0000000020000240 [ 566.152191][ T9530] R10: 00000000031388a0 R11: 0000000000000202 R12: 0000000020000240 [ 566.152205][ T9530] R13: 0000000020000040 R14: 00007f8f7bbb4000 R15: 0000000020000680 [ 566.160950][ T9533] EXT4-fs: 1 callbacks suppressed [ 566.160963][ T9533] EXT4-fs (sda1): Remounting filesystem read-only [ 566.205953][ T9532] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.2: Abort forced by user [ 566.218322][ T9532] FAULT_INJECTION: forcing a failure. [ 566.218322][ T9532] name failslab, interval 1, probability 0, space 0, times 0 [ 566.232019][ T9532] CPU: 1 PID: 9532 Comm: syz-executor.2 Not tainted 5.13.0-rc3-syzkaller #0 [ 566.242162][ T9532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 566.252856][ T9532] Call Trace: [ 566.256616][ T9532] dump_stack+0x137/0x19d [ 566.260952][ T9532] should_fail+0x23c/0x250 [ 566.265478][ T9532] __should_failslab+0x81/0x90 [ 566.270236][ T9532] should_failslab+0x5/0x20 [ 566.274894][ T9532] kmem_cache_alloc_node+0x58/0x2b0 [ 566.280091][ T9532] ? create_task_io_context+0x36/0x210 [ 566.285691][ T9532] create_task_io_context+0x36/0x210 [ 566.290988][ T9532] submit_bio_checks+0x778/0x800 [ 566.295935][ T9532] ? mempool_alloc_slab+0x16/0x20 [ 566.301040][ T9532] submit_bio_noacct+0x33/0x7e0 [ 566.306633][ T9532] ? mempool_alloc_slab+0x16/0x20 [ 566.311823][ T9532] ? mempool_free+0x130/0x130 [ 566.316628][ T9532] ? mempool_alloc+0x99/0x300 [ 566.321404][ T9532] submit_bio+0x16d/0x2b0 [ 566.325981][ T9532] ? bio_alloc_bioset+0x402/0x480 [ 566.331336][ T9532] submit_bh_wbc+0x2f3/0x330 [ 566.336052][ T9532] __sync_dirty_buffer+0x136/0x1e0 [ 566.341349][ T9532] ext4_commit_super+0x1e3/0x270 [ 566.346659][ T9532] ext4_handle_error+0x3d5/0x4d0 [ 566.351827][ T9532] __ext4_error+0xd7/0x1f0 [ 566.356691][ T9532] ? list_lru_add+0xd6/0x2c0 [ 566.361597][ T9532] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 566.367218][ T9532] ext4_remount+0x64f/0x1840 [ 566.372180][ T9532] ? ext4_statfs+0x6b0/0x6b0 [ 566.376760][ T9532] legacy_reconfigure+0x8e/0xa0 [ 566.382257][ T9532] reconfigure_super+0x2d3/0x4f0 [ 566.387568][ T9532] path_mount+0x1442/0x1ce0 [ 566.393139][ T9532] __se_sys_mount+0x23d/0x2e0 [ 566.398722][ T9532] ? fput+0x2d/0x130 [ 566.402965][ T9532] __x64_sys_mount+0x63/0x70 [ 566.407662][ T9532] do_syscall_64+0x4a/0x90 [ 566.412176][ T9532] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 566.418843][ T9532] RIP: 0033:0x4665d9 [ 566.422832][ T9532] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 566.442557][ T9532] RSP: 002b:00007f600102d188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 566.451103][ T9532] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 566.459430][ T9532] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 566.467491][ T9532] RBP: 00007f600102d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 566.475682][ T9532] R10: 0000000000010020 R11: 0000000000000246 R12: 0000000000000001 [ 566.484518][ T9532] R13: 00007ffd1792d95f R14: 00007f600102d300 R15: 0000000000022000 [ 566.494528][ T9532] EXT4-fs (sda1): Remounting filesystem read-only 20:00:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="044aac2f", 0x4, 0x20000fec, &(0x7f0000b63fe4)={0xa, 0x2, 0xe000000, @rand_addr, 0x1000000}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e21, 0x2, @dev={0xfe, 0x80, '\x00', 0x17}, 0xff}}, 0x0, 0x0, 0x39, 0x0, "667985b7435f6128b3c39dd536a79d0812bfc586f83e007c02e69277a383a452807fd3bc7d0fe9fc25ad4efba6c701ebea23d53de3c1498146f797668f872ca4b62af2f31f7f3c9de1f8b666e5e4598d"}, 0xd8) 20:00:45 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:45 executing program 3: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:45 executing program 5 (fault-call:6 fault-nth:5): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:00:45 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) 20:00:45 executing program 2 (fault-call:5 fault-nth:6): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) [ 566.873681][ T9567] FAULT_INJECTION: forcing a failure. [ 566.873681][ T9567] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 566.887152][ T9567] CPU: 1 PID: 9567 Comm: syz-executor.5 Not tainted 5.13.0-rc3-syzkaller #0 [ 566.889512][ T9571] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.2: Abort forced by user [ 566.895855][ T9567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 566.895871][ T9567] Call Trace: [ 566.895878][ T9567] dump_stack+0x137/0x19d 20:00:45 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:45 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:45 executing program 1 (fault-call:5 fault-nth:0): r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) [ 566.895904][ T9567] should_fail+0x23c/0x250 [ 566.895922][ T9567] should_fail_usercopy+0x16/0x20 [ 566.895940][ T9567] _copy_from_user+0x1c/0xd0 [ 566.895960][ T9567] __se_sys_mount+0x115/0x2e0 [ 566.942942][ T9567] ? ksys_write+0x157/0x180 [ 566.947455][ T9567] __x64_sys_mount+0x63/0x70 [ 566.952155][ T9567] do_syscall_64+0x4a/0x90 [ 566.956608][ T9567] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 566.962562][ T9567] RIP: 0033:0x467afa 20:00:45 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 566.966545][ T9567] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 566.986164][ T9567] RSP: 002b:00007f8f7bbb3fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 566.994588][ T9567] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 567.002598][ T9567] RDX: 0000000020000240 RSI: 0000000020000040 RDI: 0000000000000000 [ 567.010807][ T9567] RBP: 00007f8f7bbb4040 R08: 00007f8f7bbb4040 R09: 0000000020000240 20:00:45 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 567.018789][ T9567] R10: 00000000031388a0 R11: 0000000000000202 R12: 0000000020000240 [ 567.026857][ T9567] R13: 0000000020000040 R14: 00007f8f7bbb4000 R15: 0000000020000680 [ 567.038051][ T9571] EXT4-fs (sda1): Remounting filesystem read-only [ 567.045630][ T9583] FAULT_INJECTION: forcing a failure. [ 567.045630][ T9583] name failslab, interval 1, probability 0, space 0, times 0 [ 567.058474][ T9583] CPU: 1 PID: 9583 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 20:00:45 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:45 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 567.067305][ T9583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 567.077533][ T9583] Call Trace: [ 567.080817][ T9583] dump_stack+0x137/0x19d [ 567.085367][ T9583] should_fail+0x23c/0x250 [ 567.089964][ T9583] ? getname_flags+0x84/0x3d0 [ 567.094741][ T9583] __should_failslab+0x81/0x90 [ 567.099586][ T9583] should_failslab+0x5/0x20 [ 567.104180][ T9583] kmem_cache_alloc+0x46/0x2f0 [ 567.109043][ T9583] getname_flags+0x84/0x3d0 [ 567.113701][ T9583] user_path_at_empty+0x28/0x50 [ 567.118566][ T9583] __se_sys_mount+0x209/0x2e0 20:00:45 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:46 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 567.123421][ T9583] ? fput+0x2d/0x130 [ 567.127344][ T9583] ? ksys_write+0x157/0x180 [ 567.132118][ T9583] __x64_sys_mount+0x63/0x70 [ 567.136931][ T9583] do_syscall_64+0x4a/0x90 [ 567.141362][ T9583] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 567.147536][ T9583] RIP: 0033:0x4665d9 [ 567.151696][ T9583] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 567.171626][ T9583] RSP: 002b:00007fddc2758188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 567.181698][ T9583] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 567.189762][ T9583] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 567.198142][ T9583] RBP: 00007fddc27581d0 R08: 0000000000000000 R09: 0000000000000000 [ 567.206175][ T9583] R10: 0000000000010020 R11: 0000000000000246 R12: 0000000000000001 [ 567.214356][ T9583] R13: 00007fffc8d54daf R14: 00007fddc2758300 R15: 0000000000022000 [ 567.223291][ T9571] FAULT_INJECTION: forcing a failure. [ 567.223291][ T9571] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 567.232929][ T9570] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user [ 567.236746][ T9571] CPU: 0 PID: 9571 Comm: syz-executor.2 Not tainted 5.13.0-rc3-syzkaller #0 [ 567.256074][ T9571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 567.260409][ T9570] EXT4-fs (sda1): Remounting filesystem read-only [ 567.266218][ T9571] Call Trace: [ 567.266230][ T9571] dump_stack+0x137/0x19d [ 567.281203][ T9571] should_fail+0x23c/0x250 [ 567.285710][ T9571] should_fail_usercopy+0x16/0x20 [ 567.290744][ T9571] _copy_to_user+0x1c/0x90 [ 567.295181][ T9571] simple_read_from_buffer+0xab/0x120 [ 567.300771][ T9571] proc_fail_nth_read+0xf6/0x140 [ 567.305702][ T9571] ? rw_verify_area+0x136/0x250 [ 567.310761][ T9571] ? proc_fault_inject_write+0x200/0x200 [ 567.316540][ T9571] vfs_read+0x154/0x5d0 [ 567.320726][ T9571] ? __fget_light+0x21b/0x260 [ 567.325685][ T9571] ? __cond_resched+0x11/0x40 [ 567.330651][ T9571] ksys_read+0xce/0x180 [ 567.334915][ T9571] __x64_sys_read+0x3e/0x50 [ 567.339549][ T9571] do_syscall_64+0x4a/0x90 [ 567.344121][ T9571] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 567.350631][ T9571] RIP: 0033:0x41935c [ 567.354643][ T9571] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 567.375328][ T9571] RSP: 002b:00007f600102d170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 567.385124][ T9571] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041935c [ 567.393402][ T9571] RDX: 000000000000000f RSI: 00007f600102d1e0 RDI: 0000000000000004 [ 567.401988][ T9571] RBP: 00007f600102d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 567.410213][ T9571] R10: 0000000000010020 R11: 0000000000000246 R12: 0000000000000001 20:00:46 executing program 5 (fault-call:6 fault-nth:6): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:00:46 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:46 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:46 executing program 1 (fault-call:5 fault-nth:1): r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) 20:00:46 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) 20:00:46 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) [ 567.418635][ T9571] R13: 00007ffd1792d95f R14: 00007f600102d300 R15: 0000000000022000 [ 567.443140][ T9567] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 567.458181][ T9567] EXT4-fs (sda1): Remounting filesystem read-only 20:00:46 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:46 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 567.519275][ T9617] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user [ 567.521309][ T9615] FAULT_INJECTION: forcing a failure. [ 567.521309][ T9615] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 567.546135][ T9615] CPU: 1 PID: 9615 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 567.555217][ T9615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 567.565452][ T9615] Call Trace: 20:00:46 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 567.568844][ T9615] dump_stack+0x137/0x19d [ 567.573212][ T9615] should_fail+0x23c/0x250 [ 567.577703][ T9615] should_fail_usercopy+0x16/0x20 [ 567.582829][ T9615] strncpy_from_user+0x21/0x250 [ 567.587799][ T9615] getname_flags+0xb8/0x3d0 [ 567.592348][ T9615] user_path_at_empty+0x28/0x50 [ 567.597209][ T9615] __se_sys_mount+0x209/0x2e0 [ 567.602111][ T9615] ? fput+0x2d/0x130 [ 567.604496][ T9616] FAULT_INJECTION: forcing a failure. [ 567.604496][ T9616] name failslab, interval 1, probability 0, space 0, times 0 [ 567.606006][ T9615] ? ksys_write+0x157/0x180 [ 567.606028][ T9615] __x64_sys_mount+0x63/0x70 [ 567.627669][ T9615] do_syscall_64+0x4a/0x90 [ 567.632115][ T9615] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 567.638101][ T9615] RIP: 0033:0x4665d9 [ 567.641995][ T9615] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 567.661789][ T9615] RSP: 002b:00007fddc2758188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 567.670317][ T9615] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 567.678914][ T9615] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 567.686977][ T9615] RBP: 00007fddc27581d0 R08: 0000000000000000 R09: 0000000000000000 [ 567.694962][ T9615] R10: 0000000000010020 R11: 0000000000000246 R12: 0000000000000001 [ 567.703021][ T9615] R13: 00007fffc8d54daf R14: 00007fddc2758300 R15: 0000000000022000 [ 567.711124][ T9616] CPU: 0 PID: 9616 Comm: syz-executor.5 Not tainted 5.13.0-rc3-syzkaller #0 [ 567.719995][ T9616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 567.731119][ T9616] Call Trace: [ 567.734483][ T9616] dump_stack+0x137/0x19d [ 567.739009][ T9616] should_fail+0x23c/0x250 [ 567.744163][ T9616] ? getname_flags+0x84/0x3d0 [ 567.748872][ T9616] __should_failslab+0x81/0x90 [ 567.753702][ T9616] should_failslab+0x5/0x20 [ 567.756679][ T9617] EXT4-fs (sda1): Remounting filesystem read-only [ 567.758728][ T9616] kmem_cache_alloc+0x46/0x2f0 20:00:46 executing program 1 (fault-call:5 fault-nth:2): r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) 20:00:46 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:46 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 567.758757][ T9616] getname_flags+0x84/0x3d0 [ 567.774951][ T9616] ? should_fail+0xd6/0x250 [ 567.779572][ T9616] user_path_at_empty+0x28/0x50 [ 567.784773][ T9616] __se_sys_mount+0x209/0x2e0 [ 567.790244][ T9616] ? ksys_write+0x157/0x180 [ 567.794923][ T9616] __x64_sys_mount+0x63/0x70 [ 567.799547][ T9616] do_syscall_64+0x4a/0x90 [ 567.804359][ T9616] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 567.810276][ T9616] RIP: 0033:0x467afa [ 567.814344][ T9616] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 567.834048][ T9616] RSP: 002b:00007f8f7bbb3fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 567.842471][ T9616] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 567.850449][ T9616] RDX: 0000000020000240 RSI: 0000000020000040 RDI: 0000000000000000 [ 567.858687][ T9616] RBP: 00007f8f7bbb4040 R08: 00007f8f7bbb4040 R09: 0000000020000240 [ 567.866755][ T9616] R10: 00000000031388a0 R11: 0000000000000202 R12: 0000000020000240 [ 567.875206][ T9616] R13: 0000000020000040 R14: 00007f8f7bbb4000 R15: 0000000020000680 [ 567.886228][ T9614] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.2: Abort forced by user [ 567.902564][ T9638] FAULT_INJECTION: forcing a failure. [ 567.902564][ T9638] name failslab, interval 1, probability 0, space 0, times 0 20:00:46 executing program 5 (fault-call:6 fault-nth:7): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:00:46 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:46 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:46 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) [ 567.915256][ T9638] CPU: 1 PID: 9638 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 567.923968][ T9638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 567.934205][ T9638] Call Trace: [ 567.937612][ T9638] dump_stack+0x137/0x19d [ 567.941955][ T9638] should_fail+0x23c/0x250 [ 567.946477][ T9638] __should_failslab+0x81/0x90 [ 567.951347][ T9638] ? alloc_fs_context+0x46/0x500 [ 567.956299][ T9638] should_failslab+0x5/0x20 [ 567.960930][ T9638] kmem_cache_alloc_trace+0x49/0x310 [ 567.966301][ T9638] alloc_fs_context+0x46/0x500 [ 567.971085][ T9638] ? security_capable+0x91/0xa0 [ 567.976142][ T9638] fs_context_for_reconfigure+0x42/0x50 [ 567.981785][ T9638] path_mount+0x1212/0x1ce0 [ 567.986331][ T9638] __se_sys_mount+0x23d/0x2e0 [ 567.991137][ T9638] ? fput+0x2d/0x130 [ 567.995127][ T9638] __x64_sys_mount+0x63/0x70 [ 568.000145][ T9638] do_syscall_64+0x4a/0x90 [ 568.004562][ T9638] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 568.010551][ T9638] RIP: 0033:0x4665d9 [ 568.014596][ T9638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 568.034504][ T9638] RSP: 002b:00007fddc2758188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 568.043114][ T9638] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 568.051380][ T9638] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 568.059341][ T9638] RBP: 00007fddc27581d0 R08: 0000000000000000 R09: 0000000000000000 [ 568.067390][ T9638] R10: 0000000000010020 R11: 0000000000000246 R12: 0000000000000001 [ 568.075957][ T9638] R13: 00007fffc8d54daf R14: 00007fddc2758300 R15: 0000000000022000 [ 568.088837][ T9614] EXT4-fs (sda1): Remounting filesystem read-only 20:00:46 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1000a, 0x0) 20:00:47 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(0x0, &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:47 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:47 executing program 1 (fault-call:5 fault-nth:3): r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) 20:00:47 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(0x0, &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:47 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10025, 0x0) 20:00:47 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:47 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10029, 0x0) [ 569.578556][ T9675] cgroup: Unknown subsys name 'perf_event' [ 569.584906][ T9675] cgroup: Unknown subsys name 'net_cls' [ 569.814434][ T9719] cgroup: Unknown subsys name 'perf_event' [ 569.816479][ T9721] cgroup: Unknown subsys name 'perf_event' [ 569.820516][ T9719] cgroup: Unknown subsys name 'net_cls' [ 569.829856][ T9721] cgroup: Unknown subsys name 'net_cls' [ 571.739846][T10881] FAULT_INJECTION: forcing a failure. [ 571.739846][T10881] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 571.753039][T10881] CPU: 0 PID: 10881 Comm: syz-executor.5 Not tainted 5.13.0-rc3-syzkaller #0 [ 571.761827][T10881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 571.772178][T10881] Call Trace: [ 571.775589][T10881] dump_stack+0x137/0x19d [ 571.779935][T10881] should_fail+0x23c/0x250 [ 571.784452][T10881] should_fail_usercopy+0x16/0x20 [ 571.789487][T10881] strncpy_from_user+0x21/0x250 [ 571.794375][T10881] getname_flags+0xb8/0x3d0 [ 571.799017][T10881] ? should_fail+0xd6/0x250 [ 571.803536][T10881] user_path_at_empty+0x28/0x50 [ 571.808403][T10881] __se_sys_mount+0x209/0x2e0 [ 571.813137][T10881] ? __fpregs_load_activate+0x103/0x1b0 [ 571.818722][T10881] __x64_sys_mount+0x63/0x70 [ 571.823452][T10881] do_syscall_64+0x4a/0x90 [ 571.828057][T10881] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 571.835344][T10881] RIP: 0033:0x467afa [ 571.839424][T10881] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 571.862119][T10881] RSP: 002b:00007f6354899fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 571.870699][T10881] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 571.878796][T10881] RDX: 0000000020000240 RSI: 0000000020000040 RDI: 0000000000000000 20:00:50 executing program 5 (fault-call:6 fault-nth:8): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:00:50 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:50 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(0x0, &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 571.886800][T10881] RBP: 00007f635489a040 R08: 00007f635489a040 R09: 0000000020000240 [ 571.895011][T10881] R10: 00000000031388a0 R11: 0000000000000202 R12: 0000000020000240 [ 571.903149][T10881] R13: 0000000020000040 R14: 00007f635489a000 R15: 0000000020000680 [ 571.940149][T10935] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user [ 571.973192][T10935] EXT4-fs (sda1): Remounting filesystem read-only [ 571.981040][T10945] FAULT_INJECTION: forcing a failure. [ 571.981040][T10945] name failslab, interval 1, probability 0, space 0, times 0 [ 571.993714][T10945] CPU: 1 PID: 10945 Comm: syz-executor.5 Not tainted 5.13.0-rc3-syzkaller #0 [ 572.002575][T10945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 572.012641][T10945] Call Trace: [ 572.016051][T10945] dump_stack+0x137/0x19d [ 572.020486][T10945] should_fail+0x23c/0x250 [ 572.025027][T10945] __should_failslab+0x81/0x90 [ 572.029804][T10945] ? alloc_fs_context+0x46/0x500 [ 572.034761][T10945] should_failslab+0x5/0x20 [ 572.039291][T10945] kmem_cache_alloc_trace+0x49/0x310 [ 572.044715][T10945] alloc_fs_context+0x46/0x500 [ 572.049609][T10945] ? security_capable+0x91/0xa0 [ 572.054594][T10945] fs_context_for_reconfigure+0x42/0x50 [ 572.060194][T10945] path_mount+0x1212/0x1ce0 [ 572.064816][T10945] __se_sys_mount+0x23d/0x2e0 [ 572.069537][T10945] __x64_sys_mount+0x63/0x70 [ 572.074128][T10945] do_syscall_64+0x4a/0x90 [ 572.078610][T10945] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 572.084556][T10945] RIP: 0033:0x467afa [ 572.088545][T10945] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 572.108556][T10945] RSP: 002b:00007f6354899fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 572.117415][T10945] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 572.125488][T10945] RDX: 0000000020000240 RSI: 0000000020000040 RDI: 0000000000000000 20:00:51 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) 20:00:51 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x11020, 0x0) 20:00:51 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:51 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 572.133736][T10945] RBP: 00007f635489a040 R08: 00007f635489a040 R09: 0000000020000240 [ 572.141720][T10945] R10: 00000000031388a0 R11: 0000000000000202 R12: 0000000020000240 [ 572.150130][T10945] R13: 0000000020000040 R14: 00007f635489a000 R15: 0000000020000680 [ 572.417263][T11068] FAULT_INJECTION: forcing a failure. [ 572.417263][T11068] name failslab, interval 1, probability 0, space 0, times 0 [ 572.430186][T11068] CPU: 0 PID: 11068 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 572.439099][T11068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 572.449513][T11068] Call Trace: [ 572.453202][T11068] dump_stack+0x137/0x19d [ 572.457658][T11068] should_fail+0x23c/0x250 [ 572.462060][T11068] __should_failslab+0x81/0x90 [ 572.467125][T11068] ? legacy_init_fs_context+0x2d/0x70 [ 572.472648][T11068] should_failslab+0x5/0x20 [ 572.477436][T11068] kmem_cache_alloc_trace+0x49/0x310 [ 572.483390][T11068] ? kmem_cache_alloc_trace+0x215/0x310 [ 572.489581][T11068] ? alloc_fs_context+0x46/0x500 [ 572.494510][T11068] legacy_init_fs_context+0x2d/0x70 [ 572.500591][T11068] alloc_fs_context+0x419/0x500 [ 572.505482][T11068] fs_context_for_reconfigure+0x42/0x50 [ 572.511130][T11068] path_mount+0x1212/0x1ce0 [ 572.515639][T11068] __se_sys_mount+0x23d/0x2e0 [ 572.520328][T11068] ? fput+0x2d/0x130 [ 572.524315][T11068] __x64_sys_mount+0x63/0x70 [ 572.529071][T11068] do_syscall_64+0x4a/0x90 [ 572.533563][T11068] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 572.539561][T11068] RIP: 0033:0x4665d9 [ 572.543557][T11068] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 20:00:51 executing program 1 (fault-call:5 fault-nth:4): r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) 20:00:51 executing program 5 (fault-call:6 fault-nth:9): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:00:51 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:51 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x2) 20:00:51 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:51 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) [ 572.563901][T11068] RSP: 002b:00007f5e3c848188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 572.572885][T11068] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 572.581295][T11068] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 572.589617][T11068] RBP: 00007f5e3c8481d0 R08: 0000000000000000 R09: 0000000000000000 [ 572.598377][T11068] R10: 0000000000010020 R11: 0000000000000246 R12: 0000000000000001 [ 572.606464][T11068] R13: 00007ffc1f7ffd0f R14: 00007f5e3c848300 R15: 0000000000022000 20:00:51 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) 20:00:51 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 572.681361][T11078] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.1: Abort forced by user [ 572.709226][T11078] FAULT_INJECTION: forcing a failure. [ 572.709226][T11078] name failslab, interval 1, probability 0, space 0, times 0 [ 572.722391][T11078] CPU: 0 PID: 11078 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 572.731455][T11078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 572.743470][T11078] Call Trace: [ 572.747712][T11078] dump_stack+0x137/0x19d [ 572.752079][T11078] should_fail+0x23c/0x250 [ 572.756678][T11078] ? mempool_alloc_slab+0x16/0x20 [ 572.761716][T11078] __should_failslab+0x81/0x90 [ 572.766678][T11078] should_failslab+0x5/0x20 [ 572.771234][T11078] kmem_cache_alloc+0x46/0x2f0 [ 572.776620][T11078] mempool_alloc_slab+0x16/0x20 20:00:51 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:51 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) 20:00:51 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) [ 572.781675][T11078] ? mempool_free+0x130/0x130 [ 572.786625][T11078] mempool_alloc+0x8c/0x300 [ 572.791789][T11078] ? copy_fpregs_to_fpstate+0xd8/0x110 [ 572.798457][T11078] ? __switch_to+0x14e/0x4b0 [ 572.803153][T11078] bio_alloc_bioset+0xcc/0x480 [ 572.807923][T11078] submit_bh_wbc+0x130/0x330 [ 572.812546][T11078] ? ext4_update_super+0x71c/0x740 [ 572.817850][T11078] __sync_dirty_buffer+0x136/0x1e0 [ 572.822976][T11078] ext4_commit_super+0x1e3/0x270 [ 572.828208][T11078] ext4_handle_error+0x3d5/0x4d0 [ 572.833453][T11078] __ext4_error+0xd7/0x1f0 [ 572.838291][T11078] ? mem_cgroup_from_obj+0x125/0x160 [ 572.844031][T11078] ? __list_add_valid+0x28/0x90 [ 572.849164][T11078] ? list_lru_add+0xd6/0x2c0 [ 572.854870][T11078] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 572.860177][T11078] ext4_remount+0x64f/0x1840 [ 572.864814][T11078] ? ext4_statfs+0x6b0/0x6b0 [ 572.869575][T11078] legacy_reconfigure+0x8e/0xa0 [ 572.874533][T11078] reconfigure_super+0x2d3/0x4f0 [ 572.879570][T11078] path_mount+0x1442/0x1ce0 [ 572.884162][T11078] __se_sys_mount+0x23d/0x2e0 [ 572.888843][T11078] ? fput+0x2d/0x130 [ 572.893003][T11078] __x64_sys_mount+0x63/0x70 [ 572.897768][T11078] do_syscall_64+0x4a/0x90 [ 572.902458][T11078] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 572.908392][T11078] RIP: 0033:0x4665d9 [ 572.912390][T11078] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 572.932190][T11078] RSP: 002b:00007f5e3c848188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 572.940741][T11078] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 572.949773][T11078] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 572.958203][T11078] RBP: 00007f5e3c8481d0 R08: 0000000000000000 R09: 0000000000000000 [ 572.966628][T11078] R10: 0000000000010020 R11: 0000000000000246 R12: 0000000000000001 [ 572.974894][T11078] R13: 00007ffc1f7ffd0f R14: 00007f5e3c848300 R15: 0000000000022000 20:00:51 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) [ 572.985406][T11090] FAULT_INJECTION: forcing a failure. [ 572.985406][T11090] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 572.999042][T11090] CPU: 0 PID: 11090 Comm: syz-executor.5 Not tainted 5.13.0-rc3-syzkaller #0 [ 573.005571][T11078] EXT4-fs (sda1): Remounting filesystem read-only [ 573.008993][T11090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 573.009008][T11090] Call Trace: [ 573.009016][T11090] dump_stack+0x137/0x19d [ 573.033316][T11090] should_fail+0x23c/0x250 [ 573.037849][T11090] should_fail_usercopy+0x16/0x20 [ 573.042912][T11090] _copy_from_user+0x1c/0xd0 [ 573.047620][T11090] kstrtouint_from_user+0x6f/0x130 [ 573.053011][T11090] ? _copy_to_user+0x77/0x90 [ 573.057628][T11090] ? fsnotify_perm+0x59/0x2e0 [ 573.062572][T11090] proc_fail_nth_write+0x38/0x140 [ 573.067604][T11090] ? proc_fail_nth_read+0x140/0x140 [ 573.072894][T11090] vfs_write+0x1f3/0x770 [ 573.077228][T11090] ? __fget_light+0x21b/0x260 [ 573.082315][T11090] ? __cond_resched+0x11/0x40 [ 573.087116][T11090] ksys_write+0xce/0x180 [ 573.091345][T11090] __x64_sys_write+0x3e/0x50 [ 573.095920][T11090] do_syscall_64+0x4a/0x90 [ 573.100465][T11090] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 573.106730][T11090] RIP: 0033:0x4192bf [ 573.110794][T11090] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 573.132120][T11090] RSP: 002b:00007f6354879170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 573.141560][T11090] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004192bf [ 573.150143][T11090] RDX: 0000000000000001 RSI: 00007f63548791e0 RDI: 0000000000000004 [ 573.158487][T11090] RBP: 00007f63548791d0 R08: 0000000000000000 R09: 0000000020000240 [ 573.166696][T11090] R10: 00000000031388a0 R11: 0000000000000293 R12: 0000000000000002 [ 573.175347][T11090] R13: 00007ffd3f561adf R14: 00007f6354879300 R15: 0000000000022000 20:00:52 executing program 1 (fault-call:5 fault-nth:5): r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) 20:00:52 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:52 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x3) 20:00:52 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) 20:00:52 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:00:52 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) [ 573.187956][T11094] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user [ 573.209413][T11094] EXT4-fs (sda1): Remounting filesystem read-only 20:00:52 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) 20:00:52 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 573.258202][T11109] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.1: Abort forced by user 20:00:52 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 573.319726][T11109] FAULT_INJECTION: forcing a failure. [ 573.319726][T11109] name failslab, interval 1, probability 0, space 0, times 0 [ 573.332831][T11109] CPU: 1 PID: 11109 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 573.342361][T11109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 573.352956][T11109] Call Trace: [ 573.356251][T11109] dump_stack+0x137/0x19d [ 573.360604][T11109] should_fail+0x23c/0x250 [ 573.365081][T11109] __should_failslab+0x81/0x90 20:00:52 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:52 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 573.370118][T11109] should_failslab+0x5/0x20 [ 573.374651][T11109] kmem_cache_alloc_node+0x58/0x2b0 [ 573.380260][T11109] ? create_task_io_context+0x36/0x210 [ 573.386135][T11109] create_task_io_context+0x36/0x210 [ 573.391496][T11109] submit_bio_checks+0x778/0x800 [ 573.396705][T11109] ? mempool_alloc_slab+0x16/0x20 [ 573.402447][T11109] submit_bio_noacct+0x33/0x7e0 [ 573.408405][T11109] ? mempool_alloc_slab+0x16/0x20 [ 573.413672][T11109] ? mempool_free+0x130/0x130 20:00:52 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 573.418459][T11109] ? mempool_alloc+0x99/0x300 [ 573.423344][T11109] ? copy_fpregs_to_fpstate+0xd8/0x110 [ 573.428991][T11109] submit_bio+0x16d/0x2b0 [ 573.433666][T11109] ? bio_alloc_bioset+0x402/0x480 [ 573.438862][T11109] submit_bh_wbc+0x2f3/0x330 [ 573.443473][T11109] __sync_dirty_buffer+0x136/0x1e0 [ 573.448723][T11109] ext4_commit_super+0x1e3/0x270 [ 573.453684][T11109] ext4_handle_error+0x3d5/0x4d0 [ 573.458887][T11109] __ext4_error+0xd7/0x1f0 [ 573.463322][T11109] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 573.470121][T11109] ? rb_erase+0x623/0x750 [ 573.474552][T11109] ? list_lru_add+0xd6/0x2c0 [ 573.479589][T11109] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 573.485075][T11109] ext4_remount+0x64f/0x1840 [ 573.489731][T11109] ? ext4_statfs+0x6b0/0x6b0 [ 573.494341][T11109] legacy_reconfigure+0x8e/0xa0 [ 573.499207][T11109] reconfigure_super+0x2d3/0x4f0 [ 573.504329][T11109] path_mount+0x1442/0x1ce0 [ 573.508829][T11109] __se_sys_mount+0x23d/0x2e0 [ 573.513532][T11109] ? fput+0x2d/0x130 [ 573.517442][T11109] __x64_sys_mount+0x63/0x70 [ 573.522095][T11109] do_syscall_64+0x4a/0x90 [ 573.527304][T11109] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 573.533347][T11109] RIP: 0033:0x4665d9 [ 573.537438][T11109] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 573.557796][T11109] RSP: 002b:00007f5e3c848188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 573.566215][T11109] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 573.574431][T11109] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 573.583058][T11109] RBP: 00007f5e3c8481d0 R08: 0000000000000000 R09: 0000000000000000 [ 573.591654][T11109] R10: 0000000000010020 R11: 0000000000000246 R12: 0000000000000001 [ 573.600157][T11109] R13: 00007ffc1f7ffd0f R14: 00007f5e3c848300 R15: 0000000000022000 20:00:52 executing program 1 (fault-call:5 fault-nth:6): r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) 20:00:52 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:52 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4) [ 573.617394][T11109] EXT4-fs (sda1): Remounting filesystem read-only [ 573.624187][T11116] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 573.638758][T11116] EXT4-fs (sda1): Remounting filesystem read-only [ 573.646117][T11118] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.0: Abort forced by user [ 573.664576][T11118] EXT4-fs (sda1): Remounting filesystem read-only 20:00:52 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:00:52 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(0x0, &(0x7f0000001580)=""/4096) [ 573.687305][T11120] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user [ 573.720521][T11120] EXT4-fs (sda1): Remounting filesystem read-only 20:00:52 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) 20:00:52 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) 20:00:52 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:00:52 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x5) 20:00:52 executing program 0 (fault-call:4 fault-nth:0): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:52 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(0x0, &(0x7f0000001580)=""/4096) [ 573.854108][T11160] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user [ 573.867890][T11159] FAULT_INJECTION: forcing a failure. [ 573.867890][T11159] name failslab, interval 1, probability 0, space 0, times 0 [ 573.880528][T11159] CPU: 0 PID: 11159 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 573.889414][T11159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 573.892674][T11160] EXT4-fs (sda1): Remounting filesystem read-only [ 573.899923][T11159] Call Trace: [ 573.899937][T11159] dump_stack+0x137/0x19d [ 573.914684][T11159] should_fail+0x23c/0x250 [ 573.919121][T11159] ? getname_flags+0x84/0x3d0 [ 573.923816][T11159] __should_failslab+0x81/0x90 [ 573.928609][T11159] should_failslab+0x5/0x20 [ 573.933141][T11159] kmem_cache_alloc+0x46/0x2f0 [ 573.938030][T11159] getname_flags+0x84/0x3d0 [ 573.943063][T11159] user_path_at_empty+0x28/0x50 [ 573.948009][T11159] path_setxattr+0x4b/0x180 [ 573.952522][T11159] ? ksys_write+0x157/0x180 [ 573.957186][T11159] __x64_sys_setxattr+0x69/0x80 [ 573.962185][T11159] do_syscall_64+0x4a/0x90 [ 573.966738][T11159] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 573.972790][T11159] RIP: 0033:0x4665d9 [ 573.976956][T11159] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 20:00:52 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(0x0, &(0x7f0000001580)=""/4096) 20:00:52 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) 20:00:52 executing program 0 (fault-call:4 fault-nth:1): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 573.997368][T11159] RSP: 002b:00007fc1c94c8188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 574.005906][T11159] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 574.013885][T11159] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 574.021952][T11159] RBP: 00007fc1c94c81d0 R08: 0000000000000000 R09: 0000000000000000 [ 574.029975][T11159] R10: 0000000000000015 R11: 0000000000000246 R12: 0000000000000001 [ 574.038201][T11159] R13: 00007ffd222556cf R14: 00007fc1c94c8300 R15: 0000000000022000 [ 574.100908][T11165] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user [ 574.112445][T11166] FAULT_INJECTION: forcing a failure. [ 574.112445][T11166] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 574.113288][T11165] EXT4-fs (sda1): Remounting filesystem read-only [ 574.125608][T11166] CPU: 0 PID: 11166 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 574.141130][T11166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 574.151249][T11166] Call Trace: [ 574.154729][T11166] dump_stack+0x137/0x19d [ 574.159245][T11166] should_fail+0x23c/0x250 [ 574.163709][T11166] should_fail_usercopy+0x16/0x20 [ 574.168767][T11166] strncpy_from_user+0x21/0x250 [ 574.173711][T11166] getname_flags+0xb8/0x3d0 [ 574.178238][T11166] user_path_at_empty+0x28/0x50 [ 574.183145][T11166] path_setxattr+0x4b/0x180 [ 574.187659][T11166] ? ksys_write+0x157/0x180 [ 574.192233][T11166] __x64_sys_setxattr+0x69/0x80 [ 574.197088][T11166] do_syscall_64+0x4a/0x90 [ 574.201507][T11166] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 574.207436][T11166] RIP: 0033:0x4665d9 [ 574.211353][T11166] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 574.231266][T11166] RSP: 002b:00007fc1c94c8188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 574.239904][T11166] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 20:00:53 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) [ 574.248423][T11166] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 574.257010][T11166] RBP: 00007fc1c94c81d0 R08: 0000000000000000 R09: 0000000000000000 [ 574.265164][T11166] R10: 0000000000000015 R11: 0000000000000246 R12: 0000000000000001 [ 574.273342][T11166] R13: 00007ffd222556cf R14: 00007fc1c94c8300 R15: 0000000000022000 20:00:53 executing program 0 (fault-call:4 fault-nth:2): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:53 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) [ 574.316144][T11168] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user [ 574.330510][T11168] EXT4-fs (sda1): Remounting filesystem read-only [ 574.366837][T11170] FAULT_INJECTION: forcing a failure. [ 574.366837][T11170] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 574.380161][T11170] CPU: 0 PID: 11170 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 574.389021][T11170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 574.399348][T11170] Call Trace: [ 574.402764][T11170] dump_stack+0x137/0x19d [ 574.407104][T11170] should_fail+0x23c/0x250 [ 574.411523][T11170] should_fail_usercopy+0x16/0x20 [ 574.416845][T11170] strncpy_from_user+0x21/0x250 [ 574.421807][T11170] setxattr+0x70/0x270 [ 574.426061][T11170] ? filename_lookup+0x2be/0x390 [ 574.431000][T11170] ? strncpy_from_user+0x178/0x250 [ 574.436135][T11170] path_setxattr+0xe7/0x180 [ 574.440734][T11170] __x64_sys_setxattr+0x69/0x80 [ 574.445876][T11170] do_syscall_64+0x4a/0x90 [ 574.450316][T11170] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 574.456326][T11170] RIP: 0033:0x4665d9 [ 574.460228][T11170] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 574.480564][T11170] RSP: 002b:00007fc1c94c8188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 574.488985][T11170] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 574.496959][T11170] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 574.505047][T11170] RBP: 00007fc1c94c81d0 R08: 0000000000000000 R09: 0000000000000000 [ 574.513067][T11170] R10: 0000000000000015 R11: 0000000000000246 R12: 0000000000000001 [ 574.521312][T11170] R13: 00007ffd222556cf R14: 00007fc1c94c8300 R15: 0000000000022000 20:00:53 executing program 0 (fault-call:4 fault-nth:3): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 574.640268][T11174] FAULT_INJECTION: forcing a failure. [ 574.640268][T11174] name failslab, interval 1, probability 0, space 0, times 0 [ 574.653187][T11174] CPU: 0 PID: 11174 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 574.662044][T11174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 574.672177][T11174] Call Trace: [ 574.675469][T11174] dump_stack+0x137/0x19d [ 574.679812][T11174] should_fail+0x23c/0x250 [ 574.684238][T11174] __should_failslab+0x81/0x90 [ 574.689065][T11174] should_failslab+0x5/0x20 [ 574.693570][T11174] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 574.700190][T11174] ? dput+0x232/0x360 [ 574.704228][T11174] ? check_stack_object+0x43/0x70 [ 574.709389][T11174] ? __kmalloc_node+0x30/0x40 [ 574.714136][T11174] __kmalloc_node+0x30/0x40 [ 574.719287][T11174] kvmalloc_node+0x81/0xf0 [ 574.723795][T11174] setxattr+0x148/0x270 [ 574.728115][T11174] ? filename_lookup+0x2be/0x390 [ 574.733156][T11174] ? strncpy_from_user+0x178/0x250 [ 574.738317][T11174] path_setxattr+0xe7/0x180 [ 574.742917][T11174] __x64_sys_setxattr+0x69/0x80 [ 574.747914][T11174] do_syscall_64+0x4a/0x90 [ 574.752358][T11174] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 574.758373][T11174] RIP: 0033:0x4665d9 [ 574.762380][T11174] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 574.782542][T11174] RSP: 002b:00007fc1c94c8188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 574.791100][T11174] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 574.799157][T11174] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 574.807176][T11174] RBP: 00007fc1c94c81d0 R08: 0000000000000000 R09: 0000000000000000 [ 574.815612][T11174] R10: 0000000000000015 R11: 0000000000000246 R12: 0000000000000001 [ 574.823920][T11174] R13: 00007ffd222556cf R14: 00007fc1c94c8300 R15: 0000000000022000 [ 575.373903][T11176] cgroup: Unknown subsys name 'perf_event' [ 575.381032][T11176] cgroup: Unknown subsys name 'net_cls' [ 575.919066][T11337] cgroup: Unknown subsys name 'perf_event' [ 575.931637][T11337] cgroup: Unknown subsys name 'net_cls' [ 576.003309][T11362] cgroup: Unknown subsys name 'perf_event' [ 576.009475][T11362] cgroup: Unknown subsys name 'net_cls' [ 576.084692][T11403] cgroup: Unknown subsys name 'perf_event' [ 576.091088][T11403] cgroup: Unknown subsys name 'net_cls' [ 577.920871][T12516] EXT4-fs error: 1 callbacks suppressed [ 577.920883][T12516] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 577.942234][T12516] EXT4-fs: 1 callbacks suppressed [ 577.942247][T12516] EXT4-fs (sda1): Remounting filesystem read-only [ 577.955582][T12531] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 577.967215][T12531] EXT4-fs (sda1): Remounting filesystem read-only 20:00:57 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1000a, 0x0) 20:00:57 executing program 0 (fault-call:4 fault-nth:4): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 578.679357][T12939] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.1: Abort forced by user [ 578.692372][T12939] EXT4-fs (sda1): Remounting filesystem read-only [ 578.750336][T12960] FAULT_INJECTION: forcing a failure. [ 578.750336][T12960] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 578.763716][T12960] CPU: 0 PID: 12960 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 578.772575][T12960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 578.782665][T12960] Call Trace: [ 578.786061][T12960] dump_stack+0x137/0x19d [ 578.790405][T12960] should_fail+0x23c/0x250 [ 578.794955][T12960] should_fail_usercopy+0x16/0x20 [ 578.800021][T12960] _copy_from_user+0x1c/0xd0 [ 578.804620][T12960] setxattr+0x170/0x270 [ 578.808803][T12960] ? filename_lookup+0x2be/0x390 [ 578.813754][T12960] ? strncpy_from_user+0x178/0x250 [ 578.818952][T12960] path_setxattr+0xe7/0x180 [ 578.823517][T12960] __x64_sys_setxattr+0x69/0x80 [ 578.828379][T12960] do_syscall_64+0x4a/0x90 [ 578.832827][T12960] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 578.838753][T12960] RIP: 0033:0x4665d9 [ 578.842654][T12960] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 578.862368][T12960] RSP: 002b:00007fc1c94c8188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 578.870802][T12960] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 578.878814][T12960] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 578.887231][T12960] RBP: 00007fc1c94c81d0 R08: 0000000000000000 R09: 0000000000000000 20:00:57 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:00:57 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) 20:00:57 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6) 20:00:57 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10025, 0x0) 20:00:57 executing program 0 (fault-call:4 fault-nth:5): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:57 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', 0x0) [ 578.895390][T12960] R10: 0000000000000015 R11: 0000000000000246 R12: 0000000000000001 [ 578.903408][T12960] R13: 00007ffd222556cf R14: 00007fc1c94c8300 R15: 0000000000022000 [ 579.004983][T13026] FAULT_INJECTION: forcing a failure. [ 579.004983][T13026] name failslab, interval 1, probability 0, space 0, times 0 [ 579.017942][T13026] CPU: 0 PID: 13026 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 579.026799][T13026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 579.036976][T13026] Call Trace: [ 579.040266][T13026] dump_stack+0x137/0x19d [ 579.044602][T13026] should_fail+0x23c/0x250 [ 579.049100][T13026] ? kzalloc+0x16/0x20 20:00:57 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', 0x0) 20:00:57 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10029, 0x0) 20:00:57 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x7) 20:00:57 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', 0x0) [ 579.053241][T13026] __should_failslab+0x81/0x90 [ 579.058291][T13026] should_failslab+0x5/0x20 [ 579.062931][T13026] __kmalloc+0x66/0x340 [ 579.067266][T13026] ? rmqueue+0x43/0xd00 [ 579.071519][T13026] ? PageHuge+0x59/0xc0 [ 579.075688][T13026] ? iput+0x1c2/0x590 [ 579.079689][T13026] kzalloc+0x16/0x20 [ 579.083828][T13026] ext4_xattr_block_set+0x13d/0x1fa0 [ 579.089214][T13026] ? strnlen+0x28/0x50 [ 579.093296][T13026] ? strlen+0x1b/0x40 [ 579.097283][T13026] ext4_xattr_set_handle+0xa0c/0x1110 20:00:57 executing program 3 (fault-call:4 fault-nth:0): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 579.102671][T13026] ext4_xattr_set+0x149/0x210 [ 579.107457][T13026] ext4_xattr_security_set+0x38/0x50 [ 579.112904][T13026] ? ext4_xattr_security_get+0x40/0x40 [ 579.118469][T13026] __vfs_setxattr+0x29c/0x2d0 [ 579.123159][T13026] __vfs_setxattr_noperm+0xf1/0x360 [ 579.128452][T13026] __vfs_setxattr_locked+0x1a8/0x1c0 [ 579.133834][T13026] vfs_setxattr+0x145/0x2a0 [ 579.138459][T13026] setxattr+0x131/0x270 [ 579.142891][T13026] ? filename_lookup+0x2be/0x390 [ 579.144424][T13029] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 579.147861][T13026] ? strncpy_from_user+0x178/0x250 [ 579.147923][T13026] path_setxattr+0xe7/0x180 [ 579.168317][T13026] __x64_sys_setxattr+0x69/0x80 [ 579.173175][T13026] do_syscall_64+0x4a/0x90 [ 579.177699][T13026] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 579.180902][T13029] EXT4-fs (sda1): Remounting filesystem read-only [ 579.184643][T13026] RIP: 0033:0x4665d9 [ 579.184665][T13026] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 579.184682][T13026] RSP: 002b:00007fc1c94c8188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 579.184701][T13026] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 579.207892][T13043] FAULT_INJECTION: forcing a failure. [ 579.207892][T13043] name failslab, interval 1, probability 0, space 0, times 0 [ 579.215029][T13026] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 579.215046][T13026] RBP: 00007fc1c94c81d0 R08: 0000000000000000 R09: 0000000000000000 [ 579.215058][T13026] R10: 0000000000000015 R11: 0000000000000246 R12: 0000000000000001 [ 579.215070][T13026] R13: 00007ffd222556cf R14: 00007fc1c94c8300 R15: 0000000000022000 [ 579.249280][T13045] FAULT_INJECTION: forcing a failure. [ 579.249280][T13045] name failslab, interval 1, probability 0, space 0, times 0 [ 579.252909][T13043] CPU: 1 PID: 13043 Comm: syz-executor.3 Not tainted 5.13.0-rc3-syzkaller #0 [ 579.252932][T13043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 579.309500][T13043] Call Trace: [ 579.313306][T13043] dump_stack+0x137/0x19d [ 579.317687][T13043] should_fail+0x23c/0x250 [ 579.322315][T13043] ? getname_flags+0x84/0x3d0 [ 579.326995][T13043] __should_failslab+0x81/0x90 [ 579.331890][T13043] should_failslab+0x5/0x20 [ 579.336396][T13043] kmem_cache_alloc+0x46/0x2f0 [ 579.341164][T13043] ? kstrtouint_from_user+0x104/0x130 [ 579.346967][T13043] getname_flags+0x84/0x3d0 [ 579.351507][T13043] user_path_at_empty+0x28/0x50 [ 579.356426][T13043] __se_sys_statfs+0x4c/0x160 [ 579.361111][T13043] ? vfs_write+0x50c/0x770 [ 579.365848][T13043] ? __fget_light+0x21b/0x260 [ 579.370850][T13043] ? __cond_resched+0x11/0x40 [ 579.379814][T13043] ? fput+0x2d/0x130 [ 579.383807][T13043] ? ksys_write+0x157/0x180 [ 579.388540][T13043] ? fpregs_assert_state_consistent+0x7d/0x90 [ 579.394677][T13043] __x64_sys_statfs+0x2d/0x40 [ 579.399373][T13043] do_syscall_64+0x4a/0x90 [ 579.403855][T13043] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 579.409924][T13043] RIP: 0033:0x4665d9 [ 579.413828][T13043] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 579.433811][T13043] RSP: 002b:00007f15878b4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000089 [ 579.442487][T13043] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 20:00:58 executing program 0 (fault-call:4 fault-nth:6): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 579.450550][T13043] RDX: 0000000000000000 RSI: 0000000020001580 RDI: 0000000020001540 [ 579.458643][T13043] RBP: 00007f15878b41d0 R08: 0000000000000000 R09: 0000000000000000 [ 579.466785][T13043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 579.474948][T13043] R13: 00007ffe1739132f R14: 00007f15878b4300 R15: 0000000000022000 [ 579.483150][T13045] CPU: 0 PID: 13045 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 579.492479][T13045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 579.502837][T13045] Call Trace: [ 579.506444][T13045] dump_stack+0x137/0x19d [ 579.511305][T13045] should_fail+0x23c/0x250 [ 579.515757][T13045] ? ext4_mb_new_blocks+0x2e7/0x1f90 [ 579.521087][T13045] __should_failslab+0x81/0x90 [ 579.526005][T13045] should_failslab+0x5/0x20 [ 579.530606][T13045] kmem_cache_alloc+0x46/0x2f0 [ 579.535742][T13045] ext4_mb_new_blocks+0x2e7/0x1f90 [ 579.541026][T13045] ? ext4_xattr_set_entry+0xaf0/0x20d0 [ 579.546491][T13045] ? __find_get_block+0x82c/0x900 [ 579.551721][T13045] ext4_new_meta_blocks+0x84/0x180 [ 579.556816][T13045] ext4_xattr_block_set+0x14ab/0x1fa0 [ 579.562206][T13045] ? strlen+0x1b/0x40 [ 579.566182][T13045] ext4_xattr_set_handle+0xa0c/0x1110 [ 579.572021][T13045] ext4_xattr_set+0x149/0x210 [ 579.576883][T13045] ext4_xattr_security_set+0x38/0x50 [ 579.582282][T13045] ? ext4_xattr_security_get+0x40/0x40 [ 579.587795][T13045] __vfs_setxattr+0x29c/0x2d0 [ 579.592462][T13045] __vfs_setxattr_noperm+0xf1/0x360 [ 579.598271][T13045] __vfs_setxattr_locked+0x1a8/0x1c0 [ 579.603549][T13045] vfs_setxattr+0x145/0x2a0 [ 579.608319][T13045] setxattr+0x131/0x270 [ 579.612787][T13045] ? filename_lookup+0x2be/0x390 [ 579.617893][T13045] ? strncpy_from_user+0x178/0x250 [ 579.623228][T13045] path_setxattr+0xe7/0x180 [ 579.627833][T13045] __x64_sys_setxattr+0x69/0x80 [ 579.632799][T13045] do_syscall_64+0x4a/0x90 [ 579.637332][T13045] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 579.643212][T13045] RIP: 0033:0x4665d9 [ 579.647382][T13045] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 579.667559][T13045] RSP: 002b:00007fc1c94c8188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 579.676067][T13045] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 579.684123][T13045] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 579.692242][T13045] RBP: 00007fc1c94c81d0 R08: 0000000000000000 R09: 0000000000000000 [ 579.700415][T13045] R10: 0000000000000015 R11: 0000000000000246 R12: 0000000000000001 [ 579.708821][T13045] R13: 00007ffd222556cf R14: 00007fc1c94c8300 R15: 0000000000022000 [ 579.723563][T13027] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user 20:00:58 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x5, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:00:58 executing program 3 (fault-call:4 fault-nth:1): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:58 executing program 0 (fault-call:4 fault-nth:7): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:00:58 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) 20:00:58 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x8) [ 579.754118][T13027] EXT4-fs (sda1): Remounting filesystem read-only [ 579.763461][T13029] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 579.777195][T13029] EXT4-fs (sda1): Remounting filesystem read-only 20:00:58 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x11020, 0x0) [ 579.869889][T13065] FAULT_INJECTION: forcing a failure. [ 579.869889][T13065] name failslab, interval 1, probability 0, space 0, times 0 [ 579.882850][T13065] CPU: 0 PID: 13065 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 579.888236][T13066] FAULT_INJECTION: forcing a failure. [ 579.888236][T13066] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 579.891786][T13065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 579.891801][T13065] Call Trace: [ 579.891809][T13065] dump_stack+0x137/0x19d [ 579.923112][T13065] should_fail+0x23c/0x250 [ 579.928056][T13065] ? ext4_mb_new_blocks+0x70f/0x1f90 [ 579.933763][T13065] __should_failslab+0x81/0x90 [ 579.938534][T13065] should_failslab+0x5/0x20 [ 579.943034][T13065] kmem_cache_alloc+0x46/0x2f0 [ 579.947861][T13065] ext4_mb_new_blocks+0x70f/0x1f90 [ 579.952985][T13065] ? ext4_xattr_set_entry+0xaf0/0x20d0 [ 579.959311][T13065] ? __find_get_block+0x6fd/0x900 [ 579.964653][T13065] ext4_new_meta_blocks+0x84/0x180 [ 579.969893][T13065] ext4_xattr_block_set+0x14ab/0x1fa0 [ 579.975892][T13065] ? strlen+0x1b/0x40 [ 579.979907][T13065] ext4_xattr_set_handle+0xa0c/0x1110 [ 579.985368][T13065] ext4_xattr_set+0x149/0x210 [ 579.990324][T13065] ext4_xattr_security_set+0x38/0x50 [ 579.995652][T13065] ? ext4_xattr_security_get+0x40/0x40 [ 580.001292][T13065] __vfs_setxattr+0x29c/0x2d0 [ 580.006124][T13065] __vfs_setxattr_noperm+0xf1/0x360 [ 580.011355][T13065] __vfs_setxattr_locked+0x1a8/0x1c0 [ 580.016664][T13065] vfs_setxattr+0x145/0x2a0 [ 580.021224][T13065] setxattr+0x131/0x270 [ 580.025400][T13065] ? filename_lookup+0x2be/0x390 [ 580.030575][T13065] ? strncpy_from_user+0x178/0x250 [ 580.035886][T13065] path_setxattr+0xe7/0x180 [ 580.040692][T13065] __x64_sys_setxattr+0x69/0x80 [ 580.045547][T13065] do_syscall_64+0x4a/0x90 [ 580.050228][T13065] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 580.056123][T13065] RIP: 0033:0x4665d9 [ 580.060100][T13065] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 580.080543][T13065] RSP: 002b:00007fc1c94c8188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 580.089254][T13065] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 580.097294][T13065] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 580.105311][T13065] RBP: 00007fc1c94c81d0 R08: 0000000000000000 R09: 0000000000000000 [ 580.113374][T13065] R10: 0000000000000015 R11: 0000000000000246 R12: 0000000000000001 [ 580.121783][T13065] R13: 00007ffd222556cf R14: 00007fc1c94c8300 R15: 0000000000022000 [ 580.130224][T13066] CPU: 1 PID: 13066 Comm: syz-executor.3 Not tainted 5.13.0-rc3-syzkaller #0 [ 580.138859][T13067] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 580.139314][T13066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 580.139327][T13066] Call Trace: [ 580.139335][T13066] dump_stack+0x137/0x19d [ 580.139365][T13066] should_fail+0x23c/0x250 [ 580.172388][T13066] should_fail_usercopy+0x16/0x20 [ 580.177482][T13066] strncpy_from_user+0x21/0x250 [ 580.182421][T13066] getname_flags+0xb8/0x3d0 [ 580.187279][T13066] user_path_at_empty+0x28/0x50 [ 580.192155][T13066] __se_sys_statfs+0x4c/0x160 [ 580.196860][T13066] ? vfs_write+0x50c/0x770 [ 580.201457][T13066] ? __fget_light+0x21b/0x260 [ 580.206259][T13066] ? __cond_resched+0x11/0x40 [ 580.211048][T13066] ? fput+0x2d/0x130 [ 580.215054][T13066] ? ksys_write+0x157/0x180 [ 580.219669][T13066] ? fpregs_assert_state_consistent+0x7d/0x90 [ 580.225855][T13066] __x64_sys_statfs+0x2d/0x40 [ 580.230559][T13066] do_syscall_64+0x4a/0x90 [ 580.235159][T13066] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 580.241205][T13066] RIP: 0033:0x4665d9 [ 580.245201][T13066] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 20:00:59 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x9) [ 580.265737][T13066] RSP: 002b:00007f15878b4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000089 [ 580.274389][T13066] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 580.282662][T13066] RDX: 0000000000000000 RSI: 0000000020001580 RDI: 0000000020001540 [ 580.290642][T13066] RBP: 00007f15878b41d0 R08: 0000000000000000 R09: 0000000000000000 [ 580.298913][T13066] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 580.306909][T13066] R13: 00007ffe1739132f R14: 00007f15878b4300 R15: 0000000000022000 [ 580.316996][T13067] EXT4-fs (sda1): Remounting filesystem read-only [ 580.352594][T13071] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 580.370799][T13071] EXT4-fs (sda1): Remounting filesystem read-only 20:00:59 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xa) 20:00:59 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x2) 20:00:59 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x6, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:00:59 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x3) 20:00:59 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xb) [ 580.512087][T13094] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:00:59 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4) [ 580.560978][T13094] EXT4-fs (sda1): Remounting filesystem read-only [ 580.588081][T13105] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:00:59 executing program 3 (fault-call:4 fault-nth:2): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:00:59 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xc) [ 580.626683][T13105] EXT4-fs (sda1): Remounting filesystem read-only [ 580.700550][T13122] FAULT_INJECTION: forcing a failure. [ 580.700550][T13122] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 580.714158][T13122] CPU: 0 PID: 13122 Comm: syz-executor.3 Not tainted 5.13.0-rc3-syzkaller #0 [ 580.723351][T13122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 580.733983][T13122] Call Trace: [ 580.737252][T13122] dump_stack+0x137/0x19d [ 580.741968][T13122] should_fail+0x23c/0x250 [ 580.746367][T13122] should_fail_usercopy+0x16/0x20 [ 580.751453][T13122] _copy_to_user+0x1c/0x90 [ 580.755972][T13122] __se_sys_statfs+0x116/0x160 [ 580.761810][T13122] __x64_sys_statfs+0x2d/0x40 [ 580.766555][T13122] do_syscall_64+0x4a/0x90 [ 580.770977][T13122] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 580.776874][T13122] RIP: 0033:0x4665d9 [ 580.780755][T13122] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 580.801060][T13122] RSP: 002b:00007f15878b4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000089 [ 580.809544][T13122] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 580.817699][T13122] RDX: 0000000000000000 RSI: 0000000020001580 RDI: 0000000020001540 [ 580.826102][T13122] RBP: 00007f15878b41d0 R08: 0000000000000000 R09: 0000000000000000 [ 580.834469][T13122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 580.842655][T13122] R13: 00007ffe1739132f R14: 00007f15878b4300 R15: 0000000000022000 [ 581.728265][T13128] cgroup: Unknown subsys name 'perf_event' [ 581.734532][T13128] cgroup: Unknown subsys name 'net_cls' 20:01:01 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) 20:01:01 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x5) 20:01:01 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:01 executing program 0 (fault-call:4 fault-nth:8): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:01:01 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xd) 20:01:01 executing program 3 (fault-call:4 fault-nth:3): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 582.941176][T13591] EXT4-fs error: 1 callbacks suppressed [ 582.941190][T13591] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 582.949743][T13594] FAULT_INJECTION: forcing a failure. [ 582.949743][T13594] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 582.957606][T13589] FAULT_INJECTION: forcing a failure. [ 582.957606][T13589] name failslab, interval 1, probability 0, space 0, times 0 [ 582.970442][T13594] CPU: 0 PID: 13594 Comm: syz-executor.3 Not tainted 5.13.0-rc3-syzkaller #0 [ 582.970469][T13594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 583.002197][T13594] Call Trace: [ 583.005484][T13594] dump_stack+0x137/0x19d [ 583.010101][T13594] should_fail+0x23c/0x250 [ 583.014732][T13594] should_fail_usercopy+0x16/0x20 [ 583.019863][T13594] _copy_to_user+0x1c/0x90 [ 583.024566][T13594] simple_read_from_buffer+0xab/0x120 [ 583.029980][T13594] proc_fail_nth_read+0xf6/0x140 [ 583.035032][T13594] ? rw_verify_area+0x136/0x250 [ 583.039984][T13594] ? proc_fault_inject_write+0x200/0x200 [ 583.045763][T13594] vfs_read+0x154/0x5d0 [ 583.050034][T13594] ? __fget_light+0x21b/0x260 [ 583.054719][T13594] ? __cond_resched+0x11/0x40 [ 583.060026][T13594] ksys_read+0xce/0x180 [ 583.066071][T13594] __x64_sys_read+0x3e/0x50 [ 583.070814][T13594] do_syscall_64+0x4a/0x90 [ 583.075237][T13594] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 583.081294][T13594] RIP: 0033:0x41935c [ 583.085386][T13594] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 583.105653][T13594] RSP: 002b:00007f15878b4170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 583.114457][T13594] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041935c [ 583.122534][T13594] RDX: 000000000000000f RSI: 00007f15878b41e0 RDI: 0000000000000004 [ 583.130688][T13594] RBP: 00007f15878b41d0 R08: 0000000000000000 R09: 0000000000000000 [ 583.138839][T13594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 583.147064][T13594] R13: 00007ffe1739132f R14: 00007f15878b4300 R15: 0000000000022000 [ 583.155657][T13589] CPU: 1 PID: 13589 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 583.165278][T13589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 583.175478][T13589] Call Trace: [ 583.178851][T13589] dump_stack+0x137/0x19d [ 583.183355][T13589] should_fail+0x23c/0x250 20:01:02 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xe) 20:01:02 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:01:02 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6) [ 583.187803][T13589] ? ext4_mb_new_blocks+0x70f/0x1f90 [ 583.193414][T13589] __should_failslab+0x81/0x90 [ 583.198572][T13589] should_failslab+0x5/0x20 [ 583.203117][T13589] kmem_cache_alloc+0x46/0x2f0 [ 583.208009][T13589] ext4_mb_new_blocks+0x70f/0x1f90 [ 583.213159][T13589] ? ext4_xattr_set_entry+0xaf0/0x20d0 [ 583.218732][T13589] ext4_new_meta_blocks+0x84/0x180 [ 583.224186][T13589] ext4_xattr_block_set+0x14ab/0x1fa0 [ 583.229658][T13589] ? strlen+0x1b/0x40 [ 583.233682][T13589] ext4_xattr_set_handle+0xa0c/0x1110 [ 583.239378][T13589] ext4_xattr_set+0x149/0x210 [ 583.244076][T13589] ext4_xattr_security_set+0x38/0x50 [ 583.249713][T13589] ? ext4_xattr_security_get+0x40/0x40 [ 583.255261][T13589] __vfs_setxattr+0x29c/0x2d0 [ 583.260029][T13589] __vfs_setxattr_noperm+0xf1/0x360 [ 583.265332][T13589] __vfs_setxattr_locked+0x1a8/0x1c0 [ 583.270695][T13589] vfs_setxattr+0x145/0x2a0 [ 583.275225][T13589] setxattr+0x131/0x270 [ 583.279389][T13589] ? filename_lookup+0x2be/0x390 [ 583.284361][T13589] ? strncpy_from_user+0x178/0x250 20:01:02 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0xa) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r6) r7 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0/file0\x00', 0x1, 0x8, &(0x7f0000000580)=[{&(0x7f0000000140)="3254c45b607286c656d6e389f76a07da24c6924b0d74ddbd8e7ad1267ce6cd01d39b4e8ffa460afd2c7cc0f207a4655d390cb82ca752f7106a76ed517ca592f6694f58ab61a661d2e85da02716f5f4fcfcb5ddcb378a65b2265b37dbe7e5987f2aabedd6c6a27efac47f61f06c42fa43ab52dbf5984a5ee2806c6fa5e262c9293eeee2a8f6481fbd98b96d25dcf96b65942001761271643ddc0c607db3ddfbdedea4601e10fae48a2dd5530feae818a54fdc74a6f325c7494f8bef179f3e83c4c260", 0xc2, 0x8}, {&(0x7f0000000240)="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", 0xfa, 0x6}, {&(0x7f0000000340)="1fb6b0927cf66285d3642bde3e69c5c232817bae48a17ce4abd97d83a71fcef580aa686e1fa075844bee655453cb178460ad73592b49aa34db28e7a1a9dd4b84e275c744ab1843e0d9f2ee2ba624f160e177eb4425a520f6f3c2c2", 0x5b, 0x4}, {&(0x7f00000003c0)="b7ac4cd4e0", 0x5, 0x5}, {&(0x7f0000000400)="e6f8ab85da3aa31c06c06173e9d370e66a4f1bd7a6b0d414861a2f6ea078fb479058de20c24b76602ac0f869032b718e36748e5a33090238827e", 0x3a, 0x1000}, {&(0x7f0000000440)="8fac773e844d3caca2230f88bf5e5dbde242723a437a2ccfbd1fdd4950c0f3c9fff8f8b065fe2827f5e2d49d1050bc863d8c2ef76a7ed216600d10c08710c6d543aae009a0aaba7ef3ba9ced927ebf93a525821c8c73c78f0086c65e27da230102197abcbae4442dc9ad4a9cd72332e80e7be714ddc27d5bbe4be1c1842b2e723488634cfe45d5a25ce94ade80a16b934b968cff7b261fdbcf4dafebf8693b9c82b34b086e7930fa42168468a0cf9a9b131a4051a896e56d98c6147908c4fe2b6571d4b3fed7cd2e032294130fe8b2a382a8b2f9f5f39afbf384f28533f2da9837", 0xe1, 0x7}, {&(0x7f0000000540)="2dc1c67f77a3ddef91dad4a247f4f22ea53055ab186cfbd0cb3cc4121e5eed6f40eee93916a975ed7d3b61e87f5dec0191517890eba609354d981c84006c", 0x3e, 0x8}, {&(0x7f0000002580)="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", 0x1000, 0x80000001}], 0x20004, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x7, 0x78]}}, {@uid={'uid', 0x3d, 0xee00}}, {@huge_always}, {@gid={'gid', 0x3d, r6}}, {@huge_always}], [{@dont_measure}, {@seclabel}, {@subj_user={'subj_user', 0x3d, '+@&[@\''}}]}) r8 = creat(&(0x7f0000000080)='./file0\x00', 0x20) preadv(r2, &(0x7f0000000280), 0x0, 0xed32, 0x2) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r10) r11 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r13) r14 = openat$sndseq(0xffffffffffffff9c, &(0x7f000000cec0), 0x2001) sendmsg$netlink(0xffffffffffffffff, &(0x7f000000d000)={&(0x7f00000006c0)=@proc={0x10, 0x0, 0x25dfdbfb, 0x2}, 0xc, &(0x7f0000001400)=[{&(0x7f0000000700)={0x200, 0x23, 0x1, 0x70bd27, 0x25dfdbfd, "", [@typed={0x4, 0xb}, @nested={0x1da, 0x45, 0x0, 0x1, [@typed={0x4, 0x30}, @typed={0x8, 0x94, 0x0, 0x0, @fd=r3}, @typed={0xd9, 0x40, 0x0, 0x0, @binary="c71204968fc59680db9bba246e34ebc90c916f39e9846794114f85d3cd001fe6ed01eea55b3eebfeeeaa5c6d707221421c1c7fbe8be090a4020b3c9fac2efc711382bb67b2df3eb383c4aacedbd5d728c7d42c31b8b9401bfac53f2fec1de0914e2712e163ffd1fe926f24a46e8a74d241d2b4283a0e1023f77bb0f9db63bf3b5ebe58388c06764113322ee8301cd6764f44852782e61d2c64b934dee7f9f8be063eeb38e98f6003d3a90c27fe1be411c5cb6443f84f5295e4d99d4eb58ed4df1d9c9962dda339b5717bfd5b472c7fc74ea63ffc89"}, @generic="fe11c40d9e27d941c195a9b8ec93c0dc2517469774a998682e94cfa098590fab59cb16d9a9b10f9697cce8fb16c9b246810ebbd307480a246ba228f760ec2d0562797601cfab72b3ba1e8dc13b76bc118cfaa8517b1a9307b75e051584c2791f6d970d8aa814b2c89cdaa6c2a88f5aec7c4144497923db77fe4117ccc844c0a5f25697f15ef685287935865660e78854b6749c5ce08c8dd42c47fe6c6f32a5cc7aedcc63751f0e1751fbc4908782c914fd0bf95152fbbf8240b9d4315f629e0a0c0a13f074243bf09a2741793d1bfa7e29899374863a40f449b4d98b66b6aca928fb95e7d01553f97f892d7c21fd"]}, @typed={0x10, 0x22, 0x0, 0x0, @str='dont_measure'}]}, 0x200}, {&(0x7f0000003bc0)={0x13b0, 0x38, 0x300, 0x70bd2b, 0x25dfdbff, "", [@nested={0x174, 0x7b, 0x0, 0x1, [@generic="a071afe77810c2ec0849600b6382db388ea486e0a5ac7e5b04b76d9d81731727d6ca5e0e4404e00540a076306e2568f0ddd6cfc9554bd0921e08b6f8651e958c2d17e76766bfcac65e7a74377dbe9a1417ae7ce093361af6d1369f1a108c287106c4d898a863ffe514264160fdef66bf12fe9c1a67af6c5b22b694834ae17b33306b33fc5b1a8e123cec0e0e80929ecda3328c699292be68c02b076a64d4b6263520f888b5230d6ce5e2e13bb848516da854675c74", @typed={0x8, 0x42, 0x0, 0x0, @ipv4=@private=0xa010102}, @generic="706728a2ca7c338e9a50739daef124dfa7ea472a44ee706a05a3598954b6255590932d734cff582054c24955cd78d3e8b905f4d7d320b1fcd27eb5f506b0fe6e4a43ce04f972aef0c444cc52ae10a1971e4028001b3d1531dd3b5121aad9a3303635ec28b214b0e702c88c9df3df1605ae145747662986878fbc5d1627f6aa64a02aa1fd86c420fcb87fc1756b239174541de98c5431e000a993a9457c9b048c09a6621bb094142fbb3884d668615e8a27110c"]}, @generic="8ac11446463f95e68a2b7a5d7183ace2e51df20b9d84e2a1868b6a531d7f1f1cab19c21e7cc99ae146f0cb65ef716d7d8c6ba901ccf96286054d9a0550a834a9a4823166cb953f40da0397be074a7b2080d5f4b3bea015c6de2239d84c49", @generic="60ceb8bd9b0548912630810f0e6444d6a15ee899e2523b538428b9015a4f30831a1fac5e0170ad89df093ef97b9d17f45abdf77880b0c8ccf836c25c32e8b16d8bebe18e98e61d60d6efa956521efc46534ab5bcf9db1b4df51ef7d240353b7574b6e0d0f138f4bc09364e760a9062b75753bbc7dde1bdc247d2e1c7ec3c3be14c8e12a5f44b891561aea365628dbf682e41f4beb1177f07f1eb751a89f0cbbddc1e3e8fa126b40c53d1e020240a858484f3e3a6767ed1fa3c71d1edb931aad3a0cfb69dd08aaec0001f744f", @typed={0x8, 0x96, 0x0, 0x0, @pid=r4}, @typed={0x8, 0x68, 0x0, 0x0, @fd=r1}, @nested={0xe1, 0x11, 0x0, 0x1, [@generic="af8bca136e48ba97ef5a146735c1c65ba4c768673d68320db32622a73761cb9b273a2bcdda6de781cc8cd432e341fe6be9", @typed={0x8, 0x4f, 0x0, 0x0, @u32=0x8}, @generic="3e5465c0706acb31a97b27fd97e3a69fb1e2113a01114eded7360b724b13564e596f5403f7e1a3c91b80e10c95356e7399f7bddbcff3605d03dafd6ec179b2ba9d9f1d68393c4f8f0428cd1ec8bbb4fe9bf3e042911c30face6edb79fafd0bd44c04f8f8c4", @typed={0x14, 0x27, 0x0, 0x0, @ipv6=@private2}, @generic="4c172eaf3e20a0e0e873122ad6d727b1ac3b44071d76b1", @typed={0x8, 0x1e, 0x0, 0x0, @pid=r12}, @generic="8b2f67e67f9b8a39c5c0fe6f"]}, @typed={0xc, 0x77, 0x0, 0x0, @str='seclabel'}, @generic="2a23a55f916ae2d261d05a9bab10eef81c44e92736a13a6856935e9a1c3d968b021a753d88ed6e04d59cca89ab1af707d577a4fb627b874606485d94df00a4aaea256e8e55ce1ae524f9474bba96087ffd0a4adfbb32e9ef30d712924a0f7593b47894f30b2e6691a1de970e045231d34d359f8e6a96a51cfc7801fbd54a9077515e98f4e642297b8696d6e0c56c2501fd8f13aead60a2d25e72e28a98e33a2d4022b89035f4d826224122efca048354c1d3076d8d77dec9e83543449c8279b2eb8fed3b1ccb32d40e5f0090050cdd1bcac0a03d7ccc733ac19cf3ab82d93eb11454f1e74a0238984fd0cd9f069dd13c2be9aa6df688a550968c97a01e949cccb636b3d4f2378f04609a9846a3ff7da813cbf25bfd61f4919361f0ceebf49a76a87527f831565c5ca8ec337559f46bb97fd4709801c896931069911185b8c46c4e352a097a6aa7d99a1384b14f218a24db1bd5f958693d639fbce8a26022cbc94659ae1148226f52223d8a38b4f247d75e50a0ce1ed808d37923aa24e3373572d1b81e8965a2afdf1e671d03677b6b9d9789ceb588dfa768cfeb56464a909dce7d248daa9154ff53b470ace49be7c112634c9404a48b423196764419d16dcd9ed4a2df9ca2fcea77c1a6111337fddf7d8ce8fdaeb5ce86d0742cc839cd559be14497df68f831ca0e2ea1de84c7b3d30c20efceece555d7849c47c892ed1fe8308eb9a63013cbb5d25d8cb20e896dc7d566358ca1240a84a73310d8b8e783e7f1bb3ea1c983ae0e30d59b7e677fdc9fc0279b01781a4a9e3b3fd2d84756ca617745af3b57189d52cf58d16700a3ccea762d4081ec19add105000fc9c9fd4e61b448807b66633b3c9e34fa5793b24e1be80e2f81e5b3828bc6e580d7a6764a7d4af2d48d29bc8cdddd7044ac553fda3e0bea76b38004ece8b6277bfbfc030b2555c305172484a3c5cc61173711dc52109bd8c70448dd7b43302bc702f7f4117a768af83fa0320a1de3102e85496c03411bd374314a324818e7efc2a1e65ec87530db24dde4f0de490c674a0c8da5f256987157458cc99b032980102c776701e1142fd97f04e1bd7cf9c6be3793967073a903952734a7f1959e07a1d14f900320b3645371a86d57de930633a1dec5c59fb2b15c7c1e95f6e9cfccc8460140be8eb31518834c7a53e2ed0b0c72dfe527078d61f01d32e0beede85bf07185944098a0ade1147324a8b232a098566cc87bf775803adc78c857cccfff24c943874cc5c35d3528b23b10de33b219f5319be104fd1e626d8ff1531fee470155310d04478d40147f2eebabc682c9ab2d4b1e8d30007098ff708dc10665884ab99734a81c56f487d94c6b4ccd666db500b6e93be9d9c72bc75e793bde9706ba536881a27513d3f1fd96ece228374f0dc50861c9650cb9aada66c3984719f8be90571e43c1d3bdfe02d7e1c8eeb8992df5c85e29134560c4dd249023ef13700ad80901640f484ce232ca309268564418b4084d6f80ac9c62022677f42753c0ce6d6e3360a6e34991c5744f60041771ab4c0eb514cbaea3e40568a252d77f35d49f5fffce589546082030fe95904b750efefbf35c15ffd63983397ea94fe54278503ef0b06cb2b422045f26d687a26a7e8c4920270dec5e5fad42fdd94c1d068b614cfcfc594aad5aba852c442278c0ae01f9fef87a74cdc20198dbbcb1c69292752b9a80427881ebff62abc95f3a5fe0de6ce64f912a86756c8dcef712b3e6455c77016786dbae555584eb57194edbb3109243c0ad608987720183d59850b24b0ac914871f2912d1cf5e098865a9312fcf6daa2ede999bc147df5225f91a809b25e9d9d9a09e3d9f65102eae07ff41f554440c427fe2bc7e2d6512497a5818e5fe13d1c2a05bd17947f305c1008f9dcc5b136189f9183b8e1e8e10528985289d23b4109628fa8722e8e6251f4b9e3d6c6735cf73775b2b6d3cc822933397ec475e8ffe130f7a5348e2f1905c3c5519e356150390621e0f30409a5510a6546ab17fcd07aedb2305e2ab2895dfc7582a786b4674038abb3aca8c9a431a2d7e683234963996992755e13626418dee515ee8ff3da691f6c3b35d63c8ba78995f5f282466b8ab13ef5faf28a89dad2bc5cddc77f7580665a53e1be446d70b46604f30e51e978a4dee7408b65ead495861fce097295745878fc112425c1f10eeeef3eac70415c684d320740db32c1f8b67cf80520e25c3b367ca05fedf4c0c450eba955dd5e7825553d4ba141a473b80ca65deee60dc36cf5a06acdf0b8c4ddbf94d2e247957225cb7163e66ff57ff0a22b31d6582dd24db88be6546790a1532bba916756899debbc43e5e376c5b8ae978b0a150abfe7ec0acdc566e59e5b8affc2387528976a974abafd5a58ffa5a271800b6c035e1d25d7e070a4a4d7a6d5efc2cc9d76a14cc98d0c35bfb8a30d365a28c672d28f34f966f61d91ab4cf917331caaf26efee1344aae5b7bc8a9e411a04ddeb72448dc698724e0df22581eaca31502e2873f4b25112fff8a1118afa83060f512ae31611ff1bb076a1911b5f10eaf4720b31a99abd097bc174ee267f4a4dced157ae54a7f00a498d02dcaa3fd271ac2cf85476ab9e61bc1f89e936655a20c2ca27a19594e2dedb47bb98efe08c331570a803e7fb5fe22cd50be994f1f60c291d9bcea735bcf8785e1eb82450198abed8063f5b7ec2192824767527111574b1fd5a81aa19c178426bc34ab5d5e3025eafb4216d9fda92252449731be6474dc97f9ab41370c2af3acd63b5e183e04fb5236bd0cb0acde4a1f0f1706dc60c9c6893ffa7dd8c28c33eff231d1d646b52e9ebf62c3c02c9e9b743caab100be68c1521c52a7f503254da2652129b459684b55db879f369e99d54fa3688054842f5aabb759d777e6d8cdd8b93e42bb778ec3844e86479b03955fde69ce31f0ab06fd3f3b0b2c39f5d7066df892e66bfdeaa76f3380f59679650b97135a089d6049f4e2424515bdb50dd7da16660f47cc6aa51a7e8bf2ce38257e791a569e148418813ac99ff486f8b21f46e322bf982e0e9f7f021b1952c08dc6c86124ad8afb7e80b10e72b020ee58d1e2603c2826c20cf090fd34103006c963257860b86369f49e14c0f91573cfae13f052fd6c0f6df957bedf9f2d67027d9eea0cdbbb4eca6936c1ba549f4a7938b49e869fb869f82b5b2ddfb988699516622766c7ea807dc1bf43996f5aafdaea63f269daf64c0070a1368ab3cd4f4fce12980b54c6cc25d963b76929a4c50e7f0a89f48b1f564446ebf82268a6a0f4f31e7d916c4b8915a0554656cdbb3101f9b2e189a6b74923b7b1efae39ec6074a4328236a287081c4bc96e838c6d6f1dae45dab97b68a540754ce77971903acee50d61eb3f05a7882d6fc7b8affd12bfe32cd8923c0c8f23336fa1fde429a057807e3695c58aa44cfafbb4e9e7659863652696e62bc89aa21641503655dd7a170a2aca70f3928dd8ce29a31b069d6e5df47ddeeef75eb1269b5b98950f68db71e26b64aeec3c8b70308b217bca0279268a0370c59f20bcd77646c735b01c7b7c1bbb0bf5d900d9b1334b30d5fa6b1481294d2e5c122548c093bcba95b0494858fd4ca899ab995ab0ed18aae1cbead96a337af8c3597d04c1212b9a7465ea4193489e0990fb5770200ad01be2a041792d38e310bf6342923e444f04a91a8de7df9d7def8c3ab765b1e519ce42463eff85b25697a35056d07067a1a4e622b2fbf8f2edf93339dffcc49b21044140f987139cbdc6a03dfa8d365bb1ae4e004af0b81fc19696c42ca79610629aad2a1e2f876dee66c97c31889ef46a2f45ef8deefd6f0c39e0eeb928e4a6f883a55c038287fed44120804b6ef87de8983f0dd4c593cc6d98358d1be2d9b7d625289986619d91394e976e845a8a1fbf9d4c951cd306fd526495731a2c3b68275539f5d0fad44dfe2b382dffd2d6a1d43864f63a61ede45ec58f14858f4d5ea88da3ab2418e66cfd9fa605bb0744189be83a0f32fd46f92d87d47ea8476e07e2e5ff03a0637a57e714a949554fab7b38bfc57b09e69f8f5059d8a9f3c063fd87e87403ca68c2439fe7ca8286c7e6532b94821f957ebda84a51fc7a1c7ca9d42f0ade9ae7b17b037cd27442901443a093437ce7e1fe7a220a4f22ebb7002d8b92086bf9314cfa6b014b3d5e0d406f47f010c4998a82c3b9f0150950844dd46852edaba34eab8d4349c5b55993f9ae319e62053586d2778550cf703637c39c5835a1383c1094b8b0a50fc4420c3f163969c4095239ede20bc7cf142202d15575d49984a23d70482d9448906e1dcc328cc86dab076ff8050f187f2ecabbd8a0f054ef4ef25488666bc33dccedd5bc1a98f74d8d1c76a60b51d19c8bd2812b37df3a17a24c8859775a79e316f53b7fbda4cf28960b7f1c7f3553ecfdaa131682e6ac1eaa309f9b0fdcbdbc7bfdf2b45410a81d98bd5c23661eec398353dd37a50f0e0d507ce8ffb228911dbb697eed9dd57e9360b8ec7b0a091d0dddcbc2c02f23cc85e3be611f376d32c9b2757de5547c904b22f9d110ea785a9d85f4c3bf3589164266f38910452a5193755020f4a5760d49105e9f479e6b3c8d0f85565894df35dfb2febcaa7f255bf0fd6ac36e2f4df673a1732cc8a48a574bc3e0f9925f78d416fe1781b15bd062914b45baa1c5bf951a8912812aef446785274996f2733b106db9be99f7f6d940490f6a39a446899883fd13c7e854d3f3f8bad8c0bf63e0ce2fd7138e04473490690b102d1b3af77c86bccf1f8f56d9bf1f56311176e7e509f91e7706436a7d508c0afd7cf9c8571f1104d4928d7f5e923cd0f18d30130c9e5bc8ccd6329053be824f4e5b215040e7381c836a2fe8dfa0759c53b0ece580cb6d97112c56c2f12db657330b6e3b67d39200fd94f09e97c71b63a635e1e2ec55044efd52a3548a6015100cbcaa12511d9851fc6236b88f7c4e0d81dcdad8c470dbd3f8100a4b0b4da0dfafa9aa092812b2c7a4ed36cc79748eeca47ae0e9b156626cd2c02723b5c59499d13158ea5f9998a088aa557b4bf57be1cf938f0a18ad40bdd7be0e7e391a2cdecb43452401ad15934091018d47a8c08f373dc5fc8c2ac0b00da880a909d3c83ac717d6e8ddb4c78210f160100ef3b49b0df182911f810128ea4f57bceb124f7d63fd53f3a052a4f07e7f0b4282ec8f56b6c62dfa1d466e13696cf8e9429c5f2ab6bd97d90a4a1b784f62d19471f04a64d06993008a58997494ece18a52b2c76ad7d36e91a4a95179163d9b9c16de2b607a499e54e7768dc29088a4dd5c443319566a99f29b09edc19b10b8b240c3e378fd4451a9105e6e153aec146f59ad27b78c7f7ab04757d194b0632a1358192b6ca26fc8cdc5be066138b414a40f4336f46a99df6d8a0c895c4df3aa9f8e435b895d8066d20091f09c2998ef7fccef6adc12c438f50751bdaf5d1f5c79aab629a23513d81469e150145feb0036d948963b42955d03f30fcc43ecd65d0b004597a92469675fcce4a2ef03d25d4072a04efa45afb732262a1a23ba152eac246049991466608f041e1c639a7665e492dbfbf9806b1ca782a13371db51c1dced3b5737fb662188972a212ef653aa0624eafb5a81eba48a8d111568942433cb397218f87c4ecb539badb7c87f699808fca2e918ed6401e574087b62651e07f36f99253496967da680e6c2aaa7ddb11c60d30331d42e949290587af18f6ad4f40fcf398b6879550b7bb4fee2b117361b411e605e7810ab209157bf04062942ac6b1"]}, 0x13b0}, {&(0x7f0000006040)={0x23c4, 0x34, 0x1, 0x70bd27, 0x25dfdbff, "", [@typed={0x8, 0x4e, 0x0, 0x0, @ipv4=@multicast1}, @typed={0x4, 0x91}, @generic="b58254aa6338f1e6a556caf04040a02c094df68da8d43b6f955953b89694d9935fe921e8dc4b9dfef76e7e1e1c88357b6414f04dc698a722c29a15cf49bf3ad8d535b2327465798c25361412a5bfadba0a5761e5fd25eff4d6eac32206663b909e976094c047cb41b9e4a0fa7ebd12edd88ff8ce5c0427ba640ae36477abc2af57bf9afef0b5e2f3bd21bd4cf6e074a9fceb3dbf23e7f77f0ac6", @generic="962230cbb37d39b772f2efb39dd0fee60e537a6c73a015ed70b09a4dd2e05104cb35ce96c7edaa8066592971f2a5f9caaf6aef0ae240d47c43f07b5906fe697779388f8e31c50ac87b0c3166dbe2ed912cfab1c13d2795c23ade4654777e618e97ab270e2b83839149ce2ce3d8de1a9262ab6cce25c8fe47591092ae3b1ba92bea388462c1e3cf9316f4458e9e1cec478d91a7890caa4d2c6b9b121ad1634f13e423e1ddfe37428b47de4538c4df14804c2ccf6238e9dc8845a4a989ea74e1777570b11485e9a77c7321be3f04db0047da6e65948d3bba", @generic="2ee25b1f424d697f58f172203e3565f5689c2a438acad5f4ef6e1757a0b0ba2d0c06f53f726913ae485e706bf4213b706a211db6555c78f970df805c9cf4ff1bc3010926124123c2ea9cfcfb6401a3aa6a76ca59d6eb855afffd2855c4eb9fbd99b12718f7d94ae66382", @generic="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", @nested={0x11cb, 0x8f, 0x0, 0x1, [@typed={0x8, 0x1c, 0x0, 0x0, @fd}, @typed={0xb4, 0x18, 0x0, 0x0, @binary="1f62ed307699405f8543a46d34715eea674087d0a995fdaeaf3841275d30608a211a28320aea4fae58661681ba455ef30eee195f7e6550079823a7efe4ca6c287d4ba7098a4ae6c1814309ec16f368fefe53a1414c658bf9776609ecc5da3b886c6768ec5f363e66b59dd3f50e557226a16e28b1c787882888494062d724ae449c2339f3f9ff0c44566e62ccb294b838d0ffd379ee5267be4b910e690534ab2d5c26a10e57db7db841f54bb9ad8421ab"}, @generic="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", @generic="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", @typed={0xd, 0x7a, 0x0, 0x0, @str='nr_inodes'}]}]}, 0x23c4}, {&(0x7f000000d040)={0x10f4, 0x36, 0x2, 0x70bd26, 0x25dfdbfe, "", [@generic='o', @nested={0x1024, 0x58, 0x0, 0x1, [@typed={0x8, 0x1f, 0x0, 0x0, @pid=r4}, @generic="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", @typed={0x8, 0xf, 0x0, 0x0, @pid}, @typed={0x8, 0x4, 0x0, 0x0, @uid=0xffffffffffffffff}, @typed={0x8, 0x24, 0x0, 0x0, @u32=0x4000000}]}, @generic="368b3f88705294c2f38c3cc14137636d2617c6d798eb8dfd284fe88ff3112d05e04c2c08b78be9c20caf04373f00333918c1cbdab548ce09749b3888fc6a98b3656924217c88048be7b466acfd47ae259d9efa9ac65c249e544d0b3c8e160a99214828b6c6c3db3bacce8f070b5fc01fbf8a9c469ae0bc5ff120ccbe6e8cd66e85c75a5cae702b43a6e0fa1207aba46bfe6b74d426a35f021ff146492294e6acde03cd911b5fdddac74155194b0d6b4bf2fa", @typed={0x8, 0x59, 0x0, 0x0, @uid=r5}, @typed={0x4, 0x5f}]}, 0x10f4}, {&(0x7f0000008440)={0x10c0, 0x18, 0x10, 0x70bd28, 0x25dfdbfd, "", [@generic="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", @generic="1d1159008753bda110c9d7949c28deaaad202d5c4e7a4dd7cc14051a83255ceb39b46694d025172a6f89f9bbe415d7fcc46ba3eef46ef7bfc1c559f9cadd87af27c57f98ee82d750f3172d2e57f2be59ccd3ddb531c0fac051971c8bc86dbf699ae5c95eaaf3f59883496834f0e940dcf2105cc2bbfeb8dd032ee81332a7b18175912ed6879b8004e4eab9ef867778bb5b", @typed={0x13, 0x8a, 0x0, 0x0, @binary="e6690900098bb9c60edb34974d8a8f"}, @typed={0x8, 0x72, 0x0, 0x0, @fd=r1}, @generic]}, 0x10c0}, {&(0x7f000000e140)={0x175c, 0x24, 0x20, 0x70bd2c, 0x25dfdbfc, "", [@nested={0x126, 0x85, 0x0, 0x1, [@generic="e6ddd7d32495929312d00d7109da3e31287a346f9a07440249b9a525607ac12da00d7756f42b85a0b4cfd9d7c036de5dc77d50706e377b412dd7cc49d6ad604913f001fa0401472419bdc20b22bfdc1ecc8b297770d67e6d405a3608dc5228abddf270cfe18f75810567279c60fb30902a0b345cd0da0d420df4575dc120327c", @generic="8e7318a0c3e91c47a1f7e38ac577dd13db1703309c189199ef43138ad78834051d9a7c3ecd83686eb3921a11d44cedb529a9e52f5f8d19f4b2333c059b0254b6e974bf854a74390733b3f238fac8e80601f4f1e829c36cc38c9cbb4891e26ae00ed60beb", @generic="d83d899dd36f2171a8e71c40ea158684bf4c9e312979a248660258caeca85435e7a94ab050a988a293ec74dcf2e84fcff692", @typed={0xc, 0x78, 0x0, 0x0, @u64=0xffffffffffffff51}]}, @generic="16e5f4170501570cc8853802c66c8aab405f8c774d8535ca2c9cdca90b0027f6716044305304bfb7a959ff1326d22583097000c2d0c052900ddc1343992a4eff3ca54ba080f560d565d128c7a168a89f0116d04ba6c8d7e83d763d0df34c703204d08fb22fc80a50a7232fa3d0bc8ed9442f59c7590093512fae2a0588f86d558cd044660081db457ff312aec92f120435dacc20dddf67923efb4595cc3cd128f48fe3ceca8b4db2e4afe038133829a536ea", @generic="5af7060c7714305dd283a6a9ae31e5ac4c9459e1f32af11d2b3797d4e0b00619878a7abd98fa85820e365fa9b237b264e65974fc880e79ac551a747a1c8adc4f7c13be110e13ef6960bab31e97bd3be75528bc784b26e949ab4f86e5ed7b4b923b73c79f63f4ab7d1373470ce09683aeb8bf28745be70fbdbde28aadd8501a588def73e9efef085769efe90482e92af5151cfd2bc869e4c30aaff197209e0ccdbebd2f72d27d12f5b83d274cc7053edcc3da30e8c4cafaaf041648c6a0f96e5cdde937adf69e7c7b9cd193f4c855b6b393b5fae500d3412ff782661171e51c63c4ed7f3474620a6d8af46cfd00b754cf", @nested={0x11f, 0x81, 0x0, 0x1, [@generic="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", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x7f}, @typed={0x8, 0x68, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @typed={0x4, 0x88, 0x0, 0x0, @binary}, @typed={0x8, 0x74, 0x0, 0x0, @pid=r4}]}, @nested={0x4, 0x7, 0x0, 0x1, [@generic]}, @nested={0x1a3, 0x47, 0x0, 0x1, [@generic="8d087ac1a7a857f2743c279ee4cf9907d7aac7b865ec", @typed={0x14, 0x45, 0x0, 0x0, @ipv6=@mcast1}, @typed={0x8, 0x3d, 0x0, 0x0, @uid=r5}, @generic="f41985f6aae20d2c156853cc5b5b6d1f9e0e578d8b0bdaf29c9dcca2b452d6cadf82ec69e8a9565257f2c7705e1d5ded0b833a0263b4d32b93dd61a861fa2529d9628f7d8180b5612e3e8a255dee1f803a93034f8a40de07771b6f8edfaa69df24cff30d26cf6f31bcaf3d76bd880d2821f8d7d5a82861e976809eb9f9c9555a8d546994fded1435dd6a1a33ddca407945a973c27042d0ebeb849d471aa33b645de11d19504638b946064d2390b2ccf66ae5d74c8432b3bfc10c5be63800d4268a9be7da855ba77ddd716cb3c4375feb808e9ebb498197d25bdd9383f28ae7fec6fad5eb37f9ba78", @generic="97eee1f0fcf8f8e60ac5904f622d3ae42ccce3409763d4253c4e7d6831501e0704ab77f40c387ab8fdcec7d1322ec4ad9624d6adbe965622034634980946af15ac0f03aa790ba146c5bb2ddc15d04afa20e79d81ecca10122abe2aefcb813934d7f1f9712befbffd5e9b45356401dc0227579437051a4fd2e84133302c4e34e2461a174e78"]}, @nested={0x37, 0x11, 0x0, 0x1, [@typed={0x8, 0x96, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x4, 0x7}, @generic="68f0b77f696b4abbb4af3b69e343a9a42c094d28f8346e778d49abd06ffcd0f2dc0fea9d57c935"]}, @typed={0xc, 0x6e, 0x0, 0x0, @str='seclabel'}, @nested={0x10fb, 0x7a, 0x0, 0x1, [@generic="05759908918651a3f323db9babd6b91a82b4cd5a0ea27f0f164731ec19509ba09f9007bebc27635ecad77c53d5431108d3f60b57d2e4e671b26c42ea8f0dcf8ad74292d9d61ba00b60fd4c", @generic="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", @generic="e864d9f975d292e10e480d3584628549a9b1e11b144f6a4602c308d84a08a0e4294cc1f770c827174433bde4bf203c", @generic="2d0dcbffbdac9dce32aaf10146f1c7c99f7fac65c845561702956c0d98de2856096afb580e5ab660e4263d4696d06853fc8432cbc7de5ec8637af7ae7b1e463ec28d98157fd1086089080a55fa4880bd5c7528", @generic="bb106dea7200639a65d2f2013eaa45818c8c9a3bd3319fd951b5f2dd20af", @typed={0xc, 0x33, 0x0, 0x0, @u64=0x65b4}]}, @nested={0x75, 0x83, 0x0, 0x1, [@generic="34fff3d458bc4cebbae1f161ba8e69ea2ed386972ea3daffc4f109a445e3f3941521d8810d34ef4c8616fc66772558572d894d70a420469af69644cd2a0de3cebdbd0981b32455c9530799475d49b59e23a7f48a4ff340526e", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x8, 0x6d, 0x0, 0x0, @uid}, @typed={0x8, 0x6a, 0x0, 0x0, @uid=0xffffffffffffffff}]}]}, 0x175c}, {&(0x7f000000ab40)={0x22ac, 0x1a, 0x200, 0x70bd25, 0x25dfdbfe, "", [@nested={0x73, 0x76, 0x0, 0x1, [@generic="142fd63458b9aaa0309d74a8147052094bce764f9914739e74dafe35e7f59c922edd18b2ca0ad04dba3d7436b25dbade8209eab00af9419937a009fdaf68803d9bd7f33b3d54e4de1d45c52b243a2f3beea909cf745fbee387903b591017a9d92a4bfd61a93aafffeb990703e0b5c9"]}, @typed={0x8, 0x1b, 0x0, 0x0, @uid=r5}, @nested={0x194, 0x37, 0x0, 0x1, [@generic="e68e2f1c7a3de519f266b78fc1d278296f91a80a46b50ce936ec3bfddbc7587edc4b23e24b8ed412b60d87758fc4b1331cdaf2efb23f15ef8271bde844c72d08f6f4e50a8d251b4febbffe51f6cfdfb44581486460b6ce808c1d431f224fd60e56a784d54b413ce94bd3209e95bd4da42075d06c9b71b86f67dd2dc9e0e0fb39e7071cf0a3b20bc50c85edcfd848a9959efc1418e72ed0c16a287b0dd8eaca12dc0d3353f5eb722b042b33ea8eb3fa8579cf6185d7f17f", @typed={0x4, 0x2b}, @generic="df1818", @typed={0xc, 0x2b, 0x0, 0x0, @u64=0x3}, @generic="5239962eeb9a98843054a5df4ee9797a3f56c53e81bdafe6bb89a798e4ae90e7f4e6de72dab11f8e7f57120b921ecb632d4b5841fe43840fa553eaea1a95e556a60aaba7a480081ad1b99a233fdf71c64640956ea954939912971ac176249d2e125cae74905933ce364c36f0a2671f22e899b9a8bbb81566f8f1afe5ecf4fa73f374e1281a4dcd396e7081960eda145434487aa67659f67d59028285faebc4fb292c86d55062239be00dff4e6b10422038f89e48886422a8cdff30ebfe39caf115a2877370dc"]}, @generic="8b6e41b4a7", @nested={0x1018, 0x0, 0x0, 0x1, [@typed={0x9, 0x1b, 0x0, 0x0, @str='\'-$+\x00'}, @generic="b3743221639dc86f0e668643b4745abeed5df3d5a337de0503a1fe3955d5f8670602992c6b8364ef60be801af44fefb8381019214a68da30243257b8cf6453ab7b4d3acd0c746dfcc0b7ffe1cb144bfe640193f4c0315308b3e656a36ca221d59a50eda1fe565a223acaab84ef9b7fe19679df92f096988a797119f2ffa1fbab6f43510ef5a1fa9f7f47d8d832524b12e4169c7cb5cdec1ce372d12593834558a66ed10bb6dbacb325c5ca58a585526bb98f0c707a88ac5d4960c73f1463b0d08f700b5454094d41ee932d92f248c41debf0e94f2f99d1c9e808bcd53d4c59efb60d49ab91918ab569fbdf5891ddd26cb0e23756cce4e2ec669f2de1b971ebe210f9dc5ea230c09e7b36a6a4cf4a58c515386102faab465d0d0a7b9e2ae2441c2915d901ad8e01f1e111d4512e4048246b323684bb1f7de969302006f2e5cf52178b4caeb0a93faa39af9b06432f03578a9465091f2be9bf1064f7993d531ab355a776edba126aea369f80ef289cf7c6b4e839661c3dac2061bb885a6aab24277a7b276f79e57d76fd542238817ff90db702611d7223ec52e07e8b5de8d7a535fcfeab82d25cd798c388f2da3f653cdf7be64d43d2fd1c4221ce195ef2b71d6d2c30b4a99e8ce55bd1dab9fb0e4bafe7c131d82b763ca307eaaa4c42f9ea3a7302d8e4e4c3220eb2f203558a0eabbcdb85c5e85effc6d9045ce055d6d6ebe054f1abcefc52f61168c1b602517c9a7eeb317b091f7edb285ee6039bc94d9c4a88b113712bf3104eced17ee71129990c3522b4841ab654a0564b645771e8b1a5563b23695d190366a847dd4e2039648eeb02ac4d9c72153d6e34eeda33524338b6cbbdb6c9a7e89af72696a8ac0d98120710487c192499176e8b35d8d5c42004fdc84e15a5ea802d0ddee1d67daa5a635d37939d72d85415a1a9540cf19dd52a745bf1d06d92e020ad0adf5f567133d6093790f36bb326658b7e1a2b5e7c603ad62f69874c992c1f570dcc5209f97299b3e60bc3a53f36175fcceacdb99c09f71f2b1240cecc71db234ec2827e9545fc1e899e549ab1b03ff224c328e90d5303634957d19e39ac79feca2739fa5b295699e4fd1b4885fe545ac989f617b42d6a0d5c3dcf5e29cc1d17f214968d1211b935799b62a1c5c5d936d68e53245d8388c3436b6015ab400a09522bbde94eba1e5639737a3642fbefcc4874bf089225469fe5df0af0cc32b3b9a4db93aa7eaa094eef2cbfb075ed46a802a235d28f51b43b1de94a2aa7258af97f608607160c447030ffd2d0c4686a963efee7c8637aac7be884414d1c17ff4f50445b5021a02cb509c0faf0997ba0301101789daa8ce62bb1ad7dad7e1e109b2aff0954fb7327efbf69d0a48a454c80139527bdb41e99132f0e7b3d8abcac14b3ef234e389517ae218c30b2f1b9c3bca1da1f6a563b7af91d352126f78948027a179d674e49337f49979aa39b56ee9acce4852bb1789682ca98a7bad56b5926348384046264152c3f3468469accd407c13e5790784c85bc0d5d7f26c4d377cc3a2c1862cf1a5e0e892bc95fdb854567e9a70193d42e0f0f010770cc2d5364b1834ac53ca21111781aeefe89ccf59199bd40a4e046c933ba616158b3c0c3bc1826e9b35f6c9c87d6efa104007f487bd65ed7d26eb9bb638093995cebd32b10b1748c1f202df166af283520b4625a85333d2b78ad935a57f772bf8aa1d83473c6c7b9ae8635bc93f6742ec7a147968d9cd003d5cd74ff71f03dd40eba24b7522b61e912d217187bd1a6cc805391a05e5669bfe1c123630a729ff1fac2921266ce9c0130919e2c45b28910a1d44c5c14c61ca6761ac8892062e8d1e333cfbbadfb671fed7f9d4a2c7c8e8d3de7f0ecca2611013c210e5a83403f7f0235b776ef23c943bdecd5756a0e5a62f831d603c59c8f621625b5d37da7665aca030c5584108e22a15cbc2bc8f30d1c50f6cb81ae2d3b79617a690d1e6db5ea4d2756e90c84ae54cdb6f200ffac55c4021d789afa93a6790d11e2f55fca4150b6af418a52ce021bc12029d7129cf30ed09fe7c3f758263395b14674904b8e3226ece715132a0ed0d5f7589ca847243270ff8f1edc7569fc8c3dd8e9f7b1e0be586ec7d28f0cfd570bebd9b96fa2ef0fa4d3228f4d912a49b2754cc4946355e8199d6a90f0af9ac4100262501813339ae1933e324378d0159edb1d8458f65f07be20f35df73fc525fa728ef078e0ccb9756e791c3cc0918fdca29d375d5b8a09cbc8a49d017d15345075b62608a5cd6f31f4ef7b3291fde9ae1328506e88447c88efba1e053fb42dca656fe952c63f01fd6659fbf050f4144e52d553ad938cb5d7266125a7e3b0c07ec4df7f395ea21d30e7f42af0cdc205e4460377bc0d0ad4eac7f0ef6634c0bfdcdd2b4104e8f60bb0923587f13b7503af954f39e613a464dbfdf34b757ba3ec7037c257ecab3a8cbcf2e179afd16ab3b11bc08b5609a87ce531c34b36025e1c5cf9d95fbfe752e4bfd8b743a8ede3cfc6c4a73c3a033b4cfb78fe3240c11e4a6adf67b273bc99759c7cf7f0c42dda1271a35db9478ad3be3cb9c7b1f90a327e9bd397b17bcc2426a805b680fac8439af36f71ffe0b6b4da739925cc489eaaa361f4bb190804270b5d5c6802f36a3df7f574d9c199a896c731c4075549ce922e7b4c3f6d02f898e551d54bcfe422e62a4793ee904b3b982334cd2207f65770e193ec9d01cf3c20ca9cc7132b4bb8e5ede28d1e63bf78dda553e75ee44dba117ff2b9bb6e85176f0206c0cab68cf697d6e592b0a9e86a42c00ebce7b997805e16606cc0172cf430f55aa67fa179b0f50567d945e1c5a19687b413dbeefd5d25386aa31cc037abcdaa9a5eccbedfdd7c6c2e3fee39290137099400620911aa09a4f0f09cb9d92e110cebe23bf68b66f5b3fbb053f8fd01efbf6284920b1ad3feaf09c93f05006cbd43bdcbd8a3266207bfbb73bd8f625b8b7d956fd7458df8204f86cd29e1a2d0c659ad9528735d72e75c19adb94f7d5eed41a8c8ed58b18e2e4dfa57c4f1d4cd42785a6ff74ace19e3300998d0976461ff57064433430faa48e09dd583677117f40d91aeea5ec788e74d843123fb5c5a46eb92416514a961ed356399b326088ce70f99426291754aa3bf931a0929f6ca93f8f2c0ded0f54023623b557b0370286b402768b7d70a8b94ad6935bf6eaab9a9071bbbcb2685297173c946587f3f67bfc66ea93dcbbbc0630a7e6d1ad8cd4180b8728b4e33f39f9c58495980f222200ce79cc988544586aeb83a3f2982cc7e92ec09df2db0722f5365ebbe083fa3378eacb143fd41dc8586b0cbca54960fa9e8a37481170ea5857f64b895d27d77b5404b554db2803370c8e6132d0a63e5dd1dc1d1acc869357bbc513c80602d0b16d38abd9fb8b2868ca1a0f157110b7ca88b7e312220f05500987f04a14a4c648888a75cbcc52d0c52453b500ed5641e25f268a7b77a32fc722b48423f4a2bff8465a348fb44597fe758e2a93c5a4ccf9e5319d3a198ac6007791e0bd2870b228fb0e4cd3e90c3f3dc6b6bf529e5c73f084ba00d496fae2f7a6d289907368fabcb8346cf2ee717df6a175300e8a918f71d0c12aecd8d8b85cc4055c43adba0f03d4486783c41da298a7581eafa03695d65e11ba484821fd5a49d0f24fb575677fc73ec938981a7616734ba3f30a0cde139be43bf8d31fa9f02bef053e88b8c42dd548301403ff6eb22f1ada3a7cffc7eaebfd44cb856c42b3c15b8d6b0e7e391f7ea08a30da354d02b2eb8028f785d2ffbd5350e4faad385853bab6a315d127739eb484a0ac647535cc053f2c130ada8f0061e17340252262ca1cb0979f07734e47fa0fdd02ad7a5e4ce45f6fb8fc889edc50e6c3654f6e8ad35523a6d2d2f1a1117ae88cbeb66c5443882b7db6aec6d21e6b62800829f6e3bbc0840789156de3415dd4ef7a8363616c7f25abc0293e9f1b7168834439178cc9f7aecb40fb1a5df2ca655115e03d6298cd36fce64d16a83353647570d371a4dedb0d666fe7491c8a508835b5c8cab6a510744e46a020f21048fa85eaf06d1d2dafe0098afe034a1002decfc58edbb020d3d5e6ec059cec395c60e50733296887a3b07239af11c8b965b9dd40d9b4bdaf550f8ff32b46223e4f3e8d1be1583239019770bcf1c95bda787790b9187580b350776bfc86cbb60dc60c962186ccdd2c079e9c43ea762e83b5b6bcab435c2ee13b5f913dcd55551a5514cc6395f5262360bc556289bde5d7783ad24e8db82894e26aa4b79a9d7a59049d1a9bc41675dc33c230128cf74f6c94272ed2e8ef1b3770c1716ddaf7cd19cbd94c82aa5a8625f0a31a5e802174f94ff11cc8ec278d1af49b74601de50f9f90047edbdbe0a4f4897a6f7da86611a680375d71a001386b8e2dabc2d3d7cdd69b252f20a8b071892eb0f7b7315cd9268d3be90758f71e825dbe6a9b1a7fe40b3aefb7988debafb58d177390eb196124a0d02502a9dbd0b0965360a8cf756fda63adf20f3e23fe9e9194c4f55aab1d610777c69781f7cb7ddd04918d8b15654006614ab06318917fc89ef014b0a4a0fe4dea10959048ebf806420b8c0bd5622bc8814c28edf72d8a7e965e0f76dcc3f5a495fef1a098a811b389b3eb45796b49385d258f86e61be34b858075df1e3c2eeda5397f10f9e27b1b5fe54afd0c07a15e176754054bb937f8086078e1293fc719a8dbfa0cf8977a75505c16d72efdc5d003666c27670ae24e9b7e5751bef67a782cb3353830242d1ff7310e348a847d19103f777883cd08ef95b6b130c7192bab7aafa2940a2cf0aeca8110e5d0684a8f0080121ee5b11631290f55b56872ae609c0597c5e0846cec8a0db0b7934cb499164108745ebaabce0cb347e1ec0fc0629953bac9e4c91f02dfeb65164cbb565b9d62c7049f157b5dd69f9f80d525681ed636d99c13497545af7b05a19cddfd5f22e143bef8c09fb8787bba9dd49ec7d595c215ed9ba67299fe998945991b133431b1d059d2d1b9a93436a5a49153d3b0d9164df517a97c5aa7820741952bf23b83c6b03bfe25fa09b793cfb12b8fcd681ab2baa0243ce49789362dde364394dbe60c61ef232bf826dac2e5c4bd066600b251e414400bfd5cf35308f4dc07fb0782c8774bbe1c57ff5019be0583e728a447f3285693cb4dda510381b90dd0e4f4f7fd49fd1a302d93c92901426ac9b84babc97c49ac00b5a1a5891d4ac4f802b2ef67e1887ae50de74bf7a626c949dcebe697f119bcba48c969cf972fbfb29af581c9fc7b4b7df7c00a971cc1ff7338823494bbbe13217339c871aa0f74d06057c66eb4c53bc8c68cb940561f02c18edd84358b2f9fa966e319214b200daef265d794f039ec3a38175ee3f43452fa228b0ac943c81550aece4ab1c1cb09d16a450b8979569687620b5abc32bbe28369dc4c19570917e62c3c1533afa52347484ea433a0b1ddbeab8af598bd0aa23bf83acae7bd0a9744df81dab6086f20063ec33641e8ca30334772dd693227210ae5a04101d9712e2937a7d49b16ba1d3545301b9bf8741fcbb3463ad9e4baf8c4ea8dd0e1fa428494a58defdff0303030a9cba207f0d3448e4f411ffceacc313f702f76149021aca80505185a3c20ab3652ed2b5e0084d6b5a9ee802af05e48eb6e0595245e06a83c1cc2411b8ced3a3a02491256b3a17f29529c392e3702821340fc5d6e34a549a8b5408a79f7f96bc75aa52e9cb9e9da3b6763a66113273fce119bc9926ee4f2fb3d07f2c40a40ffa95", @typed={0x8, 0x6, 0x0, 0x0, @ipv4=@remote}]}, @nested={0x106b, 0x44, 0x0, 0x1, [@generic="ddf89dfe29cb", @typed={0x1004, 0x31, 0x0, 0x0, @binary="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"}, @generic="0b1af0ca78db5b7623fcc42bede7e252a09977afdaa5bc74e901d6c23b9aa295a4a26ae1932e0bea4c91520111f10cbb5eb2e487cb935bbf02b692dc44e9de35be841f05ce7aeec378cf89cfcd17f8abe380dd88ab9b35be215b342e84"]}]}, 0x22ac}, {&(0x7f0000003580)={0x534, 0x3c, 0x4, 0x70bd25, 0x25dfdbfc, "", [@generic="7d918504a8e018bb8647b243a47f63505af6ee81db5a6137964250e9b1bca7417c841306747364f96fd25b5f90060eff904689c132f456866a7c85cf8968e684dd4d73d87a334b080d334a20dd670e5cca91e153579093be5e638e202974bac8109b42bcd088b9b68130f667e53f151f3dd71618", @generic="bd03d2e3c70fe928de4dc73db70763fcea009373bbe7c09dcd9f78a6179201d1ccf134b249aef70193b4e3896fa595dff5cadc822702b23ee59a4e896eeb7842488db7fc2998b71e3986df11d302504888418c51e881b13fe5805579cf1acb70256c1bd37eb3feb3156449e3ca4ccd49047742e76dd6c8c509e6ae2485b1803e3498524ea7f3fe7a86c59662e074", @generic="ef1fb2786fea91ac17dc51", @nested={0x15e, 0x10, 0x0, 0x1, [@generic="32c349dba7bf02a30dcecada591c00b0bf7ddc784bc9186d087beadabf72d9ef93adfac819310d4193c1e72d4a39ee38039ebf98ab745bf9167c2acb1b724d09316b26d7add0bda1231d471f2750aa51f9fbb21c69996e7f71f1eab393a88eeea0f214aa30062a07b2923d3c", @generic="8b45239056add82cdebf60f6753026f74ddbb1ed1c5f59fae78269cdcc0ddcfa9a593418a94c4f58f3fd4fe8c08c4762e2d03a0ab48ca058cf6a80bf186b3e84aff0a8c76527c3b3bba04179b0f0fdc8353d55d5092acda8027204821d35b52fce48eaf21ccfcd36c613e5486a3c9375d62f543bd42b99de01412266e857b7e0da48f4153cdf2e6a6fb556c6c87636a4118608b2244d6c83e118f439528ad9e9a428c44430b87f932638a061ddab668d098afeaf04f37f39b2744d7e33936597396954da9ad59088016d19629bfc2311ae6ee2fb8715fbe4ca3092bd58a3e7bb23b691b53ac7aecbc2a26a4260dc"]}, @nested={0x29f, 0x74, 0x0, 0x1, [@typed={0x4, 0x5d}, @generic="8fd09408b0485d6659c644e904c911683e1103fec02d7256ea5457d2dfbd5ad64bcd542a90ee6cea9809ba60069f4c8d13248887c0b64bda397e820f6b6d6773c74252909ccdd0869a6340b4af5c2c6a4c62f63c33ee329ecc649c56a5a916cc1cabcc2e4e0420507c51881ad2d0c6c19bc8b5be74850833648722cd4c492b3ad0cb95a841757fe91cd2a052c111f2b6d607f2e71accc6afb52d7c2c902677fcad82368b0764531dacda9c4e487c", @generic="03f3c88b07aa057afef18bce13c15a3cc842d592799d67be67e2f03ddfd95521afe8542964cc5bb133e500077c5b665bab2d35d859f3602c61c84712518b5b94d1f8f30b167c01faff62b75f46d9ca7ca312ee5c16c1ab132dcb727b4cbab2c4a80509966e4b2f4a20d62e11e316d8a6f51966faaa2d05c9a63b186fad5dd27d626056fc5ddfa09de1b7b2629953", @generic="c91d66b680285d6181344e5007b6fc362ecbd2e55a8782c4fcf7d2e9e30c7c1f654785bc30bfefb5e64e958b296b46ebc5979f74713b24fa0487cde8340fa46514820878fc4b1bd15dea92562fda5e567d16e7750ed138c3c69ecc47d68919b77bde6325bce6612d9c67be3d3d544eed0cc2dbcd11d68ecd0189942c8e81ef17ba5775", @typed={0x8, 0x75, 0x0, 0x0, @pid}, @generic="4fb64836301192490f3006fac5600b4d3e97f0393776d0f390b3589f9e9b0befc9f534d1c4188533715ff9f2a3b38caf1d062bacbcaa515f331abf7bb63a5bc8b2682971c0eb56a52b3b9c767758a27225adc702a05c618da4f36d6bb4e5ee291b3bf52d26272f986b595517", @generic="eac1b2ff7ad1bfe1d02861023efb58b4ae9fa48436e0936bee2cb24cf3e6e406e1c3001b6dc62bf9061202ccc73dd41945a987ad44753fed736c7856cb32289701f110f35c38eba1055b2969361cf89377ec533f", @typed={0x7, 0x71, 0x0, 0x0, @str='uid'}, @typed={0x8, 0x1d, 0x0, 0x0, @u32=0x6}]}, @nested={0xc, 0x41, 0x0, 0x1, [@typed={0x8, 0x8b, 0x0, 0x0, @fd}]}, @typed={0x5, 0x14, 0x0, 0x0, @str='\x00'}]}, 0x534}, {&(0x7f00000011c0)={0x23c, 0x1b, 0x8, 0x70bd25, 0x25dfdbff, "", [@nested={0x113, 0x8c, 0x0, 0x1, [@generic="e0a22721d781d2747f1772c27f54b5218c923be674796cb5f1163348e695f7c2d1e6c18565b398a72e01cdf07b181fb8df73907cc8a4bc1b62f10c3526baedff531655563a8fe34b9cd76a75f18c5f37c9dfa40bdaea7a692132ddf2ee0355316d568c74a31e7db765a5d4bee0153b471e5aec3aef80b39e452d40df931f906cd6d398369722ada49ff975344d95634f53e1a5ae586a97f67072190aa0c735d61923463509e9d15f2cc456516be724760bdde168740e371f42515a587e458763ad360a7b5f91d7f591c290a50b40b422ffaed0a377db8f4cdbcc3b854b0932a9926a606800c5a5", @typed={0x8, 0x92, 0x0, 0x0, @pid=r4}, @typed={0x8, 0x4d, 0x0, 0x0, @uid=r5}, @typed={0x8, 0x3e, 0x0, 0x0, @pid}, @typed={0x8, 0x8a, 0x0, 0x0, @pid}, @typed={0x8, 0x48, 0x0, 0x0, @uid}]}, @generic="abce28923a3d12eb30019297bc132f", @typed={0x6, 0x18, 0x0, 0x0, @str='{\x00'}, @nested={0xfc, 0xc, 0x0, 0x1, [@generic, @typed={0xee, 0x6, 0x0, 0x0, @binary="ac8207a383ceac1e4001b79cfb2e48b1f4bb615c1bf570157374a0ff301bed4e0fd900a353421c41d8cd1077a68622c0258d34c120e2e9c398cbf560195a8709c30d7b20c190e0f8ec41e141e924e2125d4c52adf0c34873704f0ef3f5feeef43f72bd20d625bc3e47a53f015147459904a9727fb51147474e811eb6830d6495e75a455d438d5a6bbc982aa7fb72f5456772b5f86f1f8172c43c2f89a508f4e3c43becb516d64745104c30882ab0423d3de88738bbf9dd4c7c8b9203d8f85d00adc42f03b9c9d3612ee014f87e45ac6c51a3c678e3b4e13580eeee0a3509a31efc568db16ec6d607eda1"}, @typed={0x8, 0x70, 0x0, 0x0, @ipv4=@private=0xa010102}]}, @typed={0x4, 0x3e}]}, 0x23c}], 0x9, &(0x7f000000cf00)=[@rights={{0x18, 0x1, 0x1, [r3, r8]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r8, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x28, 0x1, 0x1, [r7, r7, r8, r0, r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r10, r13}}}, @rights={{0x14, 0x1, 0x1, [r14]}}], 0xe0}, 0x40001) [ 583.289586][T13589] path_setxattr+0xe7/0x180 [ 583.294117][T13589] __x64_sys_setxattr+0x69/0x80 [ 583.299270][T13589] do_syscall_64+0x4a/0x90 [ 583.303831][T13589] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 583.309763][T13589] RIP: 0033:0x4665d9 [ 583.313704][T13589] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 583.333430][T13589] RSP: 002b:00007fc1c94c8188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 583.341851][T13589] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 583.347602][T13604] loop3: detected capacity change from 0 to 264192 [ 583.350011][T13589] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 583.350028][T13589] RBP: 00007fc1c94c81d0 R08: 0000000000000000 R09: 0000000000000000 [ 583.350041][T13589] R10: 0000000000000015 R11: 0000000000000246 R12: 0000000000000001 [ 583.380590][T13589] R13: 00007ffd222556cf R14: 00007fc1c94c8300 R15: 0000000000022000 20:01:02 executing program 0 (fault-call:4 fault-nth:9): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 583.389100][T13591] EXT4-fs: 1 callbacks suppressed [ 583.389112][T13591] EXT4-fs (sda1): Remounting filesystem read-only [ 583.413413][T13590] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user 20:01:02 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) [ 583.442914][T13607] loop3: detected capacity change from 0 to 264192 [ 583.449989][T13590] EXT4-fs (sda1): Remounting filesystem read-only [ 583.458527][T13608] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:01:02 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) preadv(r0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/19, 0x13}, {&(0x7f0000000080)=""/152, 0x98}, {&(0x7f0000000140)=""/134, 0x86}, {&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/52, 0x34}], 0x5, 0x4, 0xeb5) [ 583.537268][T13608] EXT4-fs (sda1): Remounting filesystem read-only 20:01:02 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:02 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) [ 583.579986][T13613] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user [ 583.604481][T13613] EXT4-fs (sda1): Remounting filesystem read-only 20:01:02 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) [ 583.688955][T13616] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user [ 583.714782][T13616] EXT4-fs (sda1): Remounting filesystem read-only 20:01:02 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) [ 583.786431][T13618] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user [ 583.802722][T13618] EXT4-fs (sda1): Remounting filesystem read-only 20:01:02 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) [ 583.884506][T13620] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user [ 583.904939][T13620] EXT4-fs (sda1): Remounting filesystem read-only [ 583.975443][T13622] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user [ 584.000136][T13622] EXT4-fs (sda1): Remounting filesystem read-only [ 584.907816][T13624] cgroup: Unknown subsys name 'perf_event' [ 584.914439][T13624] cgroup: Unknown subsys name 'net_cls' [ 585.313116][T13693] cgroup: Unknown subsys name 'perf_event' [ 585.319454][T13693] cgroup: Unknown subsys name 'net_cls' [ 585.351092][T13702] cgroup: Unknown subsys name 'perf_event' [ 585.362979][T13702] cgroup: Unknown subsys name 'net_cls' [ 585.370165][T13706] cgroup: Unknown subsys name 'perf_event' [ 585.383280][T13706] cgroup: Unknown subsys name 'net_cls' [ 585.421749][T13732] cgroup: Unknown subsys name 'perf_event' [ 585.432058][T13732] cgroup: Unknown subsys name 'net_cls' 20:01:07 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x10) 20:01:07 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) [ 588.532993][T15613] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user [ 588.551058][T15613] EXT4-fs (sda1): Remounting filesystem read-only [ 588.950516][T15841] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 588.966909][T15841] EXT4-fs (sda1): Remounting filesystem read-only [ 588.986821][T15851] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 589.009311][T15851] EXT4-fs (sda1): Remounting filesystem read-only [ 589.136140][T15898] FAULT_INJECTION: forcing a failure. [ 589.136140][T15898] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 589.150061][T15898] CPU: 1 PID: 15898 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 589.158837][T15898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 589.168966][T15898] Call Trace: [ 589.172379][T15898] dump_stack+0x137/0x19d [ 589.176813][T15898] should_fail+0x23c/0x250 [ 589.181276][T15898] __alloc_pages+0x102/0x320 [ 589.186055][T15898] kmem_getpages+0x1a/0xd0 [ 589.190569][T15898] cache_grow_begin+0x4c/0x1a0 [ 589.195542][T15898] cache_alloc_refill+0x326/0x3d0 [ 589.200718][T15898] ? should_fail+0xd6/0x250 [ 589.205244][T15898] ? mb_cache_entry_create+0xf2/0x470 [ 589.210811][T15898] kmem_cache_alloc+0x26c/0x2f0 [ 589.217280][T15898] ? mb_cache_entry_create+0xf2/0x470 [ 589.222961][T15898] mb_cache_entry_create+0xf2/0x470 [ 589.228270][T15898] ext4_xattr_block_set+0x1b15/0x1fa0 20:01:08 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x7) 20:01:08 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) [ 589.233670][T15898] ? strlen+0x1b/0x40 [ 589.237661][T15898] ext4_xattr_set_handle+0xa0c/0x1110 [ 589.243205][T15898] ext4_xattr_set+0x149/0x210 [ 589.248089][T15898] ext4_xattr_security_set+0x38/0x50 [ 589.253402][T15898] ? ext4_xattr_security_get+0x40/0x40 [ 589.258917][T15898] __vfs_setxattr+0x29c/0x2d0 [ 589.263719][T15898] __vfs_setxattr_noperm+0xf1/0x360 [ 589.269059][T15898] __vfs_setxattr_locked+0x1a8/0x1c0 [ 589.274713][T15898] vfs_setxattr+0x145/0x2a0 [ 589.279617][T15898] setxattr+0x131/0x270 [ 589.283967][T15898] ? filename_lookup+0x2be/0x390 [ 589.288955][T15898] ? strncpy_from_user+0x178/0x250 [ 589.294051][T15898] path_setxattr+0xe7/0x180 [ 589.298950][T15898] __x64_sys_setxattr+0x69/0x80 [ 589.303920][T15898] do_syscall_64+0x4a/0x90 [ 589.308348][T15898] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 589.314375][T15898] RIP: 0033:0x4665d9 [ 589.318352][T15898] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 589.338941][T15898] RSP: 002b:00007fdaaa505188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 589.347574][T15898] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 589.355755][T15898] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 589.364237][T15898] RBP: 00007fdaaa5051d0 R08: 0000000000000000 R09: 0000000000000000 [ 589.372572][T15898] R10: 0000000000000015 R11: 0000000000000246 R12: 0000000000000002 20:01:08 executing program 0 (fault-call:4 fault-nth:10): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:01:08 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x11) 20:01:08 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x280000a, 0x12, r0, 0x54462000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:01:08 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) 20:01:08 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 589.381128][T15898] R13: 00007ffd136c46bf R14: 00007fdaaa505300 R15: 0000000000022000 [ 589.456788][T15933] FAULT_INJECTION: forcing a failure. [ 589.456788][T15933] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 589.470244][T15933] CPU: 1 PID: 15933 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 589.479254][T15933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 589.489757][T15933] Call Trace: [ 589.493404][T15933] dump_stack+0x137/0x19d [ 589.497743][T15933] should_fail+0x23c/0x250 20:01:08 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x8) [ 589.502519][T15933] should_fail_usercopy+0x16/0x20 [ 589.507729][T15933] _copy_from_user+0x1c/0xd0 [ 589.512353][T15933] kstrtouint_from_user+0x6f/0x130 [ 589.517623][T15933] ? _copy_to_user+0x77/0x90 [ 589.522535][T15933] ? fsnotify_perm+0x59/0x2e0 [ 589.527312][T15933] proc_fail_nth_write+0x38/0x140 [ 589.532348][T15933] ? proc_fail_nth_read+0x140/0x140 [ 589.538370][T15933] vfs_write+0x1f3/0x770 [ 589.542626][T15933] ? __fget_light+0x21b/0x260 [ 589.547411][T15933] ? __cond_resched+0x11/0x40 [ 589.552094][T15933] ksys_write+0xce/0x180 [ 589.556362][T15933] __x64_sys_write+0x3e/0x50 [ 589.561132][T15933] do_syscall_64+0x4a/0x90 [ 589.565795][T15933] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 589.571821][T15933] RIP: 0033:0x4192bf [ 589.576443][T15933] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 589.596927][T15933] RSP: 002b:00007fdaaa505170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 589.605357][T15933] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004192bf [ 589.613595][T15933] RDX: 0000000000000001 RSI: 00007fdaaa5051e0 RDI: 0000000000000004 [ 589.621952][T15933] RBP: 00007fdaaa5051d0 R08: 0000000000000000 R09: 0000000000000000 [ 589.630039][T15933] R10: 0000000000000015 R11: 0000000000000293 R12: 0000000000000002 [ 589.638018][T15933] R13: 00007ffd136c46bf R14: 00007fdaaa505300 R15: 0000000000022000 [ 589.652925][T15935] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 589.675492][T15935] EXT4-fs (sda1): Remounting filesystem read-only 20:01:08 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x12) 20:01:08 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) 20:01:08 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:01:08 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x9) [ 589.705266][T15946] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 589.740913][T15946] EXT4-fs (sda1): Remounting filesystem read-only 20:01:08 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xa, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:08 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x25) 20:01:08 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) 20:01:08 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xa) [ 589.843554][T15964] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 589.907862][T15964] EXT4-fs (sda1): Remounting filesystem read-only [ 589.934454][T15975] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 589.964751][T15975] EXT4-fs (sda1): Remounting filesystem read-only [ 591.103639][T15983] cgroup: Unknown subsys name 'perf_event' [ 591.109726][T15983] cgroup: Unknown subsys name 'net_cls' 20:01:11 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) vmsplice(r0, &(0x7f0000000440)=[{&(0x7f0000000040)="9278e61e3f0ba7b50d2c1a6f1a30f46a771c", 0x12}, {&(0x7f0000000080)="881587b0a06b4c4c35824243b082556cb46edcab049d8d8772833455796dccd34b6b07032a88b1aca1f9914c21af9b5eb5b388cd00c53f329c3a190348e7bf191eadb1ea75a8c44e39fbb268bf02fc4f2e6d47882faf2415ca53eee7006c5dfac951d9906d459b7ddd9a1b4bed4e6548c000195a40ca1e9de7ba43193b91b724aae269cd7f555e7c93d065ec450e5f2fbddb4b79e497be76b791b52494e5db122a650b8a4742540793a777ee3100", 0xae}, {&(0x7f0000000140)="df9c61e2e27fa9e115d79809054298149a708489e5be086f65373a59582aec7ebbacbd9744d12dc0328bad5f5f503158c839868fc35cd352d74217d929310a5dc9cb7aa0bd9b5339e3f04d9c2d73be97db1235cd4586ad9edfe5123f818afa6143b5c92a505c4a156abf9718b9ac2214b6e1e12e22d243b641cb1f47963d9a0a127fec4b95c544227828e587f5da353db6f5aa34e81df61377820e1985c6ed848d6207b03d1ffaf24a82bb1ae34f69d30f853bc2823afefe6f7cb22b3125dc8df08a79f14af0020be62519faf242e481737466d8745d8335202397f3d66647acac4f822f1b52828d423e47e8cd245b14870cdd37", 0xf4}, {&(0x7f0000000240)="31db4747dacead8addec0875cca81f3e6360b84d08b0a9f63bd3358cc00df04a594d56a036fca2e36d1f319898cc8a566abeebadef15ba0b217b7478609bae58b279a09adca0cc1418c5c85cb346acb2514555271169af9135cdc0f966a10fc28adfd84b5f2e16057c8927bb8311c7609fb5a9e89052d367e7bee4846a311a41f911dc0288f0178ed93178d82f24790f2c99024c04039c136835ca7bfb576cc564350aa0cba6", 0xa6}, {&(0x7f0000000300)="f2c421c5a3034eeb7def9e7250334e020c3e0273fd8a547c348e323d705004d7b0bb89d95009ad8133c4f61ff804714894f3b401a2f792fb9c3246c89650f7980941742c18a7fabd4e246c7fb3ef85f55d96c42bf4698b7d40aafd49e51c52c85b0f3b8c5b5205fa20c248b437c876dcb67c76bb6825fcd97eaca59b6df86af6542d7556deabd7049d669132ee204dc5d6edb0eef6481d26cfab31bb4e4577e76cf558101f1166ea689e3480b8b2f67a234f0f9f074e4059c93386277492a471d22fa2dbe64af1d76277e250a2c62a9fed0eb0a1421936c5d6f00341bb", 0xdd}, {&(0x7f0000000400)="937b7cc93b5fdb7385bf3c61d921705613b8089c8cf7cce76fb0dc75350efadd34af", 0x22}], 0x6, 0xb) 20:01:11 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x0, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:01:11 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x48) 20:01:11 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) 20:01:11 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xb) 20:01:11 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xb, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:11 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4c) 20:01:11 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x3319404, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) 20:01:11 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x2, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:01:11 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xc) 20:01:11 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@reiserfs_3={0xc, 0x3, {0xffffffff, 0xffffffff, 0xa06e}}, &(0x7f00000000c0), 0x1000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:01:11 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x60) [ 592.306782][T16454] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 592.346439][T16454] EXT4-fs (sda1): Remounting filesystem read-only 20:01:11 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) 20:01:11 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x3, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 592.393790][T16470] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:01:11 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x4, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:01:11 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) 20:01:11 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x68) 20:01:11 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xc, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 592.464109][T16470] EXT4-fs (sda1): Remounting filesystem read-only 20:01:11 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x5, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:01:11 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) utimensat(r0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000480)={{}, {r1, r2/1000+10000}}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) r7 = getuid() statx(r0, &(0x7f0000000200)='./file0\x00', 0x0, 0x400, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) setregid(0x0, r10) setxattr$system_posix_acl(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000340)={{}, {}, [{0x2, 0x7, r4}, {0x2, 0x6, 0xee00}, {0x2, 0x3, 0xffffffffffffffff}, {0x2, 0x3, 0xee01}, {0x2, 0x1, r6}, {0x2, 0x5, r7}], {0x4, 0x4}, [{0x8, 0x1, 0xffffffffffffffff}, {0x8, 0x0, 0xee00}, {0x8, 0x4, 0xee00}, {0x8, 0x3, 0xee00}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x4}, {0x8, 0x3, r8}, {0x8, 0x2}, {0x8, 0x0, r10}], {0x10, 0x1}, {0x20, 0x6}}, 0x9c, 0x2) [ 592.559208][T16494] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:01:11 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6c) [ 592.603094][T16494] EXT4-fs (sda1): Remounting filesystem read-only [ 593.912944][T16516] cgroup: Unknown subsys name 'perf_event' [ 593.919320][T16516] cgroup: Unknown subsys name 'net_cls' [ 594.117933][T16585] cgroup: Unknown subsys name 'perf_event' [ 594.123999][T16585] cgroup: Unknown subsys name 'net_cls' 20:01:14 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xd) 20:01:14 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x6, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:01:14 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x74) 20:01:14 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f00000007c0)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f8ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0x4d}, {&(0x7f0000000400)="0a9e886070070a68d14f25cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(r3, 0x0, 0x4dca) splice(r1, 0x0, r3, 0x0, 0xffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x100, 0x4) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0x0, r0, 0x5, 0x7, 0x4, 0x529}) clone3(&(0x7f0000000640)={0x4900000, &(0x7f0000000100)=0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000480), {0x10}, &(0x7f00000004c0)=""/178, 0xb2, &(0x7f0000000580)=""/103, &(0x7f0000000600)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0], 0x4, {r1}}, 0x58) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000700)={'macvtap0\x00', {0x2, 0x0, @initdev}}) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f00000006c0)) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000002580)=""/4096) 20:01:14 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xd, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:14 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x7a) [ 595.427736][T17368] EXT4-fs error: 1 callbacks suppressed [ 595.427750][T17368] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 595.450602][T17368] EXT4-fs: 1 callbacks suppressed [ 595.450616][T17368] EXT4-fs (sda1): Remounting filesystem read-only [ 595.464002][T17377] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 595.479603][T17377] EXT4-fs (sda1): Remounting filesystem read-only 20:01:14 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) 20:01:14 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xe) 20:01:14 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xe, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:14 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x8, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:01:14 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x300) 20:01:14 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0xc, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:01:14 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x31d) 20:01:14 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x10) 20:01:14 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) [ 595.740394][T17458] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 595.780238][T17458] EXT4-fs (sda1): Remounting filesystem read-only [ 595.803063][T17477] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 595.842695][T17477] EXT4-fs (sda1): Remounting filesystem read-only 20:01:15 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x1, 0xfffffd9c, 0x0, 0x3060000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f0000000040)={0x0, 0x8, 0x1, [0x2, 0x8, 0x7, 0xffffffff, 0x1], [0x40, 0x7, 0xfffffffffffffff7, 0x866, 0x1c45, 0x9, 0x3, 0xfffffffffffffff7, 0x81, 0x7, 0x9, 0x2, 0x1, 0xfffffffffffffedb, 0x120000, 0x1, 0x5, 0x80000000, 0x3, 0x40, 0xa75, 0x401, 0x2, 0x60b, 0xfffffffffffffff8, 0x2, 0x2, 0x4, 0x1, 0x0, 0x100000001, 0x800, 0x2d, 0x8927, 0x2, 0x200, 0x40, 0xe5c, 0x930, 0x0, 0xff, 0x1, 0x10001, 0x10001, 0x9, 0x3, 0x8000, 0xffffffff, 0x1ff, 0x72ffc832, 0x1, 0x9, 0x0, 0x7, 0x8000, 0x6, 0x6, 0x9, 0x1, 0x5, 0x3, 0x6, 0x1, 0x5, 0xdd, 0x80, 0x8000000000, 0xffffffffffffffd1, 0x2, 0x4, 0x6, 0x3ff, 0x9, 0x9, 0x10001, 0x3, 0x0, 0x200, 0x3, 0x6, 0x8000, 0xa8, 0x9, 0x3ff, 0xdafc, 0x3d, 0x9, 0xdb8, 0x0, 0x2, 0x4, 0x8, 0x80, 0xfffffffffffff5d5, 0x100000000, 0x0, 0x142a98da, 0xadbc, 0x54bbedce, 0x20, 0x10000, 0x100, 0x9, 0x5, 0x3, 0x200, 0xd00, 0x5, 0xdc, 0x5, 0x4ce, 0x8, 0x1883, 0x40, 0x8, 0x80000000, 0x9, 0x7, 0xfff, 0x9, 0x9]}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ftruncate(r0, 0x9) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480), 0x101400, 0x0) writev(r2, &(0x7f0000000540)=[{&(0x7f00000004c0)="b265e59823729faa8fa5be41b6d40200ca1691a833676f1628324e73ae", 0x1d}, {&(0x7f0000000500)="4859ff60beeb850952cf1c378500985551d9181ed29569d74379aac10870187f0914ee9ac268c4935431c04a2484fc93cd028f682adbbdee586a", 0x3a}], 0x2) 20:01:15 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x10, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:15 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x11) 20:01:15 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0xd, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:01:15 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x500) 20:01:15 executing program 3: sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f0000002840)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000002800)={&(0x7f0000002780)={0x50, 0x0, 0x10, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_macvtap\x00'}, @NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:getty_exec_t:s0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x4048040) syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0/file0\x00', 0x5, 0x7, &(0x7f0000002680)=[{&(0x7f00000000c0)="382f6173d78e5ab2cb2a2578ef9525bdab4d4a8db33d0aa5221dfbee2b517a0d2c0c8fb0cf0497ed6ba95832658f3fc2ddc17b28c664b6ba5af534ad0a7047d5924d8fa5bfd92ac37c8f2a73e31a1a75107707d9d135ea30f3775c1ea67b44bcc40e3d1e4abb0507f9ba1de1a39ce1782701249980fe8638cea521b9a3fdc5a949c2a31b44cce1955547e5133b1cf58ae413ef79b691df9848bfe45536b1e1b4ed001146068e5119c5d04f37bd8931ae55bdb3214f7944fbf874947c1f36c26e6420c4", 0xc3, 0x2}, {&(0x7f00000001c0)='3', 0x1, 0xb7c}, {&(0x7f0000000200)="f39a953654fde1d3319052b5d77886979876ea29b0ce75bfd47b67660267646b404ae815674361e19c24e7c8ddc99d7eed45cdc5e7201098583458e2dc6a9ad738a1781feb21788f1bc5fc0a8d786ba27d12c4ce51001b2b8d2f6dabd3b57e36d10b88d33bae2f54f6d01ed8bfd6a64187765cfa675dbcf45a8f8db54d5a6afdc88edbf983b25d79783ed7eb04b5e0b41cfb0fe41c8c7b41f8148284e0e95b84ef0c8add9066afd38c8d49efe12999583f323867d6393ed1232029b64485b1b2290e06ceaa3ef6421bce80e8b000d21b5c6df83e152181def646cd9f5b5fa6bd6335b1dec22cf76af06fbb", 0xeb}, {&(0x7f0000000300)="47c30ddbf52d1b992b952f546bfd1cfa9051416aa62ce7cc96c90d617764a935506a3854c7f764d9c4ba25eea0b9e50b25adcbeb17cfbe343953ec0bba338777cfe8adbc953bfabbf67c32b50c1728af4d3ede672a2487f3f6c1a76fbfcb9883c5fd1b7eee7a1e83f0d8c87cd0d6f2dec0189f45f0ecf87755cb35d56c51180044e41eb25bad6651199bed013e475b531c68e3af71cf97a3dbf079868acc71a01d36ab4edd83f268d3fda9af022b42cf391a8a3fa976302466fd910c", 0xbc, 0x8001}, {&(0x7f00000003c0)="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", 0x1000, 0x3f}, {&(0x7f00000013c0)="114c354465fec2c8ae5a2b289609ff20364b96affff4c83113a1bc46e0e331a98f8720d0c6d08ad0b6cb5ef8671de2d2e96b48e4ed13fc8b346a335960b5914ae62a81bc3f4b183328989f2b949f5c5bdcec14c8e25452a8a0f6809894f2b361c19e0542f7dd430ed1471f2bf5a5f720fea5d85762baaea0b8ca6333c25665ccbc4443fee7731f87270c57d8a8bd8d63f3467ad46e86865bc7fd0aa367252c3d4c2ccde2e53d26e647cef42081c7bed677c89e8a4506c49298b30a7f2301762e27b32f4643385a0dc731a89445e1f24b47fd67abd31c2801559204f812e3da8b690e95ad329023", 0xe7, 0x704}, {&(0x7f0000002580)="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", 0xff, 0x6}], 0x301004, &(0x7f00000014c0)={[{@dots}, {@nodots}, {@fat=@fmask={'fmask', 0x3d, 0x10001}}, {@dots}, {@nodots}], [{@uid_gt={'uid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '{({,!\'\\'}}]}) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x200000, 0x2c) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 596.318384][T17488] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:01:15 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x12) 20:01:15 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x10, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:01:15 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x11, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 596.370592][T17488] EXT4-fs (sda1): Remounting filesystem read-only [ 596.378994][T17501] loop3: detected capacity change from 0 to 128 [ 596.386493][T17506] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 596.400657][T17506] EXT4-fs (sda1): Remounting filesystem read-only 20:01:15 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x1204808, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000001140)=""/99, 0x63) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001080), 0x402c0, 0x0) fspick(r2, &(0x7f0000001100)='./file0\x00', 0x0) socket$nl_generic(0x10, 0x3, 0x10) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000000040)=""/4104) 20:01:15 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "04648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 596.488153][T17516] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 596.520605][T17516] EXT4-fs (sda1): Remounting filesystem read-only [ 596.537631][T17524] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 596.560834][T17524] EXT4-fs (sda1): Remounting filesystem read-only [ 597.167708][T17529] cgroup: Unknown subsys name 'perf_event' [ 597.174463][T17529] cgroup: Unknown subsys name 'net_cls' [ 597.835931][T17781] cgroup: Unknown subsys name 'perf_event' [ 597.842555][T17781] cgroup: Unknown subsys name 'net_cls' 20:01:17 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, 0x0, &(0x7f0000000140), 0x10020, 0x0) 20:01:17 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x25) 20:01:17 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chdir(&(0x7f00000010c0)='./file0/file0\x00') mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000001080)=[{&(0x7f0000000040)=""/4096, 0x1000}, {&(0x7f0000001040)=""/35, 0x23}, {&(0x7f0000002580)=""/4096, 0x1000}], 0x3, 0xd9f, 0x200) mmap(&(0x7f0000523000/0x3000)=nil, 0x3000, 0xa, 0x10010, r0, 0xb7c84000) creat(&(0x7f0000001100)='./file0\x00', 0x80) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:01:17 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "0a648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:01:17 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x12, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 598.518805][T18188] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user [ 598.530748][T18188] EXT4-fs (sda1): Remounting filesystem read-only [ 598.618083][T18208] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 598.645229][T18208] EXT4-fs (sda1): Remounting filesystem read-only 20:01:18 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x600) 20:01:18 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x48) 20:01:18 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, 0x0, &(0x7f0000000140), 0x10020, 0x0) 20:01:18 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "0c648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:01:18 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x22, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:18 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4c) 20:01:18 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x25, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:18 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x700) 20:01:18 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, 0x0, &(0x7f0000000140), 0x10020, 0x0) [ 599.939058][T18496] cgroup: Unknown subsys name 'perf_event' [ 599.945241][T18496] cgroup: Unknown subsys name 'net_cls' 20:01:19 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:01:19 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "0d648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:01:19 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x60) 20:01:19 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2e, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:19 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) 20:01:19 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x900) 20:01:20 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "10648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:01:20 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x68) [ 601.159951][T18963] EXT4-fs error: 5 callbacks suppressed [ 601.159966][T18963] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user [ 601.187012][T18963] EXT4-fs: 5 callbacks suppressed [ 601.187028][T18963] EXT4-fs (sda1): Remounting filesystem read-only 20:01:20 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000fee000/0x10000)=nil, 0x10000, 0x2000002, 0x11, r1, 0xaaeec000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000080)='htcp\x00', 0x5) r2 = memfd_create(&(0x7f0000000100)='htcp\x00', 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0xffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000500)=0x100) r4 = openat2(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)={0x402, 0x1, 0x4}, 0x18) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f0000000480)={'HL\x00'}, &(0x7f00000004c0)=0x1e) mmap(&(0x7f00005a2000/0x4000)=nil, 0x4000, 0x1000009, 0x100010, r2, 0x9d8a4000) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r5, &(0x7f0000000740)=[{&(0x7f00000000c0)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0x5d}, {&(0x7f0000000400)="0a9e886070070a68d14f25cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(r5, 0x0, 0x4dca) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r0, &(0x7f0000000040)={0x7}) 20:01:20 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) [ 601.202606][T18962] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:01:20 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xa00) 20:01:20 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6c) 20:01:20 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "c8648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 601.242144][T18962] EXT4-fs (sda1): Remounting filesystem read-only 20:01:20 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 20:01:20 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) openat(r1, &(0x7f0000000040)='./file1\x00', 0x2, 0x104) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 601.302024][T18986] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 601.319511][T18986] EXT4-fs (sda1): Remounting filesystem read-only 20:01:20 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x48, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:20 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d101206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 601.443726][T18993] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 601.466557][T18993] EXT4-fs (sda1): Remounting filesystem read-only 20:01:20 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1202d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:01:20 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4c, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:20 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1203d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 601.495181][T18997] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 601.512956][T18997] EXT4-fs (sda1): Remounting filesystem read-only 20:01:20 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1204d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 601.578889][T19006] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 601.599150][T19006] EXT4-fs (sda1): Remounting filesystem read-only 20:01:20 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1205d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 601.631343][T19010] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 601.670644][T19010] EXT4-fs (sda1): Remounting filesystem read-only [ 602.816999][T19018] cgroup: Unknown subsys name 'perf_event' [ 602.823413][T19018] cgroup: Unknown subsys name 'net_cls' [ 603.044895][T19054] cgroup: Unknown subsys name 'perf_event' [ 603.050922][T19054] cgroup: Unknown subsys name 'net_cls' [ 603.093798][T19056] cgroup: Unknown subsys name 'perf_event' [ 603.099931][T19056] cgroup: Unknown subsys name 'net_cls' [ 603.159900][T19077] cgroup: Unknown subsys name 'perf_event' [ 603.173224][T19077] cgroup: Unknown subsys name 'net_cls' 20:01:24 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xb00) 20:01:24 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x74) 20:01:24 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x60, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:24 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f120ad49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 606.166059][T20858] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 606.178241][T20858] EXT4-fs (sda1): Remounting filesystem read-only [ 606.186631][T20862] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 606.198670][T20862] EXT4-fs (sda1): Remounting filesystem read-only 20:01:25 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1040, 0x0) preadv(r0, &(0x7f0000000180)=[{&(0x7f00000001c0)=""/162, 0xa2}, {&(0x7f0000000100)=""/68, 0x44}], 0x2, 0x1d9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:01:25 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 20:01:25 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xc00) 20:01:25 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f120cd49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:01:25 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x7a) 20:01:25 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x68, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:25 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xd00) [ 607.055697][T20878] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:01:25 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x300) 20:01:25 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000040)=0x100000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:01:25 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10020, 0x0) 20:01:25 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f120dd49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 607.097126][T20878] EXT4-fs (sda1): Remounting filesystem read-only [ 607.128225][T20889] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:01:26 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1210d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 607.165497][T20889] EXT4-fs (sda1): Remounting filesystem read-only 20:01:26 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x6c, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:26 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:26 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xe00) [ 607.292554][T20908] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 607.324097][T20908] EXT4-fs (sda1): Remounting filesystem read-only 20:01:26 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x1100) 20:01:26 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f12c8d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 607.342408][T20904] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user [ 607.375338][T20904] EXT4-fs (sda1): Remounting filesystem read-only 20:01:26 executing program 4 (fault-call:5 fault-nth:0): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) 20:01:26 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x1200) [ 607.393277][T20912] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 607.418387][T20912] EXT4-fs (sda1): Remounting filesystem read-only [ 608.698669][T20921] cgroup: Unknown subsys name 'perf_event' [ 608.705371][T20921] cgroup: Unknown subsys name 'net_cls' [ 609.062625][T20979] cgroup: Unknown subsys name 'perf_event' [ 609.068817][T20979] cgroup: Unknown subsys name 'net_cls' [ 609.069820][T20978] cgroup: Unknown subsys name 'perf_event' [ 609.092875][T20978] cgroup: Unknown subsys name 'net_cls' [ 609.125338][T20990] cgroup: Unknown subsys name 'perf_event' [ 609.131421][T20990] cgroup: Unknown subsys name 'net_cls' [ 609.136443][T20994] cgroup: Unknown subsys name 'perf_event' [ 609.150227][T20994] cgroup: Unknown subsys name 'net_cls' [ 612.581416][T23078] FAULT_INJECTION: forcing a failure. [ 612.581416][T23078] name failslab, interval 1, probability 0, space 0, times 0 [ 612.595188][T23078] CPU: 1 PID: 23078 Comm: syz-executor.4 Not tainted 5.13.0-rc3-syzkaller #0 [ 612.604567][T23078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 612.615064][T23078] Call Trace: [ 612.618356][T23078] dump_stack+0x137/0x19d [ 612.622710][T23078] should_fail+0x23c/0x250 [ 612.627148][T23078] ? getname_flags+0x84/0x3d0 [ 612.632656][T23078] __should_failslab+0x81/0x90 [ 612.637496][T23078] should_failslab+0x5/0x20 [ 612.642183][T23078] kmem_cache_alloc+0x46/0x2f0 [ 612.647183][T23078] getname_flags+0x84/0x3d0 [ 612.651947][T23078] user_path_at_empty+0x28/0x50 [ 612.656979][T23078] __se_sys_mount+0x209/0x2e0 [ 612.661729][T23078] ? fput+0x2d/0x130 [ 612.665829][T23078] ? ksys_write+0x157/0x180 [ 612.670411][T23078] __x64_sys_mount+0x63/0x70 [ 612.675307][T23078] do_syscall_64+0x4a/0x90 [ 612.680024][T23078] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 612.686103][T23078] RIP: 0033:0x4665d9 [ 612.690004][T23078] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 612.710819][T23078] RSP: 002b:00007fa068026188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 612.719439][T23078] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 20:01:31 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x500) 20:01:31 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x74, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:31 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fstatfs(r0, &(0x7f0000000040)=""/170) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f0000000140)='net/ipx\x00') statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:01:31 executing program 4 (fault-call:5 fault-nth:1): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) [ 612.727739][T23078] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 612.735915][T23078] RBP: 00007fa0680261d0 R08: 0000000000000000 R09: 0000000000000000 [ 612.744184][T23078] R10: 0000000000010020 R11: 0000000000000246 R12: 0000000000000001 [ 612.752266][T23078] R13: 00007fff5e329b7f R14: 00007fa068026300 R15: 0000000000022000 [ 612.819572][T23141] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 612.830326][T23140] FAULT_INJECTION: forcing a failure. [ 612.830326][T23140] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 612.836891][T23141] EXT4-fs (sda1): Remounting filesystem read-only [ 612.843602][T23140] CPU: 0 PID: 23140 Comm: syz-executor.4 Not tainted 5.13.0-rc3-syzkaller #0 [ 612.859096][T23140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 20:01:31 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x600) 20:01:31 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0x5d}, {&(0x7f0000000400)="0a9e886070070a68d14f25cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) flock(r0, 0x4) write$binfmt_misc(r1, 0x0, 0x4dca) preadv(r1, &(0x7f00000011c0)=[{&(0x7f00000012c0)=""/197, 0xc5}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/152, 0x98}], 0x3, 0x2, 0x0) [ 612.869462][T23140] Call Trace: [ 612.872773][T23140] dump_stack+0x137/0x19d [ 612.877204][T23140] should_fail+0x23c/0x250 [ 612.881895][T23140] should_fail_usercopy+0x16/0x20 [ 612.887359][T23140] strncpy_from_user+0x21/0x250 [ 612.892316][T23140] getname_flags+0xb8/0x3d0 [ 612.896932][T23140] user_path_at_empty+0x28/0x50 [ 612.901800][T23140] __se_sys_mount+0x209/0x2e0 [ 612.906500][T23140] ? fput+0x2d/0x130 [ 612.910423][T23140] ? ksys_write+0x157/0x180 [ 612.915017][T23140] __x64_sys_mount+0x63/0x70 [ 612.919695][T23140] do_syscall_64+0x4a/0x90 [ 612.924374][T23140] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 612.930861][T23140] RIP: 0033:0x4665d9 [ 612.934876][T23140] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 612.955661][T23140] RSP: 002b:00007fa068026188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 612.964271][T23140] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 612.972763][T23140] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 612.980898][T23140] RBP: 00007fa0680261d0 R08: 0000000000000000 R09: 0000000000000000 [ 612.988887][T23140] R10: 0000000000010020 R11: 0000000000000246 R12: 0000000000000001 [ 612.996870][T23140] R13: 00007fff5e329b7f R14: 00007fa068026300 R15: 0000000000022000 20:01:31 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) stat(&(0x7f0000001340)='./file1\x00', &(0x7f0000001380)) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) vmsplice(r0, &(0x7f00000012c0)=[{&(0x7f0000000040)="7f03048f759a7bc8e47410044d8f2dd5316bcbd0", 0x14}, {&(0x7f0000000080)="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", 0x1000}, {&(0x7f0000001080)="2abe7a03387fecd2c04cc2aacf88903de693e2e73a1189a6e71fe8b2a03ec59dc7d4512aed1787a0e2312a4f2bd77318a340ffa6a4409691b8d1c4dd2cb95bcd6f612e8b839d5fee8ed6c6fbf0b5464a75c8d978a63e3273a7b9cdb0038c7a9b234c83b5730ab6f06155adf8d6067775df954fcd3c42601fee", 0x79}, {&(0x7f0000001100)="bd7e7c400d632289f15e0075230073f2a8379ef7d528912d2d7cf26c8b5360f6e0a835bcfe3ff78c75716ed4dc8e5a802df4e3691a5d4c84fa184c9a1174bb1477780678e276d9b2ab6cc6af46044d315b123132e1d895972aca4ff6c0c5b4bfd3557de1c252d956bb37e4c51a119ce2b506cdd0845cd539338480151ac5049e4fc5d777a47eef0135d942b21c45fa0ffe47274a557f1cdf536115e8307843d0dab81bffd3234c615ad6adac9e618a5b5dfac01827ed471de3f5e220316c", 0xbe}, {&(0x7f00000011c0)="393c869cb8bf676cd1cf1865fad700d60b40f08c353deecd342b1fbe065ad9aa6dc9666099abc7ed46cc4a504cd1fc0b15cde5c4aed414959d784dc97e5ba71945f74efbc6b1f6bfac03da5107dc45f75d0c0d58e26eb3bb8ef08d79546aca436fdc41ce425eaf3be0365c73577d4b207dbc5b78be796f3f2ccc2549674a1ab0e24245bbc880fdba5d09eaa0dde760a039afeac4cded5e45ca87a618168f5cd19f2f8eb6b0822a9dc83c15da07a2822ebcbb7c7cbd788b5b7be5552034c6863b18fb42f8", 0xc4}], 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001400)={0x0, 0x0}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001480)=@IORING_OP_LINK_TIMEOUT={0xf, 0x4, 0x0, 0x0, 0x0, &(0x7f0000001440)={r1, r2+60000000}, 0x1, 0x1, 0x1}, 0x4) 20:01:31 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x700) 20:01:31 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x7a, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 613.018596][T23180] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 613.042852][T23180] EXT4-fs (sda1): Remounting filesystem read-only [ 613.133010][T23204] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 613.169933][T23204] EXT4-fs (sda1): Remounting filesystem read-only [ 613.180542][T23217] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 613.197006][T23217] EXT4-fs (sda1): Remounting filesystem read-only 20:01:32 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d021ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:01:32 executing program 4 (fault-call:5 fault-nth:2): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) [ 613.276677][T23238] FAULT_INJECTION: forcing a failure. [ 613.276677][T23238] name failslab, interval 1, probability 0, space 0, times 0 [ 613.289574][T23238] CPU: 1 PID: 23238 Comm: syz-executor.4 Not tainted 5.13.0-rc3-syzkaller #0 [ 613.298708][T23238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 613.309071][T23238] Call Trace: [ 613.312533][T23238] dump_stack+0x137/0x19d [ 613.317054][T23238] should_fail+0x23c/0x250 [ 613.321604][T23238] __should_failslab+0x81/0x90 [ 613.326641][T23238] ? alloc_fs_context+0x46/0x500 [ 613.331601][T23238] should_failslab+0x5/0x20 [ 613.336111][T23238] kmem_cache_alloc_trace+0x49/0x310 [ 613.341623][T23238] alloc_fs_context+0x46/0x500 [ 613.346402][T23238] ? security_capable+0x91/0xa0 [ 613.351311][T23238] fs_context_for_reconfigure+0x42/0x50 [ 613.356882][T23238] path_mount+0x1212/0x1ce0 [ 613.361397][T23238] __se_sys_mount+0x23d/0x2e0 [ 613.366154][T23238] ? fput+0x2d/0x130 [ 613.370075][T23238] __x64_sys_mount+0x63/0x70 20:01:32 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x1d03) 20:01:32 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_io_uring_setup(0x2f42, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00003bd000/0x3000)=nil, &(0x7f0000000240)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) r4 = syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r4, 0x15a9, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r1, 0x6deb, 0x0, 0x0, 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x17, "8003e581b62e7c18"}) r7 = accept$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000300)=0x6e) clock_gettime(0x0, &(0x7f0000003a40)={0x0, 0x0}) recvmmsg(r7, &(0x7f0000003980)=[{{&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000035c0)=[{&(0x7f0000000440)=""/32, 0x20}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/149, 0x95}, {&(0x7f0000002580)=""/26, 0x1a}, {&(0x7f00000025c0)=""/4096, 0x1000}], 0x5}, 0x7}, {{&(0x7f0000003640)=@qipcrtr, 0x80, &(0x7f00000036c0)=[{&(0x7f0000003bc0)=""/4096, 0x1000}], 0x1, &(0x7f0000003700)=""/139, 0x8b}, 0x7a26}, {{&(0x7f00000037c0)=@l2tp={0x2, 0x0, @private}, 0x80, &(0x7f0000003940)=[{&(0x7f0000003840)=""/253, 0xfd}], 0x1}, 0x2753}], 0x3, 0x1000, &(0x7f0000003a80)={r8, r9+10000000}) syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r10 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r10, 0x0) preadv(r10, &(0x7f0000000280), 0x0, 0xc, 0x0) r11 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x40001, 0x0) futimesat(r11, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={{0x77359400}}) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:01:32 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x900) 20:01:32 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d031ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:01:32 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x300, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 613.374668][T23238] do_syscall_64+0x4a/0x90 [ 613.379128][T23238] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 613.385287][T23238] RIP: 0033:0x4665d9 [ 613.389185][T23238] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 613.409089][T23238] RSP: 002b:00007fa068026188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 613.418149][T23238] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 613.426404][T23238] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 613.434475][T23238] RBP: 00007fa0680261d0 R08: 0000000000000000 R09: 0000000000000000 [ 613.442466][T23238] R10: 0000000000010020 R11: 0000000000000246 R12: 0000000000000001 [ 613.450445][T23238] R13: 00007fff5e329b7f R14: 00007fa068026300 R15: 0000000000022000 20:01:32 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d041ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 613.497433][T23263] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 613.524710][T23263] EXT4-fs (sda1): Remounting filesystem read-only 20:01:32 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/252, 0xfc}, {&(0x7f0000000140)=""/83, 0x53}, {&(0x7f00000001c0)=""/29, 0x1d}, {&(0x7f0000000200)=""/76, 0x4c}, {&(0x7f0000000280)=""/51, 0x33}], 0x5, 0xd763, 0x4) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 613.551621][T23273] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:01:32 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x1d1f) 20:01:32 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x500, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:32 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 613.597701][T23273] EXT4-fs (sda1): Remounting filesystem read-only 20:01:32 executing program 4 (fault-call:5 fault-nth:3): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) [ 613.708374][T23287] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 613.727589][T23289] FAULT_INJECTION: forcing a failure. [ 613.727589][T23289] name failslab, interval 1, probability 0, space 0, times 0 [ 613.732677][T23287] EXT4-fs (sda1): Remounting filesystem read-only [ 613.740928][T23289] CPU: 0 PID: 23289 Comm: syz-executor.4 Not tainted 5.13.0-rc3-syzkaller #0 [ 613.756379][T23289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 613.767228][T23289] Call Trace: [ 613.770534][T23289] dump_stack+0x137/0x19d [ 613.774978][T23289] should_fail+0x23c/0x250 [ 613.779838][T23289] __should_failslab+0x81/0x90 [ 613.784627][T23289] ? legacy_init_fs_context+0x2d/0x70 [ 613.790013][T23289] should_failslab+0x5/0x20 [ 613.794543][T23289] kmem_cache_alloc_trace+0x49/0x310 [ 613.800122][T23289] ? kmem_cache_alloc_trace+0x215/0x310 [ 613.805765][T23289] ? alloc_fs_context+0x46/0x500 [ 613.810748][T23289] legacy_init_fs_context+0x2d/0x70 [ 613.816328][T23289] alloc_fs_context+0x419/0x500 [ 613.821405][T23289] fs_context_for_reconfigure+0x42/0x50 [ 613.827127][T23289] path_mount+0x1212/0x1ce0 [ 613.831749][T23289] __se_sys_mount+0x23d/0x2e0 [ 613.836467][T23289] ? fput+0x2d/0x130 [ 613.840430][T23289] __x64_sys_mount+0x63/0x70 [ 613.845200][T23289] do_syscall_64+0x4a/0x90 [ 613.849622][T23289] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 613.855780][T23289] RIP: 0033:0x4665d9 [ 613.859762][T23289] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 613.880276][T23289] RSP: 002b:00007fa068026188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 613.889223][T23289] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 613.897393][T23289] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 20:01:32 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000511000/0x4000)=nil, 0x4000, 0xc, 0x2010, 0xffffffffffffffff, 0x1bf3d000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) mknodat(r0, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={'L-', 0x3ff}, 0x16, 0x1) r1 = openat2(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x4000, 0x40, 0x4}, 0x18) openat(r1, &(0x7f0000000180)='./file1\x00', 0x420000, 0x29) [ 613.905799][T23289] RBP: 00007fa0680261d0 R08: 0000000000000000 R09: 0000000000000000 [ 613.915084][T23289] R10: 0000000000010020 R11: 0000000000000246 R12: 0000000000000001 [ 613.923667][T23289] R13: 00007fff5e329b7f R14: 00007fa068026300 R15: 0000000000022000 [ 613.948756][T23290] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:01:32 executing program 4 (fault-call:5 fault-nth:4): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) 20:01:32 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x600, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 613.976525][T23290] EXT4-fs (sda1): Remounting filesystem read-only [ 614.053193][T23300] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user [ 614.076390][T23300] FAULT_INJECTION: forcing a failure. [ 614.076390][T23300] name failslab, interval 1, probability 0, space 0, times 0 [ 614.089491][T23300] CPU: 1 PID: 23300 Comm: syz-executor.4 Not tainted 5.13.0-rc3-syzkaller #0 [ 614.098545][T23300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 614.109197][T23300] Call Trace: [ 614.112502][T23300] dump_stack+0x137/0x19d [ 614.117053][T23300] should_fail+0x23c/0x250 [ 614.121916][T23300] ? mempool_alloc_slab+0x16/0x20 [ 614.127088][T23300] __should_failslab+0x81/0x90 [ 614.131972][T23300] should_failslab+0x5/0x20 [ 614.136580][T23300] kmem_cache_alloc+0x46/0x2f0 [ 614.141396][T23300] mempool_alloc_slab+0x16/0x20 [ 614.146362][T23300] ? mempool_free+0x130/0x130 [ 614.151236][T23300] mempool_alloc+0x8c/0x300 [ 614.156382][T23300] ? copy_fpregs_to_fpstate+0xd8/0x110 [ 614.161880][T23300] ? __switch_to+0x14e/0x4b0 [ 614.166484][T23300] bio_alloc_bioset+0xcc/0x480 [ 614.171535][T23300] submit_bh_wbc+0x130/0x330 [ 614.176179][T23300] ? ext4_update_super+0x71c/0x740 [ 614.181510][T23300] __sync_dirty_buffer+0x136/0x1e0 [ 614.186740][T23300] ext4_commit_super+0x1e3/0x270 [ 614.191733][T23300] ext4_handle_error+0x3d5/0x4d0 [ 614.196730][T23300] __ext4_error+0xd7/0x1f0 [ 614.201376][T23300] ? mem_cgroup_from_obj+0x125/0x160 [ 614.206678][T23300] ? __list_add_valid+0x28/0x90 [ 614.211648][T23300] ? list_lru_add+0x297/0x2c0 [ 614.216431][T23300] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 614.221916][T23300] ext4_remount+0x64f/0x1840 [ 614.226640][T23300] ? ext4_statfs+0x6b0/0x6b0 [ 614.231244][T23300] legacy_reconfigure+0x8e/0xa0 [ 614.236118][T23300] reconfigure_super+0x2d3/0x4f0 [ 614.241108][T23300] path_mount+0x1442/0x1ce0 [ 614.245633][T23300] __se_sys_mount+0x23d/0x2e0 [ 614.250538][T23300] ? fput+0x2d/0x130 [ 614.254546][T23300] __x64_sys_mount+0x63/0x70 [ 614.259225][T23300] do_syscall_64+0x4a/0x90 [ 614.263785][T23300] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 614.274909][T23300] RIP: 0033:0x4665d9 [ 614.278930][T23300] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 614.299186][T23300] RSP: 002b:00007fa068026188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 614.307702][T23300] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 614.315934][T23300] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 614.324472][T23300] RBP: 00007fa0680261d0 R08: 0000000000000000 R09: 0000000000000000 [ 614.332562][T23300] R10: 0000000000010020 R11: 0000000000000246 R12: 0000000000000001 [ 614.340658][T23300] R13: 00007fff5e329b7f R14: 00007fa068026300 R15: 0000000000022000 [ 614.367241][T23300] EXT4-fs (sda1): Remounting filesystem read-only [ 614.378125][T23301] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 614.390671][T23301] EXT4-fs (sda1): Remounting filesystem read-only [ 615.091507][T23308] cgroup: Unknown subsys name 'perf_event' [ 615.098526][T23308] cgroup: Unknown subsys name 'net_cls' [ 615.544878][T23463] cgroup: Unknown subsys name 'perf_event' [ 615.551112][T23463] cgroup: Unknown subsys name 'net_cls' [ 615.646058][T23495] cgroup: Unknown subsys name 'perf_event' [ 615.652262][T23495] cgroup: Unknown subsys name 'net_cls' 20:01:35 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xa00) 20:01:35 executing program 4 (fault-call:5 fault-nth:5): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) 20:01:35 executing program 3: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) statx(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x20, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) r9 = getpid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f0000005d80)={0x420, 0x40, 0x4, 0x70bd2c, 0x25dfdbfb, "", [@generic="0ced144337c441a09a6b6201b724554bc923dd4e84cd4e3a4618bec3f23e73689392e765bd072565f5e18ba04f2ada5be5da7f889279dd12d8e9c8cfcbafa7f99ae616133f3c9b33c50443fd8d52bbd7a6be9b66100d48a85cdf77a7293b1827cc9bfda6603242f8dd08d0f37487aa5b5eca3d225c53b9a5a32c2ed7c2f3461c9b652869eb01342ec300b28b3e5a4c10a34e7f956a1cc1eee5174b976aa4268eededddb7960fe59093180b4c17fdf88d6485a6035fc98b221af05287a9502d59ed668944034307b86dc29c7be79bd422283a27f7df476bc21ae70cbf024ef3a5ec965c7a2aa3c0f8abcd37cf", @nested={0x18f, 0x7f, 0x0, 0x1, [@generic="a63ef264f9cc7c9873655da090665da33ab796c07573accf1ea994781a956d243e6e7b30baf593961648a5e3985ff437eb81d718a7028e0affdeded6b7f8ce46e87f850f66932611bd3b06db3e026ef6a4b449ec00f8a463be534656957869ac523e890018e97fe873575c440a2c8259fef98318dec048358a9d01e291e958c99ce4d815878d1c3cb7193ee04445ff1efd7eac4f264254d4fc96197ae7702d67fe6e1dea43d8364ab2cc26592c3d39b0115e60e8d2073f74acb5b62db0ea6242b6cc02392cf91a0d4b", @typed={0x8, 0x39, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x1b}}, @generic="37200dcf4b1d31d41c5202a89f0bae49360fe48991f80ee66669e0c4ae5db66f2c39cf471d03db90025129aa51d76cfdb146baa13fb34ed08011ec25e2eb4bea779efa6b6139f4b919942568eebf0ef0b45508d1dea7d202239ebb2370d0410708cd5522f7e7d1a205a5bf0748fd9637414803dbba9e9850772a3a80568bc64491e916e5273aceec113aa6a167e48576bc474b0c7a0dcbc4dda216f19245", @typed={0x8, 0xd, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x2a}}, @typed={0x14, 0x65, 0x0, 0x0, @ipv6=@private2}]}, @nested={0x193, 0x13, 0x0, 0x1, [@generic="e0c344fc3ba10e4310b80f07bc03efc120448a7a7cd3e82e95219a7c07605f4b354208efa238c6c368c5902437b372e28c16669adf22f657734f240a583e7c52202ef6105737377a0078b24cd1519dc33af30985e812181f5a93f07cd10ea81243335e7657529e00ffc33c997bbcf328b45b422cd0dbb6663d44e0a7c92160f33e321d04822e381b6f3c8b948e73aa6a45d7e2537369b7697579dae4974c96bfb8de1909c93e156e6470abb834c9cc2aaed43f64363d712aabe72984a1eaf80d11142c5093ce4c661155816bbb89", @generic="0d1a6cc60be944fdc1f811c2c97b15f32d7c7a146d70e482e370fdf7b3df569d1c275031c617510a4e4033d1bbfe38bba7f32ee4d636c4da6257cd770dbc6fa0797725e43d4e85c37bdcd21127de6e32df8689412c8459a24d8bbc40316eab97ad3b5e726422c001a5b84ffc19fd0cae2784cfb8354d7596cf1a04f6652c919557f237b0f2a39a7cb79c07979a", @typed={0xc, 0x1c, 0x0, 0x0, @u64}, @typed={0x8, 0x3c, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="3ea8c57f3609f488a1640776077d6fb93848337c18fd8e466b353245d155e42a"]}]}, 0x420}, {&(0x7f0000002580)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB='\b\x00<\x00', @ANYRES32, @ANYBLOB="140000000001040000000000004300", @ANYRES32=r0, @ANYBLOB="08009000", @ANYRES32, @ANYBLOB="08008b00", @ANYRES32=r1, @ANYBLOB="69415c009aee02de5472ecbc22121ccce64ddfde5544c4c2c1b7874e8acdd93469083156e826b4e0da9aff896d89ff1d67f6214c0866832deb0d9b02b35d56f2881efb4b71dbd59945985ef29fdc22d5b142ecdfea63cabdfc08955ed9dd4c9caee021368ce080b6700f05cd7375ffa069c769880000"], 0x1218}, {&(0x7f00000061c0)={0x4c8, 0x16, 0x400, 0x70bd26, 0x25dfdbfc, "", [@generic="8aee44ce61189c76af00f4e84da90b0a5afbca9f16997300a02dcb2eeb55df8d57ea4a787983ef2aed19fc2f3cfbb64078e1db96212e8057f143b7e3db0586a89e0a33c2998cff5ddd6b4fe83c52b70ae635b3958af6dcd269d520c2a5b7940706a55300c9b1fc08bf633086937ce72ddf4faae13e0c4d91077ee237ea3934c3a6d05c4ca9b046c1de0321334c9f416cc3c15e4462351e4eb0d86548e4cbf627f68f303eaddc88b6f405a780bbb9685fb5e2faa25286dc9505a464c599f2", @nested={0x3d6, 0xe, 0x0, 0x1, [@generic="77ef14ca24c5d626cd5f9e13c77479fafeb308d45016972c973d124e334d2aa7b559148b1608e2d13e700c7c7adee7a65104f395b7e8f371c15cd3c88cf124edb6cc3bddd5dfcb03377e80d28b194ec8b0d1cac76f7f628c245070e266e758c94bc348f392811d546df00a3e83898c8bbb070bf83c6d5e68a81ddac538eeb3df38b3c9de1b01d1464894dc23f5b7861683", @generic="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", @typed={0x8, 0x65, 0x0, 0x0, @uid=r2}, @generic="2756be2f6c33a1366eae6119ae97306864d37f41e44713c92fa93fb48443a0a857c20679f25b1bb2dd8409535591d5cd38cee17eeb9f954b9b709c70ec55f0e9b102128bf60f0fa19c4e45c2c0a9767b282096c58f1cdd01b2445aef44918d7e077142c407ad271e4d9bfbb8d05acd63681367c27ce383ca7984e408671a94430068d0ac00e16b54cc72f8b5c000242341e934f82307110261150c26a66de7fabdae77641b657f7af6407b4e", @typed={0x8, 0x63, 0x0, 0x0, @pid}, @generic="57981eb4dfb3928a66340d7d1e2733bc6c21be5d412ef4bf5cb95bca6af273d8d13044cfd5a5e6d7f1a6028502f75533837b6e2ea8cedc562c66acc69b21395cc06b62ed8a40e4f3ea6f2120569b514b64ae6c41733f2f7412e91a581897ce7d2147441da5c779d696c91dd3755344691ec849efdc71ea7df4c4aa4ef7cf5814ca2c6be1cf2b9e67ef9a963dc63a9fdb58f833f3742297884e2072e71757a473daa76025445045e1ed66feec93e429ec53f9d121f88baa5b7dc0b1803f0c8b1e61ae14cd2304d823099cc789b28fee943458123f7935baf83b4ad06d0ded796c53be9484dffdc3c62c13acc22b6d7f539501f96b23dafd387c0cbf4f40", @typed={0x8, 0x56, 0x0, 0x0, @uid=r4}, @generic="92da33409e825643dff6769d90d0d81dd0a8ac637de500161ce60e9fdc9361008d39f90c45e65d503a510c80d0fa4d0d5d192d5bd14f4fc05e76fb4a197c37493ed213feb6fb1c72751c671e365caf318e5068f721c12cdbdf2f54411871ce2a6674930139666952f5d88b9a51b4dce0aa642c7bf1731ccc197345162af4fc9acd063914"]}, @typed={0x20, 0x3e, 0x0, 0x0, @str='@{\x00\xe0\xc7m#+KV\xa1\xf8\xa1\xc4\xda\x9b\xefW%\xae\x80\x19\xbcN_\xd2\xe0\x1f'}]}, 0x4c8}, {&(0x7f0000000ac0)={0x2f0, 0x2c, 0x200, 0x70bd2b, 0x25dfdbfd, "", [@typed={0x4, 0x3a, 0x0, 0x0, @str}, @typed={0x14, 0x38, 0x0, 0x0, @ipv6=@private0={0xfc, 0x0, '\x00', 0xfc}}, @typed={0x57, 0x93, 0x0, 0x0, @binary="4b71fcb6009bb635fb97e9699caf7a391cd4331e0e293ddd11a5240f7478e3e69d25344df7a0ae6645050823737ac7c74dd8be8787ee3c344e2e9a15bb502b24f26c79d7cf09dd5dd0a6864cd7d737531cbcef"}, @nested={0xaa, 0x49, 0x0, 0x1, [@generic="d0efcec1493a5a55ffc53d0c0013ebc96c86d560175fca2fd76d751da97dbbbb4c900da99dbafebb3d247f6981d7d6f562017aa8a59634fd435b8b3c63a63578f5ca71b66d6e84993647d5730c8de5b3b10155832d6b7f3a0e3ac8f6d16c54e77d6767523b33374ee389b925a8b8d53abe670658ad87093a680a438c0ca2268d68e5195ba13029ca8b6f8818c05084dbd049", @typed={0xc, 0x46, 0x0, 0x0, @u64=0x4}, @typed={0x8, 0x96, 0x0, 0x0, @pid}]}, @nested={0x10f, 0x7f, 0x0, 0x1, [@generic="61db4433d9aaeae8b837b24ff70af37ef20c1e6b66b0b297fe3e3c7191b363b99bc75fc544f7281fafff1cdc97fd270de20c29af6d7f99fea2af73c9d45cddd72c9224d8bc291809721e5c146d0529487e0665b19d11b6b0c67625cee7040a05f10cc7cfb7ec95e15aa26a310fe2f590e76c5d19538cae3c6f190717e61ea912a5a6c403e185da7f53861ac50b9f90140f03c28001fbc882e4cbc4893a20cb92e33d12f0e12a92d3be28aa8811267d9a7740676dcaed724cf10eab1496626d841c99820d7e97f8b58537f1c13fc2ef5deae3d66c00d25fba5e7c3d17a2e5c04a439ec53a0e71", @generic="e1e1f9fd66f52f88c489729534b55d86d429b5286942ed46f2d7465639c03b0335caae1bf2"]}, @typed={0x8, 0x57, 0x0, 0x0, @u32=0x2}, @generic="2fa783035326b9d9f8059fecd216424ffd1dd0d88539da449e56d594ec4791b9b00ca5a1c83ddbafedb87e07555cb0484442d85af6f92c5edb8632ae588418e9aee1a8320ca11a605ddec467d10b640752df015672b66eab9eb5eb494b25d447d103a857e07bb4934d570abf5a359eb8ea28dbca6c43bde6a1df6f3e31fa0a452ed29c07a1b7ea72aae97edc6820a33013c7e2f27e3ad67d0658b4fdf9aa8a7e57e2533735", @typed={0x4, 0x28}]}, 0x2f0}, {&(0x7f0000000ec0)={0x60, 0x1b, 0x20, 0x70bd2d, 0x25dfdbfd, "", [@generic="7a30a78e01d8c54f082a0d0aef70ebdd7b1864374104c038f823d97223739af585bfdb2fa2a36ec2210ace35f9ae6b21b9fbc4833062b74d134267bbd7cda9b1c07f", @typed={0x4, 0x5b}, @typed={0x8, 0x85, 0x0, 0x0, @pid=0xffffffffffffffff}]}, 0x60}, {&(0x7f0000003bc0)=ANY=[@ANYBLOB="bc210000260020002bbd7000fbdbdf2508005700", @ANYRES32=r6, @ANYBLOB="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"], 0x21bc}, {&(0x7f0000000f40)={0x20, 0x14, 0x2, 0x70bd28, 0x25dfdbff, "", [@typed={0x8, 0x41, 0x0, 0x0, @uid=r8}, @typed={0x8, 0x55, 0x0, 0x0, @uid=0xffffffffffffffff}]}, 0x20}, {&(0x7f0000000f80)={0xa4, 0x10, 0x2, 0x70bd26, 0x25dfdbfc, "", [@generic="d4eadcc5cda357735355a77336b65d1ab34c947b8ea8b0c00739f5ee8d259b7000ac4d5951eab145dad816e9133cecdbf9d78a11dc0a1c87f53c7a", @nested={0x58, 0x18, 0x0, 0x1, [@generic="4fc2c3f375267787933c235f41541cd0a0dda029e42e966a2ebdf44f0cee7bd9247ebd4bf4908ee3508646d1e666c25562123c6b20ba1b4bfbf0280e5d8b6b27dadab98c863d4287edaf47d075793bc8", @typed={0x4, 0x4b}]}]}, 0xa4}], 0x8, &(0x7f00000010c0)=[@cred={{0x1c, 0x1, 0x2, {r9, 0xffffffffffffffff, 0xee01}}}], 0x20, 0x4008841}, 0x20000045) syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r10 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r10, 0x0) preadv(r10, &(0x7f0000000280), 0x0, 0xd9f, 0x800) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 617.039588][T24312] FAULT_INJECTION: forcing a failure. [ 617.039588][T24312] name failslab, interval 1, probability 0, space 0, times 0 [ 617.052369][T24312] CPU: 1 PID: 24312 Comm: syz-executor.4 Not tainted 5.13.0-rc3-syzkaller #0 [ 617.061136][T24312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.071203][T24312] Call Trace: [ 617.074495][T24312] dump_stack+0x137/0x19d [ 617.078882][T24312] should_fail+0x23c/0x250 [ 617.083393][T24312] __should_failslab+0x81/0x90 [ 617.088185][T24312] should_failslab+0x5/0x20 [ 617.092728][T24312] kmem_cache_alloc_node+0x58/0x2b0 [ 617.098033][T24312] ? create_task_io_context+0x36/0x210 [ 617.103500][T24312] ? rmqueue+0x43/0xd00 [ 617.107663][T24312] create_task_io_context+0x36/0x210 [ 617.112961][T24312] submit_bio_checks+0x778/0x800 [ 617.118258][T24312] ? mempool_alloc_slab+0x16/0x20 [ 617.123305][T24312] submit_bio_noacct+0x33/0x7e0 [ 617.128173][T24312] ? mempool_alloc_slab+0x16/0x20 [ 617.133218][T24312] ? mempool_free+0x130/0x130 [ 617.137931][T24312] ? mempool_alloc+0x99/0x300 [ 617.142626][T24312] submit_bio+0x16d/0x2b0 [ 617.147097][T24312] ? bio_alloc_bioset+0x402/0x480 [ 617.154249][T24312] submit_bh_wbc+0x2f3/0x330 [ 617.158940][T24312] __sync_dirty_buffer+0x136/0x1e0 [ 617.164270][T24312] ext4_commit_super+0x1e3/0x270 [ 617.169411][T24312] ext4_handle_error+0x3d5/0x4d0 [ 617.174373][T24312] __ext4_error+0xd7/0x1f0 [ 617.179041][T24312] ? mem_cgroup_from_obj+0x125/0x160 [ 617.184539][T24312] ? __list_add_valid+0x28/0x90 [ 617.189518][T24312] ? list_lru_add+0xd6/0x2c0 [ 617.194264][T24312] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 617.199675][T24312] ext4_remount+0x64f/0x1840 [ 617.204373][T24312] ? ext4_statfs+0x6b0/0x6b0 [ 617.209048][T24312] legacy_reconfigure+0x8e/0xa0 [ 617.213920][T24312] reconfigure_super+0x2d3/0x4f0 [ 617.218996][T24312] path_mount+0x1442/0x1ce0 [ 617.223524][T24312] __se_sys_mount+0x23d/0x2e0 [ 617.228221][T24312] ? fput+0x2d/0x130 [ 617.232143][T24312] __x64_sys_mount+0x63/0x70 [ 617.236949][T24312] do_syscall_64+0x4a/0x90 [ 617.241477][T24312] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 617.247436][T24312] RIP: 0033:0x4665d9 [ 617.251334][T24312] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 617.271389][T24312] RSP: 002b:00007fa068026188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 617.280096][T24312] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 617.288133][T24312] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 617.296435][T24312] RBP: 00007fa0680261d0 R08: 0000000000000000 R09: 0000000000000000 [ 617.304421][T24312] R10: 0000000000010020 R11: 0000000000000246 R12: 0000000000000001 [ 617.312625][T24312] R13: 00007fff5e329b7f R14: 00007fa068026300 R15: 0000000000022000 20:01:36 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d051ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:01:36 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x700, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 617.862272][T24688] EXT4-fs error: 2 callbacks suppressed [ 617.862286][T24688] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 617.882939][T24688] EXT4-fs: 2 callbacks suppressed [ 617.882952][T24688] EXT4-fs (sda1): Remounting filesystem read-only 20:01:36 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x1f1d) 20:01:36 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) mmap(&(0x7f00003e4000/0x2000)=nil, 0x2000, 0x7000008, 0x1010, r1, 0x7b9e3000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:01:36 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xb00) 20:01:36 executing program 4 (fault-call:5 fault-nth:6): syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) 20:01:36 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d061ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 617.906810][T24699] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 617.918085][T24699] EXT4-fs (sda1): Remounting filesystem read-only 20:01:36 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x900, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 617.955758][T24704] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user [ 617.972226][T24704] EXT4-fs (sda1): Remounting filesystem read-only [ 617.993434][T24704] FAULT_INJECTION: forcing a failure. 20:01:36 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d071ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:01:36 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xc00) 20:01:36 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x2000) [ 617.993434][T24704] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 618.007146][T24704] CPU: 0 PID: 24704 Comm: syz-executor.4 Not tainted 5.13.0-rc3-syzkaller #0 [ 618.016315][T24704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 618.026758][T24704] Call Trace: [ 618.030249][T24704] dump_stack+0x137/0x19d [ 618.034649][T24704] should_fail+0x23c/0x250 [ 618.039193][T24704] should_fail_usercopy+0x16/0x20 [ 618.044316][T24704] _copy_to_user+0x1c/0x90 20:01:36 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d081ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 618.046499][T24723] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 618.048972][T24704] simple_read_from_buffer+0xab/0x120 [ 618.064810][T24704] proc_fail_nth_read+0xf6/0x140 [ 618.070143][T24704] ? rw_verify_area+0x136/0x250 [ 618.075109][T24704] ? proc_fault_inject_write+0x200/0x200 [ 618.079861][T24723] EXT4-fs (sda1): Remounting filesystem read-only [ 618.080835][T24704] vfs_read+0x154/0x5d0 [ 618.091391][T24704] ? __fget_light+0x21b/0x260 [ 618.096134][T24704] ? __cond_resched+0x11/0x40 [ 618.100996][T24704] ksys_read+0xce/0x180 20:01:36 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d091ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:01:37 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0a1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 618.105772][T24704] __x64_sys_read+0x3e/0x50 [ 618.110470][T24704] do_syscall_64+0x4a/0x90 [ 618.114899][T24704] ? irqentry_exit_to_user_mode+0x5/0x20 [ 618.120603][T24704] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 618.126633][T24704] RIP: 0033:0x41935c [ 618.130617][T24704] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 20:01:37 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0b1ed871cb542dbf02f5d422"}, 0x15, 0x0) [ 618.152029][T24704] RSP: 002b:00007fa068026170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 618.160619][T24704] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041935c [ 618.168870][T24704] RDX: 000000000000000f RSI: 00007fa0680261e0 RDI: 0000000000000004 [ 618.177070][T24704] RBP: 00007fa0680261d0 R08: 0000000000000000 R09: 0000000000000000 [ 618.185251][T24704] R10: 0000000000010020 R11: 0000000000000246 R12: 0000000000000001 [ 618.193497][T24704] R13: 00007fff5e329b7f R14: 00007fa068026300 R15: 0000000000022000 20:01:37 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xd00) 20:01:37 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) 20:01:37 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xa00, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:37 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0d1ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:01:37 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x2500) 20:01:37 executing program 3: ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000002c0)={@mcast1, @ipv4={'\x00', '\xff\xff', @loopback}, @ipv4={'\x00', '\xff\xff', @remote={0xac, 0x14, 0x13}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@remote, @local, @private1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x20c200a2, r1}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x4, 0x1f, 0x3, 0x8, 0x14, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast2, 0x8000, 0x40, 0x2, 0x8}}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x808400}, 0xc, &(0x7f0000000200)={&(0x7f0000000700)=ANY=[@ANYBLOB="48010000", @ANYRES16=0x0, @ANYBLOB="01002cbd7000fedbdf2519000000340001800800030000000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="0303000000000100", @ANYRES32, @ANYBLOB="0800030001000000080003000300000014000200766c616e310000000000000000000000440001801400020076657468305f746f5f626f6e6400000008000100", @ANYRES32, @ANYBLOB='\b\x00', @ANYRES32, @ANYBLOB="1400020076657468305f746f5f6873720000000008000100", @ANYRES32, @ANYBLOB="3000017f140002007f72696467655f736c6176655f30280008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000300030000001400018008000100", @ANYRES32=0x0, @ANYBLOB="08000300010000003c00018008000100", @ANYRES32, @ANYBLOB="080003000300000008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="0800000200000008ff07000045fb9a360dad2c0ae30000000000fc739be97555b631d0c83fc4ef0800000000000000b7494ded7bc44742d86cf72bbd7fd6902b4fde494539f4081c76da81d6a042b641f8fb3dcbc9b2cef1bdd7420e7d2f252bcbe0b44600"/113, @ANYRES32=r2, @ANYBLOB="03000000080001", @ANYRES32, @ANYBLOB="8e4c4ed0acdf5a98e9cdf07c4f3d33fd3397326bb3fd9144505a644d482647562d82003f59a2fccec6c0393168d21454c40755a151727045cf5f05f8a61ab01ca901112aa8a651fc6126df02980572ab4432"], 0x148}, 0x1, 0x0, 0x0, 0x20008080}, 0x24004044) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, 0x0, 0x10, 0x70bd27, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20008040}, 0x20000800) syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file1\x00', &(0x7f0000001580)=""/4081) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140), &(0x7f00000003c0)=ANY=[@ANYBLOB="00fb33007f5240f6df6286ac8a6a42b3dfa41b67c196b8c527aaef8ef6400cb5c19afdfe6bb8fa76b2ca7da516b7cd641942b3427f7b07ab81dc4a153daacaf999cd7f99bb44019e7087c3345d64dc7a3fea9e824b426c59742e634e10d23c6be365047dacfe7065d4ad67350fa40c8ee00913f4dfbfe786e0bdf165a8e0c54f56864595ea6199aaaf7bcd75f0a9110c244dbac1e8368c63d50bf5bc59defdd91ced4c9542b95aab8e"], 0x33, 0x6) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r5, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r4, 0x0, r5, 0x0, 0xffffffff, 0x0) openat(r4, &(0x7f0000000040)='./file0\x00', 0x20a000, 0x50) open(&(0x7f0000000080)='./file0\x00', 0x80000, 0x1) 20:01:37 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x3f00) [ 618.881952][T24760] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 618.905208][T24760] EXT4-fs (sda1): Remounting filesystem read-only [ 618.912613][T24759] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user 20:01:37 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d101ed871cb542dbf02f5d422"}, 0x15, 0x0) 20:01:37 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xe00) 20:01:37 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1000a, 0x0) [ 618.926271][T24759] EXT4-fs (sda1): Remounting filesystem read-only [ 618.948392][T24769] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:01:37 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x1100) 20:01:37 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10025, 0x0) 20:01:37 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf03f5d422"}, 0x15, 0x0) [ 619.005612][T24769] EXT4-fs (sda1): Remounting filesystem read-only 20:01:37 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4000) 20:01:37 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xb00, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:37 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf05f5d422"}, 0x15, 0x0) 20:01:38 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10029, 0x0) [ 619.137797][T24797] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 619.188021][T24797] EXT4-fs (sda1): Remounting filesystem read-only [ 619.238272][T24807] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 619.274929][T24807] EXT4-fs (sda1): Remounting filesystem read-only 20:01:38 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f000001a000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x4354f000) splice(r1, &(0x7f0000000040)=0xfffffffffffff801, r0, &(0x7f0000000080)=0x8, 0x7ff, 0x4) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) io_uring_enter(r1, 0x6, 0xe09b, 0x3, &(0x7f00000000c0)={[0x9]}, 0x8) 20:01:38 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4800) 20:01:38 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf0af5d422"}, 0x15, 0x0) 20:01:38 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x11020, 0x0) 20:01:38 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xc00, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 619.798275][T24817] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 619.827271][T24817] EXT4-fs (sda1): Remounting filesystem read-only [ 620.527677][T24830] cgroup: Unknown subsys name 'perf_event' [ 620.533906][T24830] cgroup: Unknown subsys name 'net_cls' [ 621.151749][T25062] cgroup: Unknown subsys name 'perf_event' [ 621.157944][T25062] cgroup: Unknown subsys name 'net_cls' 20:01:40 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x1200) 20:01:40 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf0cf5d422"}, 0x15, 0x0) 20:01:40 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x20800, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f000073a000/0x7000)=nil, 0x7000, 0x2000000, 0x1010, r0, 0xf0c26000) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x20c2000, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)) 20:01:40 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xd00, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:40 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x2) 20:01:40 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:01:40 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf0df5d422"}, 0x15, 0x0) 20:01:40 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x3) 20:01:41 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4c00) 20:01:41 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x1e72) 20:01:41 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = inotify_init() preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/51, 0x33}], 0x1, 0x4, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:01:41 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xe00, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:41 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf10f5d422"}, 0x15, 0x0) 20:01:41 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4) 20:01:41 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ff7000/0x6000)=nil, 0x6000, 0x1800003, 0x810, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4113) 20:01:41 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x1e73) 20:01:41 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x5) 20:01:41 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbfc8f5d422"}, 0x15, 0x0) 20:01:41 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1100, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:41 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6000) 20:01:41 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x29, 0x0) 20:01:41 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6) 20:01:41 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x2, 0x8000008) openat(r0, &(0x7f0000000040)='./file0\x00', 0x7db2a785bab9967c, 0xcc) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r2, 0x0, r3, 0x0, 0xffffffff, 0x0) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x43, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r6, &(0x7f0000000200)={0x2, 0x2, @rand_addr=0x64010100}, 0x10) splice(r5, 0x0, r6, 0x0, 0xffffffff, 0x0) ppoll(&(0x7f00000000c0)=[{0xffffffffffffffff, 0x2a}, {r2, 0x8008}, {r4, 0x190}, {r6, 0x205}], 0x4, &(0x7f0000000100)={0x77359400}, &(0x7f0000000140)={[0xffff]}, 0x8) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:01:41 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6800) 20:01:41 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x2000) 20:01:41 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1200, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:41 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x7) 20:01:41 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x2500) 20:01:41 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x1001, 0x0) 20:01:41 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6c00) 20:01:41 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x3f00) [ 622.873001][T25844] EXT4-fs error: 7 callbacks suppressed [ 622.873018][T25844] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:01:41 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x20000155, 0x0) 20:01:41 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x7400) 20:01:41 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x8) [ 622.932817][T25844] EXT4-fs: 7 callbacks suppressed [ 622.932831][T25844] EXT4-fs (sda1): Remounting filesystem read-only [ 623.014775][T25863] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 623.036367][T25863] EXT4-fs (sda1): Remounting filesystem read-only 20:01:42 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/36, 0x24}, {&(0x7f0000000080)=""/65, 0x41}], 0x2, 0x7f, 0x2) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:01:42 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1df4, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:42 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1df5, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 623.681986][T25871] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 623.693598][T25871] EXT4-fs (sda1): Remounting filesystem read-only [ 623.701316][T25872] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 623.713089][T25872] EXT4-fs (sda1): Remounting filesystem read-only 20:01:42 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 623.744905][T25877] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 623.757166][T25877] EXT4-fs (sda1): Remounting filesystem read-only [ 623.764431][T25878] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 623.776245][T25878] EXT4-fs (sda1): Remounting filesystem read-only 20:01:42 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 623.803527][T25883] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 623.815795][T25883] EXT4-fs (sda1): Remounting filesystem read-only [ 623.823554][T25884] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 623.835350][T25884] EXT4-fs (sda1): Remounting filesystem read-only 20:01:42 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2500, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:42 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2e00, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 623.862765][T25889] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 623.874781][T25889] EXT4-fs (sda1): Remounting filesystem read-only [ 623.882477][T25890] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 623.894728][T25890] EXT4-fs (sda1): Remounting filesystem read-only 20:01:42 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x3f00, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 624.322825][T25909] cgroup: Unknown subsys name 'perf_event' [ 624.329568][T25909] cgroup: Unknown subsys name 'net_cls' [ 624.579527][T25952] cgroup: Unknown subsys name 'perf_event' [ 624.585679][T25952] cgroup: Unknown subsys name 'net_cls' [ 624.713395][T25997] cgroup: Unknown subsys name 'perf_event' [ 624.718997][T25995] cgroup: Unknown subsys name 'perf_event' [ 624.719980][T25997] cgroup: Unknown subsys name 'net_cls' [ 624.732853][T25995] cgroup: Unknown subsys name 'net_cls' 20:01:46 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4000) 20:01:46 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x2) 20:01:46 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:46 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x444100, 0x0) accept4(r0, &(0x7f0000000100)=@qipcrtr, &(0x7f0000000180)=0x80, 0x80800) syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x3ff, 0x4) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_ima(r2, &(0x7f0000000040), &(0x7f00000001c0)=ANY=[@ANYBLOB="c4326f50e84b3bf4c952ab56ebcf3b7d24ac2e3ecadd68f2340a3be6a98cb047252839a199e4f16414e78b0ad09debb866031a98c97e8ac1cad63b71d207851234e11ebd965077fa5d6fd37e46a0b0f5a064b5264b51b06499f374b8eb7d01763fb32bf5daf64a3c8e0889072d5bf726cbc50e4d6dd1d0cac208b04ec5a0b6b2e49495ac34bde520d04eadbb5e8b52aa0c9ebbbfad89e7c48048726477d9b6de954ada12ad62da15d7319d01cfd51a993cb568b72c83446d3b296c13bd4719d51c41de13b663a7cf3884ffabc4bf15ef779d5e1a2446365243c86daf"], 0x4, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:01:46 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x9) 20:01:46 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x7a00) 20:01:46 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4800) 20:01:46 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x3) 20:01:46 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xa) 20:01:46 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x40000) 20:01:46 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4c00) 20:01:46 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x4) 20:01:46 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f00000007c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000800)={0x0, 0x0, 0x0}, &(0x7f0000000840)=0xc) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000880)=0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r8) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000100)=@proc={0x10, 0x0, 0x25dfdbfc, 0x800}, 0xc, &(0x7f0000000140)=[{&(0x7f00000002c0)={0x26c, 0x38, 0x400, 0x70bd2a, 0x25dfdbfe, "", [@generic="d530c4c847fea5c6bd5fd375b4d73ea2d768612534f8952cdf2a7ec2d72c91f455582d5e47beef4608f3dfc8124ae7186fd5281ff9db37ce3aef95a9141aa858a3db68da0bfcc72175f43f01030607e42edea6e871f5dd44d10000004600"/105, @typed={0xb, 0x1c, 0x0, 0x0, @str='^:#()+\x00'}, @generic="fcbf91648603d10cfce8918d1d8e78184a", @nested={0x164, 0x79, 0x0, 0x1, [@generic="3bfab9ee0518eaed744c7e4f45ae5acb930ba49985dbe1cc1c61e7559c02e95604d0e8b784da924fab753e25d37caa3fca2aee3ae9126fb14807d91883abfd39da13d584e8ff0407d5148aea9384c21db17b2e9b2fb931f0b4a1996e34b6c94b661be2d533132157a4da25215795e6401c35968f81df52f5b7afa7a266a28edf9c6a5d8072e766bd33d58246f71577627e234a8294597e77e780ff5fe976165d457bcef11b", @typed={0x4, 0x29}, @generic="a734efc1e74ee140b328ff87dbf6112cc9e082cb4eef88b9d78013330b05f27f7d75c5c69e139f7d0c6e8443a3dbe56a9c9712946c90421b0e866116552d", @generic="25af076121d7ec88c18223356499703b60fbae171f52d8a203fc66d04dd469bd9661751acfae1276c1101aba016cb396996baec2c08d27bb48051b0a49dc8e44f3b631bff8df9982826da3306f035a5116d4270e1921db0fafb883b8ec3adb2768d77b55a7ad42e2b09c8a4626c0783386d601bb424233af61"]}, @nested={0x23, 0x1a, 0x0, 0x1, [@generic="7bf36ba98dda7d223532ba3b46521d7c35e7abd85b74af1a6cb594be6811b1"]}, @generic="d55dc7", @typed={0x8, 0x3, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="07aa7d22b6fc5f1d292fc2ea1ee5b9018621f6f9981ab0c37175b10ef68f9d055fba1b7cfad0c44e9eb703dc5a270b5b2177b91ad41873cfc3", @typed={0x8, 0x24, 0x0, 0x0, @u32=0x3}]}, 0x26c}, {&(0x7f0000000580)={0x13c, 0x30, 0x300, 0x70bd28, 0x25dfdbfe, "", [@typed={0xc, 0x69, 0x0, 0x0, @u64=0xf97d}, @generic="fec32f42adcff1a154d53ae0d97feef0d12f0024280f64a513a7590b19ccd7aa", @nested={0x4, 0x7}, @generic="08b9cc6d7ab28e80befb43a914cd147c8b70c2985be9ef5956360080d5e3c3afc36f1558100fafd2289050665289596bf2e61149ce39f95a344d5739d7b1d7133a5a134ba0491cfb41c8c9a270d8f4999c7965f006bc28b86fc4bd3a2c811ab617a31a4c86557e2fcf46e2bbaaa1c47b6503b4ad9e11e625a5c6bf015bd102c0dc08d01bd188fdcdadd5d8e2004c41530e6b38aa4f7131296cad6a123d2df113a3faa26a3d9390735fdc3ea510e661666372136f84324abf06109527028240bd903da2a9c871156133ad25db09396cb0126c95a3c1c05c40fbdc895d544154c4f6f43653f0c86726f4a0a9b6f611cd62", @typed={0xc, 0x6e, 0x0, 0x0, @u64=0x4}]}, 0x13c}], 0x2, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r4, r5}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0x0, 0xee01}}}], 0x40, 0x4000000}, 0x0) splice(r1, 0x0, r3, 0x0, 0xffffffff, 0x0) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x1) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000200)=""/163, 0xa3}], 0x1, 0xfffffffe, 0x9) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:01:46 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4800, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:46 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xb) 20:01:46 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6000) 20:01:46 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x80000) 20:01:46 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x6) 20:01:46 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xc) 20:01:46 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4c00, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:46 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x8) 20:01:46 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xd) 20:01:46 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6800) [ 627.943031][T27811] EXT4-fs error: 10 callbacks suppressed [ 627.943047][T27811] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:01:46 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xe) [ 628.016067][T27811] EXT4-fs: 10 callbacks suppressed [ 628.016126][T27811] EXT4-fs (sda1): Remounting filesystem read-only [ 628.052999][T27823] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 628.078131][T27823] EXT4-fs (sda1): Remounting filesystem read-only 20:01:47 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xc) 20:01:47 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6c00) 20:01:47 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x6000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:47 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xe8) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r4) lchown(&(0x7f0000000040)='./file0\x00', r2, r4) [ 628.722606][T27838] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 628.740838][T27838] EXT4-fs (sda1): Remounting filesystem read-only [ 628.751363][T27843] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 628.763095][T27843] EXT4-fs (sda1): Remounting filesystem read-only [ 629.358027][T27849] cgroup: Unknown subsys name 'perf_event' [ 629.364668][T27849] cgroup: Unknown subsys name 'net_cls' [ 629.565270][T27913] cgroup: Unknown subsys name 'perf_event' [ 629.571393][T27913] cgroup: Unknown subsys name 'net_cls' 20:01:49 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x3ff7f8) 20:01:49 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xd) 20:01:49 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x721e) 20:01:49 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2, 0x0, 0x10000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000003c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000340)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x100000001000}], 0x8010, &(0x7f0000010d00)=ANY=[]) chdir(&(0x7f0000000080)='./file0\x00') r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mount$9p_tcp(0x0, 0x0, 0x0, 0x0, 0x0) truncate(&(0x7f0000000100)='./bus\x00', 0x1003f6) sendfile(r2, r3, 0x0, 0x8400fffffffb) r4 = dup2(r0, r1) fcntl$addseals(r4, 0x409, 0xd) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:01:49 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x6800, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:49 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x3ff800) 20:01:49 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x10) [ 630.920142][T28713] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 630.935269][T28714] loop3: detected capacity change from 0 to 264192 [ 630.954335][T28713] EXT4-fs (sda1): Remounting filesystem read-only [ 630.980717][T28727] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 631.029870][T28727] EXT4-fs (sda1): Remounting filesystem read-only [ 631.076501][T28735] loop3: detected capacity change from 0 to 264192 20:01:50 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x10) 20:01:50 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x731e) 20:01:50 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x6c00, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:50 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) mount(&(0x7f00000010c0)=ANY=[@ANYBLOB='/dEv/md0\x00'], &(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='ocfs2_dlmfs\x00', 0x10, &(0x7f0000001180)='-{\xc0\x00') preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/4101) 20:01:50 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x11) 20:01:50 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xb2, 0x6, &(0x7f0000000380)=[{&(0x7f00000000c0)="0f8c3a476f5e5a24f81e05cf9f76894b8909662429bf627050888a322d7e30d254024b43b52c6531a69057a1f6bfcc16f1cc0586141dcd8338b2b4093100924f61ea413cdc9515dcaa02ec931310113189", 0x51, 0x89}, {&(0x7f0000000140)="db8f5e1b2b98b9ff454c51c167561e2375377dc7ff3941d453e04a36d730705cafd7f7a278b601b37e74bf9e445e2537d27946a79b36af6971d81b9f2cb43bff0668a54ae0036552a9df2c93e8de3a23e069b7a57834855eb1bbb0d2d83162aea5d5efb17257ee4c8f3b4f2d539f26882fb8b1334eae50949f29c8cfa7782b54bfba2244151a812ed88afbc1e720", 0x8e, 0xd02}, {&(0x7f0000000200)="466bbeb984864ed0b339c2afe9293b4d91299fa9d6764dc7492f5773125dd83bb60c079e", 0x24, 0xffffffff}, {&(0x7f0000000240)="a2dc8b7c834929120e835907a06f68bfa765e85a4f1095d8cd2179b34917f2714199517a07e03b3798d1a80b4a454c6097f3", 0x32, 0x7f}, {&(0x7f0000000280)="c8184b32d0044ec28f5a450219b066b83ebbe1d6c1620f84f3d3934b9b888ae2ed8950f89c658785a4f8f8f7f3c730c1d79a4e779c4e99b8dccad610dc14a56700ef29db35198cbd0f206be17e3a255f062094a1f65e66cc31da267bd150063f193cbb4c3c5f32fc730db506357cd1518bb9a23574d8e5c80c5ff3be4c32fa11f64895ae20d47a694f2881f55b7d56cd7d1fae6a431e38adff92ea27d97ff628fbdbefb8c61bd2f38d", 0xa9, 0x100000001}, {&(0x7f0000000340)="ec2d6a12557c8add7ed8ecde1172a83f54dafc5bde8a2bb5688995ec101942b6705bc294a0cd5f31", 0x28, 0x6}], 0x28000, &(0x7f0000000440)={[{'(]'}, {'^'}], [{@euid_lt={'euid<', r2}}, {@appraise}, {@pcr={'pcr', 0x3d, 0x3c}}, {@hash}, {@fsmagic={'fsmagic', 0x3d, 0x9}}]}) 20:01:50 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x12) [ 631.450153][T28799] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 631.467717][T28799] EXT4-fs (sda1): Remounting filesystem read-only 20:01:50 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x7400, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 631.504460][T28811] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 631.529529][T28811] EXT4-fs (sda1): Remounting filesystem read-only [ 631.536193][T28812] loop3: detected capacity change from 0 to 264192 20:01:50 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x20, 0x121202) ftruncate(r0, 0x1) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) r3 = syz_open_dev$vcsu(&(0x7f0000000100), 0x1ff, 0xa280) recvfrom$inet(r3, &(0x7f0000000200)=""/156, 0x9c, 0x25, &(0x7f0000000140)={0x2, 0x4e23, @private=0xa010100}, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000080)={r1, 0x5, 0x1, 0xffffffff}) syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000080), 0x0, 0x67cb, 0x0) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x80000, 0x0) ioctl$EVIOCGKEYCODE_V2(r5, 0x80284504, &(0x7f0000000300)=""/41) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 631.648061][T28819] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 631.686392][T28819] EXT4-fs (sda1): Remounting filesystem read-only 20:01:50 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x7a00, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 631.709525][T28825] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 631.731892][T28825] EXT4-fs (sda1): Remounting filesystem read-only [ 632.496298][T28835] cgroup: Unknown subsys name 'perf_event' [ 632.503171][T28835] cgroup: Unknown subsys name 'net_cls' [ 632.894256][T28978] cgroup: Unknown subsys name 'perf_event' [ 632.900301][T28978] cgroup: Unknown subsys name 'net_cls' [ 633.118771][T29043] cgroup: Unknown subsys name 'perf_event' [ 633.128837][T29043] cgroup: Unknown subsys name 'net_cls' [ 633.159856][T29055] cgroup: Unknown subsys name 'perf_event' [ 633.166126][T29055] cgroup: Unknown subsys name 'net_cls' 20:01:53 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xe0ffff) [ 635.141252][T30242] EXT4-fs error: 2 callbacks suppressed [ 635.141267][T30242] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.2: Abort forced by user [ 635.164395][T30242] EXT4-fs: 2 callbacks suppressed [ 635.164411][T30242] EXT4-fs (sda1): Remounting filesystem read-only 20:01:54 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x12) 20:01:54 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xf41d, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 635.814334][T30623] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 635.826253][T30623] EXT4-fs (sda1): Remounting filesystem read-only [ 635.836996][T30629] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 635.849321][T30629] EXT4-fs (sda1): Remounting filesystem read-only 20:01:54 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x7400) 20:01:54 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040), 0x101, 0x24000) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000080)=0x40) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4082) fstat(r1, &(0x7f00000000c0)) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) fallocate(r1, 0x8, 0x7fff, 0x8) splice(r2, 0x0, r3, 0x0, 0xffffffff, 0x0) dup3(r0, r2, 0x80000) 20:01:54 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xf83f00) 20:01:54 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x18) 20:01:54 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xf51d, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 636.015595][T30669] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 636.046273][T30669] EXT4-fs (sda1): Remounting filesystem read-only [ 636.055493][T30676] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.2: Abort forced by user [ 636.094937][T30676] EXT4-fs (sda1): Remounting filesystem read-only [ 636.108366][T30680] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 636.126478][T30680] EXT4-fs (sda1): Remounting filesystem read-only 20:01:55 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x25) 20:01:55 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x7a00) 20:01:55 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x1000000) 20:01:55 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:55 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x40000) [ 636.261182][T30705] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.2: Abort forced by user [ 636.286729][T30705] EXT4-fs (sda1): Remounting filesystem read-only 20:01:55 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x48) 20:01:55 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x2000000) [ 636.302419][T30708] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 636.323854][T30708] EXT4-fs (sda1): Remounting filesystem read-only 20:01:55 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4c) [ 636.383094][T30717] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 636.416189][T30717] EXT4-fs (sda1): Remounting filesystem read-only 20:01:55 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) fdatasync(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:01:55 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x80000) [ 637.587861][T30747] cgroup: Unknown subsys name 'perf_event' [ 637.593943][T30747] cgroup: Unknown subsys name 'net_cls' 20:01:57 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xc0) 20:01:57 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x3000000) 20:01:57 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x60) 20:01:57 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x80000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:57 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={[{@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x67, 0x74, 0x3, 0x37, 0x37, 0x39, 0x78, 0x39, 0x30, 0x35]}}, {@huge_never}, {@gid={'gid', 0x3d, 0xee01}}, {@mode={'mode', 0x3d, 0x3}}, {@mpol={'mpol', 0x3d, {'interleave', '', @void}}}, {@size={'size', 0x3d, [0x70]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0xd, 0x67, 0xcf]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x32, 0x39, 0x74]}}], [{@euid_gt={'euid>', 0xee00}}, {@subj_type={'subj_type', 0x3d, ',+\x06[*'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'T('}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:01:57 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x3ff7f8) 20:01:57 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x3ff800) 20:01:57 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x281) 20:01:57 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x31d0000) [ 638.829295][T31209] tmpfs: Bad value for 'nr_inodes' [ 638.838531][T31209] tmpfs: Bad value for 'nr_inodes' [ 638.857688][T31213] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:01:57 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:01:57 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x68) 20:01:57 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xe0ffff) [ 638.916485][T31213] EXT4-fs (sda1): Remounting filesystem read-only 20:01:57 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4000000) 20:01:57 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x3ff7f8, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:57 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x300) 20:01:57 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xf83f00) 20:01:57 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6c) 20:01:57 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x1000000) 20:01:58 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x482) 20:01:58 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x3ff800, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:01:58 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x5000000) [ 640.521652][T31286] cgroup: Unknown subsys name 'perf_event' [ 640.529493][T31286] cgroup: Unknown subsys name 'net_cls' 20:02:00 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x2000000) 20:02:00 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x74) 20:02:00 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x600) 20:02:00 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6000000) 20:02:00 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xe0ffff, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:00 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) faccessat2(r0, &(0x7f0000000640)='./file1\x00', 0x0, 0xa00) writev(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0x5d}, {&(0x7f0000000400)="0a9e886070070a68d14f25cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4dca) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000680)='./file0\x00', 0x1000) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) syz_mount_image$nfs4(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0x8, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000400)="1e6ef60395b725e9cd14359df23340c9cb1b038309577034cbc82a642430a1b3ba00cbccbd4a02180f9b8700330fc84434728adf694d46bbec0b70110f183b40fff1b46460825178d4dc018e1e1b482edfae9910bddc58de", 0x58, 0x1}], 0x44000, &(0x7f0000000bc0)=ANY=[@ANYRESDEC, @ANYRESDEC=r4, @ANYBLOB="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", @ANYBLOB="acd1ddaad0c522c532268a89c74044c4dcc17194ef009752dcadf21970cdd9ac2809f803ced758352ac2d2fbd1165ee52da325cbb795c8d771c477778051977528d84174ca1985e0168b57b71cb94e3e7dd3058dc115a673518bffa79b6b61b387ef261890e4907f41e9064aa1c81907df880506e966aa5f13cf8d0f0de85adbb8c6fa08eb2d7371505b3ae19241f43e73117534d46cee3359dae16ef2070c1bfc8c5475234ea6ccb8a761ac8d59bda0bebaf6c54e4bee0d702b65078020997cbc1273407b2c9f1e6c4d76962b8f5a3c239402da83290792ab537fe0f60776819260", @ANYBLOB="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"]) execveat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=[&(0x7f00000004c0)=')-#$\x00', &(0x7f0000000100)='.&[{-(\x00', &(0x7f0000000140)='^\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)=')}\x1e&@\\D\x00'], &(0x7f0000000340), 0x400) rename(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file1\x00') statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:02:00 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x7a) 20:02:00 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xc00) [ 641.779054][T31751] EXT4-fs error: 8 callbacks suppressed [ 641.779117][T31751] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 641.798677][T31751] EXT4-fs: 8 callbacks suppressed [ 641.798690][T31751] EXT4-fs (sda1): Remounting filesystem read-only 20:02:00 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x3000000) 20:02:00 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x7000000) 20:02:00 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@mcast2, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000180)=0xe8) newfstatat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) r5 = getgid() r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r7) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000300)={{}, {0x1, 0x4}, [{0x2, 0x8, r3}], {0x4, 0x5}, [{0x8, 0x0, r4}, {}, {0x8, 0xa}, {0x8, 0x4, 0xee00}, {0x8, 0x0, r5}, {0x8, 0x7, r7}, {0x8, 0x0, r8}], {0x10, 0x3}, {0x20, 0x4}}, 0x64, 0x3) socket$netlink(0x10, 0x3, 0x5) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xc, 0x12, 0xffffffffffffffff, 0x4aab1000) [ 641.847978][T31762] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:02:00 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x8000000) [ 641.889673][T31762] EXT4-fs (sda1): Remounting filesystem read-only 20:02:00 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xf83f00, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:00 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4000000) [ 642.010377][T31783] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 642.033536][T31783] EXT4-fs (sda1): Remounting filesystem read-only 20:02:00 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x9000000) 20:02:00 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x5000000) [ 642.052051][T31790] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 642.072654][T31790] EXT4-fs (sda1): Remounting filesystem read-only 20:02:00 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xa000000) 20:02:01 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 642.198520][T31805] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 642.211343][T31805] EXT4-fs (sda1): Remounting filesystem read-only [ 642.232450][T31806] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 642.257467][T31806] EXT4-fs (sda1): Remounting filesystem read-only [ 643.458998][T31813] cgroup: Unknown subsys name 'perf_event' [ 643.465585][T31813] cgroup: Unknown subsys name 'net_cls' [ 643.692502][T31879] cgroup: Unknown subsys name 'perf_event' [ 643.698792][T31879] cgroup: Unknown subsys name 'net_cls' [ 643.796928][T31915] cgroup: Unknown subsys name 'perf_event' [ 643.803044][T31915] cgroup: Unknown subsys name 'net_cls' 20:02:04 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x300) 20:02:04 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xb000000) 20:02:04 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:04 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x41) renameat2(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x371200, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x200, 0x141) open(&(0x7f00000000c0)='./file0\x00', 0x18e81, 0x2) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x100000a, 0x10010, r0, 0x2b955000) openat(0xffffffffffffffff, &(0x7f00000011c0)='./file0\x00', 0x10021, 0x40) r2 = socket$nl_audit(0x10, 0x3, 0x9) preadv(r2, &(0x7f0000000280), 0x0, 0xd9f, 0xfa2d) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f00000001c0)=""/4080) 20:02:04 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xd00) 20:02:04 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xc000000) 20:02:04 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x1200) 20:02:04 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x500) [ 645.941850][ T727] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 645.972775][ T727] EXT4-fs (sda1): Remounting filesystem read-only 20:02:04 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2088, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x8400, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r2, 0x0, r3, 0x0, 0xffffffff, 0x0) mmap(&(0x7f0000153000/0x4000)=nil, 0x4000, 0x3000003, 0x4000010, r2, 0x8a1cc000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_misc(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xff) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) r4 = dup3(r0, r2, 0x80000) sendto$inet(r4, &(0x7f0000000580)="1ea7be99efecb25f7388c56e5cc894a48b53041d58fde32e2fe6fc1eeb682b598e891c6e31138933b24da83a3b39c8ff185fd084b26513c8ba9661787060f16b2d8ca0c718667e70276f", 0x4a, 0x8001, &(0x7f0000000140)={0x2, 0x4e24, @broadcast}, 0x10) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r5, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0x5d}, {&(0x7f0000000400)="0a9e886070070a68d14f25cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(r5, 0x0, 0x4dca) readlinkat(r5, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/120, 0x78) [ 646.018798][ T745] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:02:04 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6000000) 20:02:04 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x1800) 20:02:04 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xd000000) 20:02:04 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x600) [ 646.062508][ T745] EXT4-fs (sda1): Remounting filesystem read-only 20:02:04 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x3000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:05 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xe000000) 20:02:05 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x2000) 20:02:05 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x700) 20:02:05 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x7000000) [ 646.188335][ T778] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 646.219571][ T778] EXT4-fs (sda1): Remounting filesystem read-only 20:02:05 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x26cc) 20:02:05 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x900) [ 646.245812][ T788] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 646.271694][ T788] EXT4-fs (sda1): Remounting filesystem read-only 20:02:05 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) open(&(0x7f0000000040)='./file0\x00', 0x10800, 0x40) 20:02:05 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x10000000) 20:02:05 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:05 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x8000000) 20:02:05 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x3f00) 20:02:05 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xa00) 20:02:05 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x9000000) 20:02:05 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xb00) 20:02:05 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x4000) [ 647.026669][ T823] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:02:05 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x11000000) 20:02:05 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {{}, {}, {0x14, 0x19, {0x5, 0x6, 0x80, 0x200}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x1d789c8321035bd4}, 0x80d1) 20:02:05 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xa000000) [ 647.072209][ T823] EXT4-fs (sda1): Remounting filesystem read-only 20:02:05 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xc00) 20:02:05 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x8102) [ 647.119598][ T842] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:02:06 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x5000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:06 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xd00) [ 647.186075][ T842] EXT4-fs (sda1): Remounting filesystem read-only 20:02:06 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x8204) 20:02:06 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xc000) 20:02:06 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xe00) [ 647.298483][ T855] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 647.330450][ T855] EXT4-fs (sda1): Remounting filesystem read-only [ 647.350215][ T860] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:02:06 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x6000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:06 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xcc26) [ 647.392206][ T860] EXT4-fs (sda1): Remounting filesystem read-only [ 647.478149][ T867] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 647.501949][ T867] EXT4-fs (sda1): Remounting filesystem read-only [ 647.513901][ T870] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 647.532703][ T870] EXT4-fs (sda1): Remounting filesystem read-only [ 648.702460][ T874] cgroup: Unknown subsys name 'perf_event' [ 648.709039][ T874] cgroup: Unknown subsys name 'net_cls' [ 648.933298][ T938] cgroup: Unknown subsys name 'perf_event' [ 648.939371][ T938] cgroup: Unknown subsys name 'net_cls' [ 649.024474][ T939] cgroup: Unknown subsys name 'perf_event' [ 649.030664][ T939] cgroup: Unknown subsys name 'net_cls' [ 649.097567][ T965] cgroup: Unknown subsys name 'perf_event' [ 649.121861][ T965] cgroup: Unknown subsys name 'net_cls' 20:02:10 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x12000000) 20:02:10 executing program 3: r0 = gettid() r1 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x100, 0x5, 0x7}, 0x18) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r2, 0x0, r3, 0x0, 0xffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000100)) fcntl$lock(r1, 0x7, &(0x7f0000000040)={0x0, 0x4, 0xf1, 0x6, r0}) syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000480)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r5, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0x5d}, {&(0x7f0000000400)="0a9e886070070a68d14f25cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(r5, 0x0, 0x4dca) mknodat(r5, &(0x7f0000000140)='./file0\x00', 0x8280, 0x7) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:02:10 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x7000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:10 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xff01) 20:02:10 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x1f1d0000) 20:02:10 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x1100) 20:02:10 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xb000000) 20:02:10 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xc000000) 20:02:10 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x20000000) 20:02:11 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xff0f) [ 652.117615][ T2760] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 652.130215][ T2760] EXT4-fs (sda1): Remounting filesystem read-only 20:02:11 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xd000000) 20:02:11 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x1200) [ 652.199002][ T2771] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:02:11 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 652.240827][ T2771] EXT4-fs (sda1): Remounting filesystem read-only [ 652.333251][ T2779] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 652.351058][ T2779] EXT4-fs (sda1): Remounting filesystem read-only [ 652.373193][ T2780] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 652.394114][ T2780] EXT4-fs (sda1): Remounting filesystem read-only 20:02:11 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000000040)=""/4099) 20:02:11 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x2000) 20:02:11 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x9000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:11 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x2500) 20:02:11 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) close(r1) 20:02:11 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 653.026036][ T2791] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 653.049801][ T2791] EXT4-fs (sda1): Remounting filesystem read-only [ 653.062947][ T2800] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:02:11 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x3f00) [ 653.084882][ T2800] EXT4-fs (sda1): Remounting filesystem read-only [ 653.597086][ T2813] cgroup: Unknown subsys name 'perf_event' [ 653.603702][ T2813] cgroup: Unknown subsys name 'net_cls' [ 653.832319][ T2884] cgroup: Unknown subsys name 'perf_event' [ 653.838453][ T2884] cgroup: Unknown subsys name 'net_cls' [ 653.928542][ T2913] cgroup: Unknown subsys name 'perf_event' [ 653.935090][ T2913] cgroup: Unknown subsys name 'net_cls' [ 654.460958][ T3201] cgroup: Unknown subsys name 'perf_event' [ 654.467423][ T3201] cgroup: Unknown subsys name 'net_cls' 20:02:15 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x25000000) [ 656.230447][ T4276] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value 20:02:15 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x80000) 20:02:15 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xa000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:15 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x428, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x410102, 0x100) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r2, 0x0, r3, 0x0, 0xffffffff, 0x0) r4 = memfd_create(&(0x7f0000000080)='\'+\\\xdf\x9d-[\'\x00', 0x1) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000100)={0x8, 0x7, 0x100, 0x4, 0x8}) splice(r2, &(0x7f0000000040)=0x4, r4, &(0x7f00000000c0)=0x1, 0x4, 0xf) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:02:15 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x3f000000) 20:02:15 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xe000000) 20:02:15 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x80040) 20:02:15 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x40000000) 20:02:15 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x10000000) [ 656.832923][ T4603] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 656.846803][ T4603] EXT4-fs (sda1): Remounting filesystem read-only 20:02:15 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x11000000) 20:02:15 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x48000000) [ 656.892460][ T4611] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 656.919284][ T4611] EXT4-fs (sda1): Remounting filesystem read-only 20:02:16 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4000) 20:02:16 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xb000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:16 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x12000000) 20:02:16 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4c000000) [ 657.211779][ T4690] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 657.242732][ T4690] EXT4-fs (sda1): Remounting filesystem read-only [ 657.286747][ T4698] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 657.314044][ T4698] EXT4-fs (sda1): Remounting filesystem read-only 20:02:16 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x131982, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0xd9f, 0xbc) pwritev2(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f00000000c0)="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", 0x1000}, {&(0x7f00000010c0)="1ef36f25c1733e933e60b4bd886d819a4c743d578a5eb24771277f56f724066d0cadbc71e18917049642a72dce70e6d450fb8601aa929adddb557ae295effe69e5b130d027792bf3b657e6cb77c968be120f937a18a72937b88c27af8c445a2d632b0c1d7ebf29689f225d40412c9c585f23c6be7d4631f1c9b9254830e0d4dd80866c10f2f0bf0a733e5ecd7aaa8d24ee299289682382badcee6d21", 0x9c}, {&(0x7f0000001180)="942899ca98d369987bf4efed345f1885236fbc5543d2800864d9d22fb50d4191e4bd301daf294738c1ad3aa68f349fe40ede80b409c2d27cb61df1d7172ee4c3aad0afe8dfdc6a7d0747845a672dc748a725a27ace63b488aebb48582fe52e7f2ffd198c797dbdacda0bdbb2b0465839", 0x70}, {&(0x7f0000001200)="a8af4aa7b1b8d3cd75bffc66282ea1b2843658e46fdd3a0a24f1b788911c7c5a8e12c100c9756d5f18b7ba52", 0x2c}, {&(0x7f0000001240)="36b546aaf923d7cde598a778bf0e7d5f40162a8ccd0cbd73416608250e66cba8c8fc3ba3fdf6b9cf0a51eb2492da7142bf5768eb3237e19678d2bc207d16c98c0add068e00dc9a60f6da3ffb73869774e367f3b9d953995781d18a1f84292c89097b0ba20778d437d7c4354fcef8b640190ad580465b2b1ff96e985c99ea9c52be5b1e5e70676aeaf0f66e438b7eb2a428cdab76d7672a20451c4a39ac460b3ec2d603365b", 0xa5}], 0x5, 0x379, 0x0, 0x12) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/6, 0x6) 20:02:16 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x20000000) 20:02:16 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4800) [ 657.746502][ T4706] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value [ 658.476033][ T4715] cgroup: Unknown subsys name 'perf_event' [ 658.482529][ T4715] cgroup: Unknown subsys name 'net_cls' [ 659.074629][ T4939] cgroup: Unknown subsys name 'perf_event' [ 659.080606][ T4939] cgroup: Unknown subsys name 'net_cls' 20:02:18 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x400000) 20:02:18 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x60000000) 20:02:18 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x4, 0x2, &(0x7f0000000180)=[{&(0x7f00000000c0)="2a655568d8496d2c9d6c6766e69b518bbd8692899f62822e3a0040625206e1f7765c2d", 0x23, 0x1}, {&(0x7f0000000100)="4a1e27ffef76a6a9b240e51f8799554568e14e61480f2b00e71efe3038f20336ce233da6a02c075267c5130b879928ddb7f0dad96f2ef9dd6c49a4b38e6ce4cc09f13d4c495388433c3c1d8494b3cb3f30615e875079aafb5ce24d368994aaae", 0x60, 0x6}], 0x210001, &(0x7f00000001c0)={[{@huge_within_size}, {@huge_always}, {@huge_always}, {}, {@size={'size', 0x3d, [0x35, 0x6d]}}], [{@smackfsroot}]}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0x5d}, {&(0x7f0000000400)="0a9e886070070a68d14f25cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(r2, 0x0, 0x4dca) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000280)={0x9, 0x2, 0x1bed, 0x1, 0x8, 0x7ff}) unlinkat(r1, &(0x7f0000000240)='./file0/file0\x00', 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:02:18 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xc000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:18 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x25000000) 20:02:18 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x3f000000) [ 659.883979][ T5417] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 659.902422][ T5417] EXT4-fs (sda1): Remounting filesystem read-only [ 659.916678][ T5423] tmpfs: Unsupported parameter 'huge' [ 659.923231][ T5427] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:02:18 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x800000) [ 659.939903][ T5427] EXT4-fs (sda1): Remounting filesystem read-only 20:02:18 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xd000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:18 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) utimensat(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)={{0x77359400}, {0x77359400}}, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) fspick(r0, &(0x7f00000000c0)='./file0\x00', 0x1) [ 659.998777][ T5434] tmpfs: Unsupported parameter 'huge' 20:02:18 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x40000000) [ 660.081176][ T5447] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 660.098186][ T5447] EXT4-fs (sda1): Remounting filesystem read-only [ 660.115902][ T5458] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:02:19 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x48000000) [ 660.161153][ T5458] EXT4-fs (sda1): Remounting filesystem read-only 20:02:19 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4c00) 20:02:19 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) openat(r1, &(0x7f0000002800)='./file0\x00', 0x101, 0x48) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) r3 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1, 0xa, &(0x7f0000002680)=[{&(0x7f00000000c0)="2a7ecdf7285b4deb40a454a3a27e962d247a143916bb7b17cb64791ee05586acdab6a6f0483ab76fbc320760d4d85e1e6ebb504d2fd38c721614e4451bab56ddf22cbeb280cc720339195298376199b434108841dde1a4bf81483cd32d65c8898daddcf2b54e91242fab5f8f68135bfd807004081e5bc19cc0965190e9b09e1a9eae69f6f44760accf20396d1aaff097e783029fbc72ddbfa536b73e672f71e08f7abb9db2183b5c9ae857fe1548e09577382af9d472b0e6fc8069fd805ad4a36a371b109e8952ab5b3eb2b86b97583fd8488b", 0xd3, 0x9}, {&(0x7f00000001c0)="c458ab643026ccfff1ec2dece34f94eaf4725e4bd26fefbe34eb84cdbad79a9f2d9750b3034d7ded4d609b1c2a4791b349dfa4d1c0a3cf8d1e22ea1ab2f84ff1a47a2c0f1944056cf9e50c449fde613a313194512dcdc83244", 0x59, 0x1}, {&(0x7f0000000240)="5ddd57d6e11666cdbc5443c338161b31abe36e5511a8a7b2e325ddea19417ac55570689fb652be122eace6602fc18033fe", 0x31}, {&(0x7f0000000280)="7df605ded0400867f722f2cce081ba81e1c6301ce74043e8015b03e28eeb9ee254a2f050220909c0d784a75da86489628175a04d7a16e580cbc7be3fdde708e3ac97ea9e33e6e477d09d8e7a2c8177150ddb9bbf013a165caba5d0bf71477d32645e7f7ef10773ae866abe43efeae0ab49bcdc16c7c1f75801e5a5429a3e0d309dd1133209a5ecd702f13e40b92a32102a2560dd8e4c0bd5c03234164e9950603d5363f94e319eab6ea5951da3c259a92b7cee75c83bc80858d75d0b7ae2f2fe2d89df31", 0xc4, 0x4}, {&(0x7f0000000380)="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", 0x1000, 0x9}, {&(0x7f0000001380)="789b6511c9beceee09a243fe131bdb89a1d4b4ceec5d393baf30f77529b1e7069c55348dda34a9cc93a2b7fec9d2ddcbb27e7cc861ac685ab806c8fbffeee01a9b6712d363826755a92c8755429923f37c51cf72b201ceabc979cc91ad33823fb6b05ebf085e6f61601a60d6b04879ea5213f0f1d7ce16f9dadd70e9c336b7ee5d5b5bbcdfb0853d6351", 0x8a, 0x7}, {&(0x7f0000001440)="3c6886c0ddb6b245ccbeae47177602fe320a824c4c991410a9cdc2f954d1f31027c917fec2d2a270f498e7396773b177c1075adbae343358662d56ce2cc047c226556edc1493d11e9c3f7bf70c2c1ddf27fc990a2fe7f5f13cf6b56bbec64e441176c8948f1b5723de", 0x69, 0x10001}, {&(0x7f0000002580)="8932f95dfb30bf2399955c95fb224f0c6b45ef7524305e992e0993c51704f41a0d7142863ed49df29fef1c2ed9d7abaed34c42841ce6bd7f63bb5acf7d7fd871cc750f2cb9b549c55b9c1af3414db912ed7e7155c1ba682f9f95ef37a18407d31d6433774edca8d7881ff462b33732fdb3235dba4a7917bd6f3d8cde8f28b25149869a5d166cd32bc12d2ece9a75090008237f7074", 0x95, 0x3}, {&(0x7f00000014c0)="f7406a35e958db286250a09ebb1c5e0a06ef4a38d193cde09a8fca0b313de9ec71d6f82a252125ef4cbc3eea3faeac12031bf641013e5856ecd98ec2571ea24fe931230fede6d28bca020cc93762ff02aac9af71dc8e58979a80a71746a301b8c066ca6f970e5d48", 0x68, 0x8}, {&(0x7f0000002640)="d2bcd5b138ce515ba0e6cd84326d3210beeb9e6e41d9070803c29da8be7c6cbebcb0792059525a8f33ecbe44fd397f667d5c5ad4", 0x34, 0x81}], 0x3000c20, &(0x7f0000002780)=ANY=[@ANYBLOB="6e6f646f74732c6e6f646f74732c6e6f646f74732c6e6f646f74732c636865636b3d7374726963742c6e6f646f74732c7375626a5f726f6c6560a02d2c00"]) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r3, 0x8008f511, &(0x7f00000027c0)) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000546000/0x1000)=nil, 0x1000, 0x2000000, 0x30, 0xffffffffffffffff, 0x8000000) r5 = dup(0xffffffffffffffff) syz_io_uring_submit(r4, 0x0, &(0x7f0000002880)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd=r2, 0x0, 0x0, 0x9ff, 0xa, 0x1, {0x0, 0x0, r5}}, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000002840)={'macvlan0\x00'}) [ 660.934060][ T5680] loop3: detected capacity change from 0 to 256 [ 661.414204][ T5687] cgroup: Unknown subsys name 'perf_event' [ 661.420775][ T5687] cgroup: Unknown subsys name 'net_cls' [ 661.788736][ T5817] cgroup: Unknown subsys name 'perf_event' [ 661.795401][ T5817] cgroup: Unknown subsys name 'net_cls' 20:02:21 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x68000000) 20:02:21 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xe000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:21 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4c000000) 20:02:21 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6000) 20:02:21 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0xb3) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 662.958325][ T6500] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 662.996558][ T6500] EXT4-fs (sda1): Remounting filesystem read-only [ 663.004438][ T6510] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 663.021999][ T6510] EXT4-fs (sda1): Remounting filesystem read-only 20:02:22 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xc00000) 20:02:22 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x404002) mmap(&(0x7f0000259000/0x2000)=nil, 0x2000, 0x1800001, 0x13, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:02:22 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x60000000) 20:02:22 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6800) 20:02:22 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6c000000) 20:02:22 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x10000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:22 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x74000000) 20:02:22 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x68000000) 20:02:22 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000040)=""/255, 0xff}, {&(0x7f0000000140)=""/187, 0xbb}, {&(0x7f0000000200)=""/38, 0x26}, {&(0x7f0000000240)=""/157, 0x9d}, {&(0x7f0000000300)=""/81, 0x51}, {&(0x7f0000000380)=""/102, 0x66}], 0x6, 0x1, 0x9) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:02:22 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6c00) 20:02:22 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x1000000) [ 663.395306][ T6639] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 663.434851][ T6639] EXT4-fs (sda1): Remounting filesystem read-only 20:02:22 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6c000000) 20:02:22 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x3ff, 0x5, &(0x7f00000013c0)=[{&(0x7f0000000140)="7e629c7d7ecdc21629499cca5c0d11c6ea681fca9afd53429d929cc3f121b5c805e2b412540e1cfe25f02a85c7df893a649d079188ca90968d203b46a0d25ee7982f798a88c412ff9e014855875f889f781d690475b8c09822f6343c5f4fd4b25ede1d7e9f09cce5", 0x68, 0x402}, {&(0x7f00000001c0)="5c5202d6b734d257467bdfc4d8c90300263a506eeed37cbad99a012880864e78e10a61a92fbec7f0b0368c2ef4a10dd1f795352994c70a4db70f676d3f5245df0ff481d04f312e6620cad9583b4393689421cb2fae8440358c94ddae80e20310aa048ecf318d9420de70d27ebb13387132115195a84983bd233885ca1de9b62e593ad15701da7e8e9c128dab216c0bc0dae7e766a1177c77421d21156456fc9f8c0e618c44dbecf18d99f6965b63f0b5ea39210a06b85c75d9a25539fd67aa68142732cedeb64597a30a98be5d43b1e30de88f110158fe5138506d7345101816d8c7f860eb82", 0xe6, 0x5}, {&(0x7f00000002c0)="1f0a2369948094c0441e8265f0deb532ad9b1a6bbf9e74e694f8c0b33f551afc04994ffc91ed78d38a380d044b917f0936e898e7ada80fbe925c6ed414b67285015a0c036ca6b18bdc2cd48dcf750c61492a66", 0x53}, {&(0x7f0000000340)="1f52f2c292ed8b23eced8120456f34e107007abf6b2127fe503a416e15b86fd3d459a7cde64c45e387842813b401615f1b55ab728a55a2d7e3f8e3fb834ffb2a525bb6d88e76c3b2b69bdbf59fef27e2f82b1e04", 0x54, 0x80000001}, {&(0x7f00000003c0)="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", 0x1000, 0x7}], 0x842000, &(0x7f0000001440)={[{@uid={'uid', 0x3d, 0xee00}}, {@nr_inodes}, {@uid={'uid', 0x3d, r3}}, {@nr_blocks={'nr_blocks', 0x3d, [0x32, 0x36, 0x37]}}], [{@dont_hash}, {@appraise_type}, {@smackfsfloor}, {@uid_eq={'uid', 0x3d, r5}}, {@fsname={'fsname', 0x3d, '$(#.!'}}]}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0x2, 0x2735, 0x5}) openat(r6, &(0x7f0000000080)='./file0\x00', 0x0, 0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000002580)={0x0, 0x0}) ioctl$sock_FIOSETOWN(r7, 0x8901, &(0x7f0000001500)=r8) [ 663.478124][ T6659] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:02:22 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x2000000) 20:02:22 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x7a000000) 20:02:22 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x721e0000) [ 663.570476][ T6659] EXT4-fs (sda1): Remounting filesystem read-only 20:02:22 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x3000000) 20:02:22 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x11000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:22 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x8cffffff) 20:02:22 executing program 3: pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r0, 0x0, r1, 0x0, 0xffffffff, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000040)) syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:02:22 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x731e0000) [ 663.737462][ T6697] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 663.783540][ T6697] EXT4-fs (sda1): Remounting filesystem read-only [ 663.796979][ T6707] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 663.834462][ T6707] EXT4-fs (sda1): Remounting filesystem read-only [ 665.053411][ T6717] cgroup: Unknown subsys name 'perf_event' [ 665.060181][ T6717] cgroup: Unknown subsys name 'net_cls' 20:02:25 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x7400) 20:02:25 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x4000000) 20:02:25 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xf6ffffff) 20:02:25 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x74000000) 20:02:25 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x12000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:25 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000180)={{}, {0x1, 0x2}, [{0x2, 0x3, r1}, {0x2, 0x4, r3}], {0x4, 0x6}, [{0x8, 0x2, 0xffffffffffffffff}, {0x8, 0x1, 0xee01}, {0x8, 0x1}], {0x10, 0x1}, {0x20, 0x1}}, 0x4c, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7800001, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000040), 0x0, 0x201, 0x6) 20:02:25 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000002580)=""/4094, 0xffe}, {&(0x7f0000001040)=""/149, 0x95}, {&(0x7f0000001100)=""/221, 0xdd}, {&(0x7f0000001240)=""/131, 0x83}, {&(0x7f0000000040)=""/100, 0x64}], 0x5, 0xfffffff7, 0xfffffffc) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:02:25 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x7a000000) 20:02:25 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x4820000) [ 666.295540][ T7182] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:02:25 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xf8f73f00) 20:02:25 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x7a00) 20:02:25 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x6000000) [ 666.347982][ T7182] EXT4-fs (sda1): Remounting filesystem read-only [ 666.373399][ T7199] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:02:25 executing program 3: ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000040)={0x3, 0x3, 0x4, 0x1, 0x7ff}) syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0x5d}, {&(0x7f0000000400)="0a9e886070070a68d14f25cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(r1, 0x0, 0x4dca) openat(r1, &(0x7f0000000080)='./file0\x00', 0x200000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:02:25 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x8cffffff) [ 666.407247][ T7199] EXT4-fs (sda1): Remounting filesystem read-only 20:02:25 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xfeffffff) 20:02:25 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x20000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:25 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x40000) 20:02:25 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xc000000) 20:02:25 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xf6ffffff) 20:02:25 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xffefffff) 20:02:25 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x80000) 20:02:25 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xd000000) [ 666.593062][ T7230] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:02:25 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xf8f73f00) 20:02:25 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xffffe000) [ 666.660575][ T7230] EXT4-fs (sda1): Remounting filesystem read-only [ 666.691038][ T7248] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 666.748617][ T7248] EXT4-fs (sda1): Remounting filesystem read-only [ 668.023213][ T7259] cgroup: Unknown subsys name 'perf_event' [ 668.029856][ T7259] cgroup: Unknown subsys name 'net_cls' [ 668.223308][ T7326] cgroup: Unknown subsys name 'perf_event' [ 668.229321][ T7326] cgroup: Unknown subsys name 'net_cls' 20:02:28 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:02:28 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x10000000) 20:02:28 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x3ff7f8) 20:02:28 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x22000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:28 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xffffefff) 20:02:28 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x3ff800) 20:02:28 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x12000000) 20:02:28 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0x5d}, {&(0x7f0000000400)="0a9e886070070a68d14f25cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(r3, 0x0, 0x4dca) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r0) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x88, r4, 0x300, 0x70bd2d, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x70}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x8}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x27}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x26}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x1f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x27}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0xa}]}, 0x88}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) setuid(r2) umount2(&(0x7f0000000040)='./file0\x00', 0x4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:02:28 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xffffff7f) [ 669.580714][ T8122] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 669.609845][ T8122] EXT4-fs (sda1): Remounting filesystem read-only 20:02:28 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xf83f00) [ 669.653266][ T8139] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 669.689484][ T8139] EXT4-fs (sda1): Remounting filesystem read-only 20:02:28 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x25000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:28 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xffffff8c) 20:02:28 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x18000000) 20:02:28 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xfeffffff) [ 670.091842][ T8207] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 670.118759][ T8207] EXT4-fs (sda1): Remounting filesystem read-only 20:02:29 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xffefffff) [ 670.133586][ T8210] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:02:29 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2e000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 670.171514][ T8210] EXT4-fs (sda1): Remounting filesystem read-only 20:02:29 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xffffe000) [ 670.243722][ T8220] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 670.264573][ T8220] EXT4-fs (sda1): Remounting filesystem read-only [ 670.281487][ T8225] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:02:29 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xffffefff) 20:02:29 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 670.304824][ T8225] EXT4-fs (sda1): Remounting filesystem read-only [ 670.386109][ T8230] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 670.406669][ T8230] EXT4-fs (sda1): Remounting filesystem read-only [ 670.421686][ T8231] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 670.440987][ T8231] EXT4-fs (sda1): Remounting filesystem read-only [ 671.196758][ T8235] cgroup: Unknown subsys name 'perf_event' [ 671.203251][ T8235] cgroup: Unknown subsys name 'net_cls' [ 671.630098][ T8346] cgroup: Unknown subsys name 'perf_event' [ 671.639114][ T8346] cgroup: Unknown subsys name 'net_cls' [ 671.780816][ T8387] cgroup: Unknown subsys name 'perf_event' [ 671.787201][ T8389] cgroup: Unknown subsys name 'perf_event' [ 671.790302][ T8387] cgroup: Unknown subsys name 'net_cls' [ 671.796971][ T8389] cgroup: Unknown subsys name 'net_cls' [ 671.916774][ T8456] cgroup: Unknown subsys name 'perf_event' [ 671.923514][ T8456] cgroup: Unknown subsys name 'net_cls' 20:02:33 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:02:33 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 674.281428][ T9881] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 674.306986][ T9881] EXT4-fs (sda1): Remounting filesystem read-only [ 674.332857][ T9906] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 674.368350][ T9906] EXT4-fs (sda1): Remounting filesystem read-only 20:02:34 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x48000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:34 executing program 3: mlockall(0x1) syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) mmap(&(0x7f0000270000/0x2000)=nil, 0x2000, 0x4, 0x4010, r1, 0x1afaa000) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:02:34 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xfffffff6) 20:02:34 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xffffff7f) 20:02:34 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x1000000) 20:02:34 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x20000000) [ 675.429777][T10526] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user [ 675.441619][T10526] EXT4-fs (sda1): Remounting filesystem read-only 20:02:34 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x3f000000) [ 675.527001][T10543] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 675.550565][T10543] EXT4-fs (sda1): Remounting filesystem read-only [ 675.558931][T10544] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.4: Abort forced by user 20:02:34 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xfffffffe) [ 675.571869][T10544] EXT4-fs (sda1): Remounting filesystem read-only [ 675.597119][T10548] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:02:34 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x2000000) 20:02:34 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x40000800) [ 675.628983][T10548] EXT4-fs (sda1): Remounting filesystem read-only 20:02:34 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:34 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x81020000) [ 675.765803][T10559] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 675.796339][T10559] EXT4-fs (sda1): Remounting filesystem read-only 20:02:34 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x8bffffff) [ 675.827544][T10563] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 675.872362][T10563] EXT4-fs (sda1): Remounting filesystem read-only 20:02:35 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x321402, 0x24) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r2, 0x0, r3, 0x0, 0xffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r4, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0x5d}, {&(0x7f0000000400)="0a9e886070070a68d14f25cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(r4, 0x0, 0x4dca) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x20002, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ppoll(&(0x7f0000000080)=[{r0, 0x44}, {r3, 0x9084}, {r4, 0xa5}, {r1, 0x4}, {r1, 0x40}, {r5, 0x6204}, {r0}], 0x7, &(0x7f0000000100)={r6, r7+60000000}, &(0x7f0000000140)={[0x8]}, 0x8) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:02:35 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x8cffffff) [ 677.108517][T10579] cgroup: Unknown subsys name 'perf_event' [ 677.114891][T10579] cgroup: Unknown subsys name 'net_cls' [ 677.316299][T10635] cgroup: Unknown subsys name 'perf_event' [ 677.322357][T10635] cgroup: Unknown subsys name 'net_cls' [ 677.442958][T10671] cgroup: Unknown subsys name 'perf_event' [ 677.449250][T10671] cgroup: Unknown subsys name 'net_cls' 20:02:38 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xffffff8c) 20:02:38 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x60000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:38 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xcc260000) 20:02:38 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0xd9f, 0x5) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:02:38 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x80000000000) [ 679.615240][T11962] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 679.650124][T11962] EXT4-fs (sda1): Remounting filesystem read-only 20:02:38 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x3000000) 20:02:38 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xe4ffffff) 20:02:38 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xfffffff6) 20:02:38 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:02:38 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x1000000000000) [ 679.691881][T11974] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:02:38 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4000000) [ 679.749228][T11974] EXT4-fs (sda1): Remounting filesystem read-only 20:02:38 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xf6ffffff) 20:02:38 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x68000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:38 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4000000000000) 20:02:38 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000001140)=[{&(0x7f0000000040)=""/13, 0xd}, {&(0x7f0000000080)=""/2, 0x2}, {&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x4, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) preadv(r2, &(0x7f0000003740)=[{&(0x7f0000001180)=""/22, 0x16}, {&(0x7f00000011c0)=""/19, 0x13}, {&(0x7f0000001200)=""/212, 0xd4}, {&(0x7f0000001300)=""/203, 0xcb}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000001400)=""/85, 0x55}, {&(0x7f0000001480)=""/161, 0xa1}, {&(0x7f0000003580)=""/187, 0xbb}, {&(0x7f0000003640)=""/219, 0xdb}], 0x9, 0x5, 0x8) 20:02:38 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x5000000) [ 679.886011][T11998] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:02:38 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xfbffffff) 20:02:38 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x8000000000000) [ 679.942674][T11998] EXT4-fs (sda1): Remounting filesystem read-only 20:02:38 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6000000) [ 679.989023][T12013] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 680.031065][T12013] EXT4-fs (sda1): Remounting filesystem read-only [ 681.275599][T12030] cgroup: Unknown subsys name 'perf_event' [ 681.281798][T12030] cgroup: Unknown subsys name 'net_cls' 20:02:41 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xfffffffe) 20:02:41 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xfeffffff) 20:02:41 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xe0ffff00000000) 20:02:41 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x7000000) 20:02:41 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:41 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1, 0x2, &(0x7f0000000200)=[{&(0x7f00000000c0)="ac1f1e7ca8c9b455018adb5ae1651dcdb00d3ac7761988f072abdf40c2c928617ecb393fb04680d122595d871c61719365cdb7d27e0f12f1795ea9f66c67d202c1953079752b5573dedb3d7de9b0e743e8ae149121f7723062a59c674875ed4e2a26a95b59705161a42dcfd23fbe40265b8748e0cb84fec53afd244cb034f31e8b6fc00a9ded100a5d79fb5d7351107fd3ec0719f208fab53159a8260123409ea2708c44eafce23530bca81d35ea8db1d2d28a30fe032eb509a9537ea586f0141b32dded7da485fb56be94a17a6908c8f62e154d759c147c8298ffe6b3bc457a0a43cd43cb515422996e2c554bb2cc2b2c", 0xf1, 0x400}, {&(0x7f00000001c0)="1d44ceba6bd6be3cfed182ce554988fba420b327e19817d8a8a720401c0464a228a10473c6f6fd712c9c24b3f5b185b12924f4c3f2", 0x35, 0x3}], 0x84004, &(0x7f0000000240)={[{@size={'size', 0x3d, [0x38]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x25, 0x31, 0x0, 0x65, 0x6d]}}], [{@audit}, {@appraise_type}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@appraise}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) inotify_add_watch(r1, &(0x7f00000002c0)='./file0\x00', 0xa0000106) 20:02:41 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xf83f0000000000) 20:02:41 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x8000000) 20:02:41 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x80000000000) [ 682.530243][T12495] loop3: detected capacity change from 0 to 4 [ 682.565369][T12498] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:02:41 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xff010000) 20:02:41 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x100000000000000) [ 682.582055][T12498] EXT4-fs (sda1): Remounting filesystem read-only 20:02:41 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x9000000) [ 682.634611][T12516] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 682.660359][T12516] EXT4-fs (sda1): Remounting filesystem read-only 20:02:41 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x200000000000000) 20:02:41 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x74000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 682.760409][T12524] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:02:41 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x300000000000000) [ 682.800741][T12524] EXT4-fs (sda1): Remounting filesystem read-only [ 682.826585][T12529] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:02:41 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 682.851036][T12529] EXT4-fs (sda1): Remounting filesystem read-only [ 682.898770][T12532] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 682.920019][T12532] EXT4-fs (sda1): Remounting filesystem read-only [ 682.944978][T12534] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 682.977115][T12534] EXT4-fs (sda1): Remounting filesystem read-only 20:02:41 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 683.043354][T12538] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 683.057204][T12538] EXT4-fs (sda1): Remounting filesystem read-only [ 683.074929][T12539] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 683.097259][T12539] EXT4-fs (sda1): Remounting filesystem read-only [ 683.344258][T12495] loop3: detected capacity change from 0 to 4 20:02:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) preadv(r1, &(0x7f0000001340)=[{&(0x7f0000000040)=""/230, 0xe6}, {&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000001200)=""/252, 0xfc}, {&(0x7f0000001300)=""/20, 0x14}], 0x6, 0x8000, 0x3) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001500), 0x40000, 0x0) ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x60, 0x3, 0x6, 0x201, 0x0, 0x0, {0x5}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x8001) 20:02:42 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xf41d0000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:42 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x62e4e000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) readahead(0xffffffffffffffff, 0x1, 0x10000) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@mcast2, 0x0, r1}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000040)={@private=0xa010100, @local, r1}, 0xc) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000002c0)={@local, @private2={0xfc, 0x2, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0xfd}, 0x0, 0x0, 0x0, 0x400, 0x3fe, 0x0, r1}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000004cc0)={@mcast1, 0xf, r1}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x4000, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000002c0)={@mcast1, @ipv4={'\x00', '\xff\xff', @loopback}, @ipv4={'\x00', '\xff\xff', @remote={0xac, 0x14, 0x13}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, r3}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000002c0)={@remote, @local, @private1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x20c200a2, r4}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x4, 0x1f, 0x3, 0x8, 0x14, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast2, 0x8000, 0x40, 0x2, 0x8}}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x808400}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="48010000", @ANYRES16=0x0, @ANYBLOB="01002cbd7000fedbdf2519000000340001800800030000000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="0303000000000100", @ANYRES32=r1, @ANYBLOB="0800030001000000080003000300000014000200766c616e310000000000000000000000440001801400020076657468305f746f5f626f6e6400000008000100", @ANYRES32=r3, @ANYBLOB='\b\x00', @ANYRES32, @ANYBLOB="1400020076657468305f746f5f6873720000000008000100", @ANYRES32, @ANYBLOB="3000017f140002007f72696467655f736c6176655f30280008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000300030000001400018008000100", @ANYRES32=0x0, @ANYBLOB="08000300010000003c00018008000100", @ANYRES32, @ANYBLOB="080003000300000008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="0800000200000008ff07000045fb9a360dad2c0ae30000000000fc739be97555b631d0c83fc4ef0800000000000000b7494ded7bc44742d86cf72bbd7fd6902b4fde494539f4081c76da81d6a042b641f8fb3dcbc9b2cef1bdd7420e7d2f252bcbe0b44600"/113, @ANYRES32=r5, @ANYBLOB="03000000080001", @ANYRES32, @ANYBLOB], 0x148}, 0x1, 0x0, 0x0, 0x20008080}, 0x24004044) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04002abd7000fbdbdf25040000000c0001800800060001000000080002000300000008000200020000000c000180050002001a0000000c000180080006000300000008000200030000004000018008000300ac1e01010500020009000000080003007f000001060005004e230000050002003f00000014000400fe8000000000000000000000000000171400018008000700", @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r4, @ANYBLOB], 0xa4}}, 0x40054) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 683.420493][T12550] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 683.432568][T12550] EXT4-fs (sda1): Remounting filesystem read-only [ 683.440265][T12556] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 683.458824][T12556] EXT4-fs (sda1): Remounting filesystem read-only [ 684.140876][T12568] cgroup: Unknown subsys name 'perf_event' [ 684.147236][T12568] cgroup: Unknown subsys name 'net_cls' [ 684.496798][T12659] cgroup: Unknown subsys name 'perf_event' [ 684.503004][T12659] cgroup: Unknown subsys name 'net_cls' [ 684.553441][T12672] cgroup: Unknown subsys name 'perf_event' [ 684.559836][T12672] cgroup: Unknown subsys name 'net_cls' [ 684.562255][T12674] cgroup: Unknown subsys name 'perf_event' [ 684.572482][T12674] cgroup: Unknown subsys name 'net_cls' 20:02:46 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x1000000000000) 20:02:46 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xf51d0000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:46 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, &(0x7f00000035c0)) setuid(r2) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1, 0x8, &(0x7f00000013c0)=[{&(0x7f00000000c0)="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", 0x1000, 0x3f}, {&(0x7f00000010c0)="bd11c592e6a285b2975601d17b6548e76630fd2582c859bba83f635184fbb79ce11c27d99a", 0x25, 0x1004}, {&(0x7f0000001100)="4a15f66053b6e2d7f7cf4f6725f468d5c8f5a12862edf3193d461701ee5cfb60ac54f6173b8a7dc26e6dd51ad74952bf501846f9dea9b83fd7bd338ffcf38beca571e6db88d69fe3b33a6f9f5e23246ea9e7e479fd14ed35dc00b8228ffab4547eae122e5a10d69ffb1dedf1ed35c9a85d5fa5e9", 0x74, 0x100}, {&(0x7f0000001180)="d37000023ac99fc616d9c7ee0700000000000006cd6a66c78d5d5a2cd5bd54cd9b7699eb78e3f2e5308c492f7d6ead935a468ec7d93c638b3077c6f23912bdcd8808d9f7e76c8d40ef8e480d004607f61c7e512c6a4d0000000000000000", 0x5e, 0x1f}, {&(0x7f0000002580)="c1d36cdbe879c1661ee714bcef9ba00516f7da6b4771a9e38e1a3d3a6db4490f736009b65971f1b368400803a8be041c50de5f25f5bfd37778922309c13786c4951a29a3522390f772bb3ad4d8126194a10231f536952e6d41ff2024aa1315ba8475b5c9d8ebc30e22adbc88a0a7248a8eca20666d233502af162b0755019c5dffaff283ef9f0b20410ffad6182971244d863ced3b3b956f568eb8c7b223af524fa890c6f62456ae95d907524935f395656f3ffef478864493d4da437be1c2811f139dbb3d2f7c38f1b822082ac0530fcc46d8fc5ce46863676dac52b72445b93de92faf220e8c9e82a028be5376fc801dbe89db158cb6fe079833f5c003256a2e8cf14537e35855a319e388dc2e0adac44b15468dc14b5d78bbaa54e6a08cfb20a0acb9864ba6a364eddb5e6fee34cbc6b2c30326a3b7702ef11dfa6ab3c5b2c0a90703a952c44118ef4aa34a1c5d44d55aac0f46d7d5274e738cb53921f9c8c59f27b3bd8f50d7aca450a51f62aff6d6ac4e50fc98620a734a22079d9707774171a21836bc8a5bf717ebf4fdf62aff4af3c930ca06a1f97c3c6fa62b0e40adafcb48ab5b11556db8a84e09e0f91c8dfc08e8678429b352a220c6adc32f107c6b0552f2386418e467b742842a605bc0950d4979bbf6520c32a50da1b63ceeae20a3e6d41a49d5559831150ab15c0e11fc584155983571ea71f237ecf91d16c297f786987cbe0ff15fcf5939c22b69fcf78ca3cbe65f3825f0ffca4c26ca8537a53ae400bf70b4318d0404d9d1554d2055662f7393c5ae32d3dcb3cd9781ac0253ce8bbaea93e8b1a18a3cf02cc5bbbbcf3efb336ef62cfd976db05c521e9c1e1841369489073ef30e63307b50da2610bf9f0b6f256773dff2eadebe5969712256e062a7c2ee4bcb4b7b4ecac5a2b45856a09797d7093402ed1b21ad2b84bbbf1974971b535afe13b5b61148b98ca3e2afe0c07f408a7f976cd9cdf81df6b3a003b2d1c1534738d6ff5fa96754e7ba9f468c6bbf156e67c7fa93be9885c7bd5a7088903819c716931b2d7c25ca28613c345c90210fafb92ce451f9c72d60af5eba8c1e387aeee306c379448021edb27b31d6f57b100302a3c63912d51b84ac89109448e1fb63982ade1208f50c7ada527d7e3740e528d31c9e3a56bbfe170e8a09841651821f6330d2fb9a06449402cac1ddaaa147a191f04ad47ffcf3522fea48c0843217c74bcf167bf58c8b5cf8616a2d88c356d465b6afb9b7171bddd647b06c5991bacb0bd7cccd494dac8e3538d51ae3884b795e7abc6876b87d8a5474025da440ea9b4b4df238be6bca89c89019c584ddf328824d87416c4a69b3556882d6947d0e90612c3bbd7eec5acced8a4c5102cd59b652ab21226647fe5c5ffc11e8a4a27ca0c95edfe687bb8fb0c6084d39b85b3fbac193cf8bd3a8330bd510087d07eb33651c71d4325bdac04aeeab66a2f4a2622e4186278a2608b032691d8183c92edf28e76a5a09be3d3576454296590e03d74d6fcbd0ebb4bf32fb29faf66352518abb7d6c4db34508180d290be24adaaf86f40ad5230ae894245a5699c1477527605793f1bfa30d42285d4f2776eb8c6a9250ec3ccfe1c71c5711949e9b4f2e48330a05f3bbb392896c68fd2baee0e0ec5768fddfb47f9be0ce5990890661d5ce1b332bff04f858a27e394623b2fd9113361698e2baa295108a66a8e0d2505a0de5311c91b1b7bcbc2590c315088d46b9e5826f5316197cd756ccef446aaff9c4bba4819d276fec2be9b2b5b59ca9807babb0a3b6790093b33f4b6fdf7ce4550bb63ece764ae0d38d34d6ed84f1c8fc4776b2fc894ba12a78d074eaf15d376348ea9a0441e5d0f17bf06ad2b0a9ec42de9c46efe2fd19a24404f2d1b5ca279227cbede08bf84d107ee793385d578685620043e762bd477b7369c76be3980182549e6aface4f688a0981d7d6886fb7c2862a63fa592bd27829c7d5e65fbcbfcc87cd2b7acb4fd8d6d4973163111cd29013700726a42d126f91a17bf307b0c431620cbb99d0db4f86df75d0235166b1021c70ad2375d484f54cf5ad238fe43730a9da82e6af5db02f206d82c7120e5b13b0e24ae8cb4a68ced899fbd77481611f0085f05a3b215f6728668b04c45e4e37443e1a1f3e059d286ab63e26b71341e96a17f7fe95ef386c5d3c08db89a501c14833388b55b7b62b3d408a3f6f5b86460bd8d7df3846c98e8544bdfe37436005bdfe3c4526634b17efd74f66e4994e8fbf7f65a5cfc884d431f4cbfa1eef8282d1e28c81b016ccf54489bda440db5f72b8c71db5bc9418213cbd5773d1858ca4e482dff0225876703b3cebf4570c38e5a2ae12cd5462e90fad9f0c177cb9cac3a4d53df64ab6039709d0c02c59746f241aceee737457731a889eca86d6528a73b8561691bcdac3e3aa3acb69e599dcd96373039ee319e1c71ea944d4997b71a1c3f9c7beb59025cd8731012163613ca447bbe83ea37fddf23b4197268554624e766983cf0ebbbc403582f6140b25331d53786a1a24375e40a6a3fd61d9b5a5542080b0d9b8388448f6c4e4e9aed9000fa77a50ca3c0c747350cd039f47fda13f2b8d482bf551c2a1e551330169e63c25c16280d96c95507701a18c05038d19ca3a70221c1fd05c38147c64ab7703448d390fb002cc91e959291a77429509d7a6e86bc4a6005ebf90f1b0a749d109e9d58e7f8721d5f249f161a60f9b9e444f1781e89ef4ca6d042d14a071c2e1a44bf18e91b6c8ee97c6817e9c091e83e0f9d1255eb55031bbd2e6834f09ad1ed8d5de122251e4e02565cc64811054d99c5c6203c66d5dc9b5920b8ef390a4915848f86fee74920d8e67fa64b895123e36f250144ee18c6bb6ef6e93b6349ed64a86c55a310253aa5d419cb506a5487bbc28508d019bdfeea82caa3554c68d4610e54e2ea2665f376868a4b6798cf7f809edb1f1f1621b14a5db4d0c4ca57721a91ca2c51ce7844d55b8eb077056f85fb81e8063db81bfdf0abeba2e3fc84418457783e1326eb70b573cba741d58ee5178c48cc1719a05ba82bc2799b45ae79e1b4fe37fc04afcedcaed44d5aeafdf8c310ea7d3cac4ad84210a38c8b00df334ecd30e96e68d6dbd4f423621e09a8fb164261dd31a1366deba8c0a0a3c414afae253b298421472e449dc0fa4dbc3da33ab7cba61f113743c5696a109507668601282fe111693c2c0b3c53fab9b0a0d5d5b1becceace5bf48102570cb25e5ef87ad5a0c1e03c255e4dfd1770d5d3d0bf161be3e1b71c2bf2e6d40ebd681708be258958bc4909f7ff9d0704a547a296008b7b2a948f5601cef5d36efd5b79aef5935ad346cda2f069af297178ea3732bcc83f7920b48ebf63f0996ee6dfe85611d93d572f9cdf6a5f63d4a655e2ba0a2f9be999703910c26f08fa0327e590707c852876c06123cd7122ef50df59d53a1e43f5b7b70c7eb404eb06bd29609b019c5c856d00954a43143d4980bda55b611804eb60e7eb903ad3d1a8756b3868b1192f6f25f2c841ddff7c814b625817ed753d1893b1e5de914d0a4dacdc04c2494e31d800b39e813e9678548f74719eb15acaf2a04e6b00b5d2fc4e0dadf1c5decb1a94daa7e8474d4560f91a40dd44469cf807f806bd453f310b7c554c7160b5ce3c640d0606d55a3e4943aa56de7d54a273ebb995131ee69358bdbfe3ee41ebab950b02198bd886eaa56589aa86bcad9254b85c2824e679bbc89602bcdc3424a75524852c40d9c965381a64cf51347011e46e4637395ade44e22e780ba25b8e7b2de0dc83a6af0438f583356ab0b50ff11b503795e692d507cee7c025a9a14754b00e22198584c3996079b7343ec010fd2e449baab8b13833c018fc64aa399ce56f8d19840ec700e047ad4fb740c74dd8a5783b4d1c78ad762b4f0ad6a7f681cf3a3b408fb6959d6dfbde9af7c6f2bb0c6f2c454d6fe96970a71be10a8540c200280bdc1eb741ec9ad72fb02ba7aac0f51d8c620c591eb538fe31a9ce04e1e3e4b223318c27f47383decc66a308af13f075f80a1c274e292fa7a3544f5e34f365caa3ccdb0e4f4ae1dfaca879949f17b16d53c7ece7d7cd07ecfc623c08d5a51868058a4c545a34b7b8d016e890ace33ab339064c387cdcb04946c7dce669e295ab4d1a8f41314a6b4be6d3cfae386c19e648855be9b86e0a1c547090e46faa934bfe970538d6fc84214050aa5cdc5e0f84393ee6a834e8b432df50972c94e1fa3a7564388a23009c08767eef2eb45928def8fd5294c13619da5ac53557b133c2f11c389c60d9e9d0658c2e54abe214d5c4f1f25d0e7a9a7864b907fb82c89f1791dc2cea97a30d96ca27d99655e658d6eb98e3c7aee215ce334c8af88468b3e054338f2a5e271e31ca39a3f1e5f257110d55e5175ab9417dd17b986b6541fd55c886bba8ad55d491842727c5de1f9fce587ae237dbb422373fdd4aaa3f735a3256380ba034351d3df1074d4f705f62ad20600c3781939b40241e2c8859466b1faeb04f1d2192ab15f3e3ada64a4b0c667154d23dae27d493190bcab20189e40114f86201346093036f960ef74d81f20f4b9816cbeba292c52a33fd3cee8173b32419557fb071aa20ce979eb1db9cb6c65870acad836867f2ca8082113aad2f8719ab7ca3f1a90a2b9d1fb585ea57a24f1328b21f3f45e1b8b835a1c7f5f336c4d3e70b77e1d2040ae22bed46cb93b5bd5c3d86e5abdfe6cdafc69c73cfe2dbb854051cf28ebfc26d6b8303dbbfc23169688f709ba2fbad4970c5105bf877b1815c5de5abacf8273d5c6c635f6e105e5c821dc42b9206d67bad6531ad16a02fb7ca34899979b84ef956e008f254f06867beb83454cee96e0b7f9ac54221643424d051ec342c05276a1c9ab125277d36e117b8dc665b4ab252c94832fbeb3da0d70a3e2fd08ce909a44fc1756f41294b4164ece549d8f168800fd1d217dcf2aa6a14c5e47b26206a4b95311c8de9c1cc36ec3a559dec9d21e3679664751bbe22520372ffeddecdc3b3d9ae40204996b715df9f07565c5fa326801db0a9f594fafe3dba3deaf62bca12f918d00e945402cb0e02cdb3bcca9646da42b309dbad9df032c0660108ac7bff442ea5bb38190baab15157b1c3b4c9acb830b85b8cf3952275a12be1759ccc12c59f19cc4e1d4d86734eaaf42647609be66467e627fd27f038bf086bce9f9da0a376fb87837f870b40bdfc387b9f768245e1e88d5b18e0ccab3de2927bdd1b2845139cbb348875417ab57946fd6d72f8d5b4f6167714c30f67d35179cc2fdc3679e11e011b7b0c0941ec660b94af2049818a7ba4d2ab5b9179608d197ef63f69874d1142673f9fcaca110d761eb1709e69c1b975d444e16af73b47872097a315d7054caec02824a3b6e5a09e15b360ecbfa46051ba3da7dc1e31903bc6ef6312bc9f050e3be7a446965476299d98e0f446f645ce90180736d453828e2556fb64de79048ea68263e660ef6df96970af367fc63fd06867a025463df5595adde066cc7db6a2a33f42a85b27c05b276745844877570fbf74e2217d8eb68cc63a5252b7d3ab2389ddba842dbf94a43bb56d4d673ffacb7a5f37eb105db08ae84e0cd20549bd985f9c72594c2bd9858e29169bed557f9522f619c19f6061163f14aadf5539146426d571551d3bfee370929b89abbb8e34b13b22c63ddb85efb3e3a877298a8cc0a53b131a59bdb54c02ed01af045c9f42a6ab64601cb645297b361b8d291af6e0e30b360913c39192c1e2ea6c6e0a0127ec60ff3ee", 0x1000, 0x800}, {&(0x7f0000001200)="503b17b057f0cb8f38b792d2f7f72f48ea6d1f0d651b91c7adf9c59f7e4862563742f805c4ef36139f16f1b474a62fb32fe104cd8e4776960cd4cb73d2478e4cff689772f8d7fb44d9451a90df460747d27ac47ae2d70628912c686f17a4e9d2875fb63c23fe0344b3263575c713ca56aed76c117dded4493b0ad50a7a4a16c0ceb32e48609f93c780f743fb1eac502bd954a8be4cef7fa780d5f124a3bec3b0711bda2607c9d004a54976d9fa09133bd2f3c515ec5aa041597cd831e334f00a74311a4384673843a03f18f2a65fe690217e7e985f7be483c4031292e1546b2a107c3c", 0xe3, 0x3ff}, {&(0x7f0000001300)="e3ee1322f217e05b60a9ddc754d6dc2ae29645d8c1b1ca2e86a311b57e25adca768e93b29e9d65cd696e86d461d0a6f5c98f6b015d11e1190911bca19e0ee5dca864e57eee9487471c7462ea8b121f6ce6d117847e1be38717c9b5d1a0ee3002819e42d4511a0b71efb9bb144795", 0x6e, 0x80000001}, {&(0x7f0000001380)="3ebe4c3d4e8b2a06f77e5c134e2e706036af91443b6c957ba52b14fa5a9f99409350e4eccb28d2a1dffee24679bed53aa84ab402731c16a521", 0x39, 0x5}], 0x24418, &(0x7f0000001480)={[{@uid={'uid', 0x3d, r2}}, {@gid={'gid', 0x3d, 0xee00}}], [{@uid_lt={'uid<', 0xee00}}, {@fsmagic={'fsmagic', 0x3d, 0xee62}}, {@smackfshat={'smackfshat', 0x3d, '['}}]}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r3, &(0x7f0000003740)=[{&(0x7f0000003780)=""/183, 0xb8}, {&(0x7f0000003640)=""/120, 0x78}, {&(0x7f00000036c0)=""/94, 0x5e}, {&(0x7f0000001500)=""/26, 0x1a}], 0x10000000000001f3, 0xd9f, 0x7) r4 = creat(&(0x7f0000003580)='./file0/file0\x00', 0x60) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000080)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000053e00)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x5, "2ab92b4a9a3ef3"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, &(0x7f0000003bc0)={0x0, r5, "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", "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"}) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) open(&(0x7f0000003600)='./file0/file0\x00', 0x4a000, 0x10) [ 687.304000][T14347] loop3: detected capacity change from 0 to 264192 20:02:46 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xa000000) 20:02:46 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xff0f0000) 20:02:46 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0x5d}, {&(0x7f0000000400)="0a9e886070070a68d14f25cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(r0, 0x0, 0x4dca) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x480000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) mount$9p_virtio(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x280000, &(0x7f0000000540)={'trans=virtio,', {[{@access_any}, {@nodevmap}, {@access_uid={'access', 0x3d, 0xee00}}], [{@subj_type={'subj_type', 0x3d, '\x00'}}, {@appraise}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x31, 0x38, 0x38, 0x32, 0x66, 0x37, 0x66], 0x2d, [0x32, 0xa, 0x66, 0x62], 0x2d, [0x64, 0xc, 0x64, 0x32], 0x2d, [0x51, 0x63, 0x65, 0x62], 0x2d, [0x34, 0x38, 0x35, 0x33, 0x37, 0x66, 0x34, 0x39]}}}]}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)={0x0, 0x4, 0x6, 0x7fffffff}) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0xfffff800, 0x3ff) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:02:46 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4000000000000) 20:02:46 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:46 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x31d000000000000) 20:02:46 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x200, 0x0, 0x0, 0x1200000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) accept(r0, &(0x7f0000000040)=@caif, &(0x7f00000000c0)=0x80) 20:02:46 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x8000000000000) 20:02:46 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xf8f73f00, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:46 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xb000000) 20:02:46 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x400000000000000) 20:02:46 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xffffff8b) [ 687.593789][T14448] EXT4-fs error: 4 callbacks suppressed [ 687.593803][T14448] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:02:46 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x1b, &(0x7f0000000140)=0x8, 0x4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x4000, 0x0) write$binfmt_elf64(r3, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x3a9) preadv(r2, &(0x7f0000000280), 0x0, 0xd9f, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r6, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r4, 0x0, r6, 0x0, 0xffffffff, 0x0) renameat2(r0, &(0x7f0000000040)='./file0\x00', r4, &(0x7f0000000080)='./file0\x00', 0x4) connect$inet(r5, &(0x7f00000005c0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) statfs(&(0x7f0000000600)='./file0\x00', &(0x7f0000001580)=""/4096) 20:02:46 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x500000000000000) 20:02:46 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xe0ffff00000000) 20:02:46 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xc000000) 20:02:46 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xffffff8c) [ 687.639464][T14448] EXT4-fs: 4 callbacks suppressed [ 687.639479][T14448] EXT4-fs (sda1): Remounting filesystem read-only 20:02:46 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xffffffe4) [ 687.736547][T14464] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:02:46 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:46 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xfffffff6) [ 687.779313][T14464] EXT4-fs (sda1): Remounting filesystem read-only [ 687.846535][T14473] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 687.871367][T14473] EXT4-fs (sda1): Remounting filesystem read-only 20:02:46 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xfffffffb) 20:02:46 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xffefffff, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 687.892240][T14477] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 687.921163][T14477] EXT4-fs (sda1): Remounting filesystem read-only 20:02:46 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xfffffffe) [ 687.993083][T14485] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 688.017235][T14485] EXT4-fs (sda1): Remounting filesystem read-only 20:02:46 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x8000000000000) [ 688.034278][T14488] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 688.059622][T14488] EXT4-fs (sda1): Remounting filesystem read-only [ 689.215730][T14495] cgroup: Unknown subsys name 'perf_event' [ 689.222896][T14495] cgroup: Unknown subsys name 'net_cls' [ 689.485958][T14574] cgroup: Unknown subsys name 'perf_event' [ 689.496429][T14574] cgroup: Unknown subsys name 'net_cls' [ 689.653004][T14626] cgroup: Unknown subsys name 'perf_event' [ 689.657330][T14624] cgroup: Unknown subsys name 'perf_event' [ 689.659389][T14626] cgroup: Unknown subsys name 'net_cls' [ 689.675029][T14624] cgroup: Unknown subsys name 'net_cls' 20:02:51 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x7, &(0x7f0000000600)=[{&(0x7f00000000c0)="ec8a27fa4a8b11d5025e9c4dc747bd9390baa8997e0a3d2957e128e115c8d9d346e3de2532858423be5aaa255b1e3721a250eda7ce6413dc7efed24ff10d9cc69d691b2a68a78515411294f95babcd829732ad634f39a88e01ee62740c4d9e940ab7fba8e6dcc17a08ae6837d5afcfef6fbc3cc8c47060ebadb0c5c68fc3ec5983f99271e8dcc04690d2a995fa131ae59f8cd105c0de4d2a8466777aaa00b81918080f81f09c110fc9ae1f2721a5cfc2c81cf3ed75d44cde3f751b6e3869185fcf9fb0940db23bd21a", 0xc9, 0x20}, {&(0x7f00000001c0)="b10d6c248376a4870fb16b0d436ea8540c95fa36d335c09858ae25ebc3233e2533d2c5f114372688bbed99d38a282428bea6471396a8762423963c19669cac6ed3f49fe743127a52a3eb0358475f298471b3bb82dbe7d5679ecad745441a", 0x5e, 0xcce}, {&(0x7f0000000240)="d594c2c6bc5d1f1a6b8e904b2e5c5a75907612b40b12c15e6efeff8d1f6876fd99d245ebe8b5e9d3c772af0b20cd9e525a17ccff0d35d763bafd3e273f6c6f622859032c305ba84eadafbb93fd1d9fb9bacd235fbff334a8767e488af32be414b8469a1bffd1cf0b941d4dbd9e774fffc5f5a7bfaa14eaf1b98f6f8ca724d9711a809011afde088239dee9326c4dbffc645531b2c5b84c25a149862cf376b6b2278b46c9640c25c6586a2c59", 0xac, 0x4}, {&(0x7f0000000300)="0d0b2a07b9242cf6891b64927456b1588600dde4805ed3f7d5e3660fee423e71960ea0d27e60a5e32d08763818555de35dc70937456e551e406ba3ca96c630e2000c358f92eed5ba3efb005cc21ff4104f4d4ed0ea83dcae4732aa90c4d3350de671d239817b2e550b6f1a9c397d6eb98f7df79ce858b88a116322c7134b601a037f7870916c457ded3478aec6346fe0a6d25319b689ed82c24bfec71a8884783a4ed2ac95f57c13ce707c1b7108abdbc0255c5c50d3df25cea0343d790d14f2679d97037d6ee456f64b9f66b173d2434554b5cb", 0xd4, 0x8}, {&(0x7f0000000400)="d342a8f03060011e9a444afe4f4a1d1afd84c3f4181d0c48b1df968925467383495f48229f61ae0399f7cc18497984b3c5b81beccd8d262433163b15c90899e513b19b77572749c9fad86ed3a843b323db2b5d7ba78af6dd4083126d581e00229df84446cbd2afb467e952db79a2b60f2bd947313e266fb5899c27e80b8d73bc98b47044dfd4738c7404bc48cec37e58324bb26c09970f96fbf727c341ecb3e63ebfcfb987202b2a6570dcf89fce23", 0xaf, 0x4}, {&(0x7f00000004c0)="62a8fde14528c758d50adf4d910bb525c01e33d77d878269f5feaa9caf4a4a35976ded172486c8422bcbf2abe71a60e6d2e6bbcb4fd26d45371732d74c5300da1d876acaf01eef77c3eaf1c0c940d1517b2b1986e4d8c8ab9e7612fb9bab1d60bc", 0x61, 0xa}, {&(0x7f0000000540)="d4b752e753d81141f1285ddf141971589702a6e23d9f327d0e2d1419d6e7f1d3b28baec3ac78a11115eda5aaa1712d72572d312c890606514b34b757061490731f40808e2d6d424203e1cd999a4b95b6d5c5848b0f2fdfd57ac0547f34a801f7b16da61c3e4a50766eaec91e7227f10630ee66c9cbdfb2570cd3d7b41db2298e46758a23031737e2145b9d0bf14a63ebfe931cb3164f2a636fd3c5fb390b71ee733b9ce14fc697f23bebb6ff66c25932ccfe41a25b03749009b6b42cce", 0xbd, 0x9}], 0x20, &(0x7f00000006c0)={[{@min_batch_time={'min_batch_time', 0x3d, 0x3}}, {@auto_da_alloc}, {}, {@acl}], [{@hash}, {@fsname}, {@context={'context', 0x3d, 'user_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '$'}}, {@euid_gt={'euid>', r2}}]}) 20:02:51 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x40000000000000) 20:02:51 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xffffe000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:51 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x600000000000000) 20:02:51 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xd000000) 20:02:51 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xf83f0000000000) 20:02:51 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xe000000) 20:02:51 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x100000000000000) 20:02:51 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x80000000000000) [ 692.978058][T16343] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 693.005141][T16350] loop3: detected capacity change from 0 to 12 [ 693.013426][T16343] EXT4-fs (sda1): Remounting filesystem read-only 20:02:51 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x700000000000000) 20:02:51 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x200000000000000) 20:02:51 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0x5d}, {&(0x7f0000000400)="0a9e886070070a68d14f25cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(r1, 0x0, 0x4dca) r2 = syz_mount_image$nfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x81, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="2551295059506cc069a3372b8483f181afc7aa2c6e193922b7239fbb24fd62c065a724d9ccfad9c9a8aab55c6a71742624110a207290b1", 0x37, 0xffffffffffffe2cb}, {&(0x7f0000000140)="b1a1fc6c4d9ca265bc15a09f68f4aa08767fcf979a5ad17df6f93cc143da505b8ebc8c54d2ae8ddbe32c3c797f0289530b73d55aa7c83bedb1db275ddeb5cd95c20420a2546bca960f5d2ed8b54b63b7458465608ed2fb1b63be8d99", 0x5c, 0x800}], 0x308020, &(0x7f0000000200)={[{'.-\'@@.*^'}, {'(['}, {'-^'}, {'[[\x1f\\\\-@}(\x7f'}], [{@measure}, {@pcr={'pcr', 0x3d, 0x1a}}, {@uid_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x62, 0x38, 0x62, 0x62, 0x31, 0x37], 0x2d, [0x30, 0x34, 0x30, 0x35], 0x2d, [0x65, 0x30, 0x61, 0x30], 0x2d, [0x66, 0x31, 0x32, 0x66], 0x2d, [0x37, 0x63, 0x38, 0x36, 0x59b2b544c99e902b, 0x61, 0x37, 0x35]}}}, {@subj_type={'subj_type', 0x3d, '+&(%$\'$,\\#$![:'}}]}) renameat(r1, &(0x7f0000000040)='./file0\x00', r2, &(0x7f00000002c0)='./file0\x00') mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 693.095282][T16360] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:02:52 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x800000000000000) 20:02:52 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x300000000000000) [ 693.157751][T16360] EXT4-fs (sda1): Remounting filesystem read-only 20:02:52 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 693.210470][T16371] loop3: detected capacity change from 0 to 16354 20:02:52 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x900000000000000) 20:02:52 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x400000000000000) [ 693.304563][T16371] loop3: detected capacity change from 0 to 16354 [ 693.309796][T16388] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:02:52 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f00001b5000/0x1000)=nil, 0x1000, 0x3000009, 0x2010, r0, 0xc5510000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) [ 693.363813][T16388] EXT4-fs (sda1): Remounting filesystem read-only [ 693.438305][T16401] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 693.464370][T16401] EXT4-fs (sda1): Remounting filesystem read-only [ 694.658767][T16408] cgroup: Unknown subsys name 'perf_event' [ 694.665062][T16408] cgroup: Unknown subsys name 'net_cls' [ 694.876581][T16443] cgroup: Unknown subsys name 'perf_event' [ 694.883064][T16443] cgroup: Unknown subsys name 'net_cls' [ 694.894987][T16447] cgroup: Unknown subsys name 'perf_event' [ 694.901485][T16447] cgroup: Unknown subsys name 'net_cls' 20:02:55 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x10000000) 20:02:55 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xa00000000000000) 20:02:56 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xc0000000000000) 20:02:56 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x500000000000000) 20:02:56 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:56 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) vmsplice(r1, &(0x7f0000001480)=[{&(0x7f0000002580)="9a5ec894cb0410dc9ced8f59677788572ae7acc36a01d1a68b3475e7a1fb2a50a3e955a793ca0b32139058bb28e9982861908807d4a5f9e5544708fa1626e5b30fa1076827981c6ce7ef01302a6ae155f4f9749f32d81a872931679c0c1fd160fef3eac95d9918238a2ef497cc9d5fb9eb124a158e5523a101492c8903c7b680ca15b7cb4c4a96069119730d3d43bbb38de194a5b18b490118adbdf39ba4dfb553dabdbcedb642722bbd8d4a0e12982e11716d5e579651b0ecb48a8a1888cef6b710753be26ab1", 0xc7}, {&(0x7f0000002680)="7244fe3ba12fd398ccdd3894a67ebe5105a5c39731e6a5edb8d7f36992a7c1ee3bbe6f4f581e191cff17145b770b1b0118d75377f674a99fd618fb44dc2c2ada7753b84c94fb03d4bd8a28bdf746908f3e77ae69c124da0cce1c59408c1261543a3b9a2d1d9a8f5b1e8b48eccef37822a4d09f97ac059f743d95230d7c4b22ed5e317165d72cdb78a71a133af67d53b9ab8077cee4b6687999bce2d12c36c4ead3c53f", 0xa3}, {&(0x7f0000002740)="9bf8a9899da2a0af6c8842b8148fc57bffa11a2307d0bf63e841848d2664e9581e01a16b6fa12913593fadf23c1994c993c1b65cc83bac814bdeaa0199e2d54129a6c1f3831d795c41c486f76ac09bb576", 0x51}], 0x3, 0x8) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000180)=0x1, 0x4) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r1, 0x0, r3, 0x0, 0xffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r5, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r4, 0x0, r5, 0x0, 0xffffffff, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f0000002880)="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") recvmsg(r1, &(0x7f00000014c0)={&(0x7f0000000040)=@phonet, 0x80, &(0x7f0000001400)=[{&(0x7f00000000c0)=""/184, 0xb8}, {&(0x7f0000000180)=""/103, 0x67}, {&(0x7f0000000200)=""/242, 0xf2}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/233, 0xe9}], 0x5, &(0x7f0000001480)}, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet(r2, &(0x7f00000027c0)="bc93ecbeacf3abacbbf706728f903c6da71bc91e39ba686ef107bd90e29dbf3bf99b51174139d028fe8ecd59e248682881bddc1ad598dafc639235d42f996a85b6d3cbe82ae92fc9a3b79a1f1698787379da9225ee846b817e69fed7026d8486f6c2948e58445a4f9e5b0f6a4d78ee45efb21666109bc980628c36793ea0412c728aa30c731f2316926ae31213f700250e9e153d03bdb477b86a3ad175c06ac95d3af1a03d53a9d5b440c4446aa1adb8270c87a8eec801b513aaf03c9bb30c18", 0xc0, 0x20048004, &(0x7f0000001500)={0x2, 0x4e22, @rand_addr=0x64010102}, 0x10) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:02:56 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xb00000000000000) 20:02:56 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x11000000) 20:02:56 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xc00000000000000) 20:02:56 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x12000000) 20:02:56 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x100000000000000) 20:02:56 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x600000000000000) [ 697.242766][T17799] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 697.256572][T17799] EXT4-fs (sda1): Remounting filesystem read-only [ 697.301000][T17807] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 697.313838][T17807] EXT4-fs (sda1): Remounting filesystem read-only 20:02:56 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x700000000000000) 20:02:56 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xd00000000000000) 20:02:56 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:56 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xe00000000000000) [ 697.431514][T17826] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 697.466066][T17826] EXT4-fs (sda1): Remounting filesystem read-only 20:02:56 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x800000000000000) [ 697.494278][T17836] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 697.520634][T17836] EXT4-fs (sda1): Remounting filesystem read-only 20:02:57 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x5, 0xffffffffffffff3a, 0x0, 0x4000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x10001) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:02:57 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x1000000000000000) 20:02:57 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:57 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x900000000000000) [ 698.210319][T17855] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 698.235364][T17855] EXT4-fs (sda1): Remounting filesystem read-only [ 698.267905][T17866] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 698.280291][T17866] EXT4-fs (sda1): Remounting filesystem read-only [ 698.808837][T17871] cgroup: Unknown subsys name 'perf_event' [ 698.814995][T17871] cgroup: Unknown subsys name 'net_cls' [ 699.022254][T17941] cgroup: Unknown subsys name 'perf_event' [ 699.028455][T17941] cgroup: Unknown subsys name 'net_cls' 20:02:59 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x20000000) 20:02:59 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xa00000000000000) 20:02:59 executing program 3: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x40000, 0x14) renameat2(r0, &(0x7f0000000140)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x7) syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x2005, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) mkdirat(r1, &(0x7f0000000000)='.\x00', 0x110) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003780)=[{{&(0x7f00000003c0)=@isdn, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000440)=""/50, 0x32}, {&(0x7f0000000480)=""/103, 0x67}, {&(0x7f0000000500)=""/53, 0x35}, {&(0x7f0000000540)=""/158, 0x9e}, {&(0x7f0000000600)=""/37, 0x25}, {&(0x7f0000000640)=""/102, 0x66}], 0x6}, 0x3}, {{&(0x7f0000000740)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000900)=[{&(0x7f00000007c0)=""/111, 0x6f}, {&(0x7f0000000840)=""/184, 0xb8}], 0x2, &(0x7f0000000940)=""/5, 0x5}, 0x7fffffff}, {{&(0x7f0000000980)=@pptp, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000000a00)=""/251, 0xfb}, {&(0x7f0000000b00)=""/151, 0x97}, {&(0x7f0000000bc0)=""/192, 0xc0}, {&(0x7f0000000c80)=""/29, 0x1d}], 0x4}, 0x80}, {{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000d00)=""/201, 0xc9}, {&(0x7f0000000e00)=""/52, 0x34}, {&(0x7f0000000e40)=""/203, 0xcb}, {&(0x7f0000000f40)=""/139, 0x8b}, {&(0x7f0000001000)=""/65, 0x41}, {&(0x7f0000001080)=""/188, 0xbc}, {&(0x7f0000001140)=""/178, 0xb2}, {&(0x7f0000001200)=""/114, 0x72}], 0x8}, 0x2000000}, {{&(0x7f0000001300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000002700)=[{&(0x7f0000001380)=""/87, 0x57}, {&(0x7f0000001400)=""/185, 0xb9}, {&(0x7f0000002580)=""/240, 0xf0}, {&(0x7f00000014c0)=""/41, 0x29}, {&(0x7f0000001500)}, {&(0x7f0000002680)=""/90, 0x5a}], 0x6, &(0x7f0000002780)=""/4096, 0x1000}, 0x10001}], 0x5, 0x40000140, &(0x7f00000038c0)={0x77359400}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in6=@mcast1, @in6=@private1, 0x4e24, 0x1, 0x4e22, 0x4, 0xa, 0x20, 0x60, 0x2e, r3, 0xee01}, {0x100000001, 0x9, 0x5, 0x1, 0x3, 0x5, 0xf85, 0x8}, {0x7, 0x8be4, 0xffffffffffff0000, 0x7ff}, 0x80000001, 0x6e6bb8, 0x1, 0x1, 0x0, 0x2}, {{@in=@multicast1, 0x4d6, 0x32}, 0xa, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x3504, 0x0, 0x2, 0xff, 0x200000, 0x8000, 0x64}}, 0xe8) r4 = geteuid() setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000200)={{{@in=@private=0xa010100, @in=@private=0xa010102, 0x4e23, 0x52, 0x4e22, 0x0, 0x2, 0x0, 0x0, 0x87, 0x0, r4}, {0x26d800000000, 0x0, 0xa35, 0x100000001, 0xfffffffffffffff9, 0x1d00000000000000, 0x2, 0x7fff}, {0x5, 0xffffffff00000001, 0x5, 0x1ffc0000}, 0x1240, 0x6e6bb8, 0x0, 0x0, 0x0, 0x3}, {{@in=@empty, 0x4d6, 0xff}, 0x2, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x1, 0x8}}, 0xe8) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x30) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x400800, 0x0) openat(r6, &(0x7f0000000380)='./file0\x00', 0x141100, 0x80) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:02:59 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x1100000000000000) 20:02:59 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:02:59 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x200000000000000) 20:02:59 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x1200000000000000) 20:02:59 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xb00000000000000) 20:02:59 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x300000000000000) [ 700.548119][T18791] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 700.580713][T18791] EXT4-fs (sda1): Remounting filesystem read-only 20:02:59 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x1f1d000000000000) 20:02:59 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x25000000) [ 700.595582][T18795] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value [ 700.612074][T18804] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:02:59 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xc00000000000000) 20:02:59 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x3f000000) 20:02:59 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x2000000000000000) [ 700.670132][T18804] EXT4-fs (sda1): Remounting filesystem read-only 20:03:00 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) newfstatat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x2, 0x2, &(0x7f00000001c0)=[{&(0x7f00000000c0), 0x0, 0x6}, {&(0x7f0000000100)="5fe7b92d686136d889f116d97b782d6e88612d78e70a38c67b71bcfdb3f344e12280eed5edf2ae9e9c48353aec46c4ab77dff00bacbc06e52a61c21f4aa00b4d28335265183a3462a5b656fe28c87fefc04503dd3d0e6dc5b3a49eb3ebba7725408becdb0a7130abf4122cba99e050eb0681ec5e58290b8a6286a5ae38c70f49ae1bdcc8d6b1addfe9b5431c5a9e33196d3551cdfc5c84f400e403b73cb30a5e5e7693a2871c98dcce76fdbe9e7a81b21a", 0xb1, 0xd33}], 0x112041, &(0x7f0000000400)={[{@uid={'uid', 0x3d, r0}}], [{@subj_role={'subj_role', 0x3d, '\xfe'}}, {@dont_hash}, {@uid_lt={'uid<', r1}}]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:03:00 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:03:00 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x2500000000000000) 20:03:00 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x3f00000000000000) [ 701.403561][T18831] loop3: detected capacity change from 0 to 13 [ 701.407806][T18834] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 701.422637][T18834] EXT4-fs (sda1): Remounting filesystem read-only [ 701.432341][T18837] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 701.447777][T18837] EXT4-fs (sda1): Remounting filesystem read-only 20:03:00 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:03:00 executing program 3: rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0/../file0\x00') r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x10040, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='xfs\x00', 0x810000, &(0x7f0000000280)='cpu.stat\x00') r2 = socket$inet_tcp(0x2, 0x1, 0x0) writev(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0x5d}, {&(0x7f0000000400)="0a9e886070070a68d14f25cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4dca) openat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000300)={0x400000, 0x180, 0x10}, 0x18) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) r3 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) mmap(&(0x7f00000be000/0x4000)=nil, 0x4000, 0x1800003, 0x80010, r3, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x3, 0x20010, r0, 0x47215000) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000080)) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x843c0, 0x31) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) [ 701.534682][T18848] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 701.572750][T18848] EXT4-fs (sda1): Remounting filesystem read-only [ 701.586298][T18851] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 701.612744][T18851] EXT4-fs (sda1): Remounting filesystem read-only [ 702.088040][T18857] cgroup: Unknown subsys name 'perf_event' [ 702.094423][T18857] cgroup: Unknown subsys name 'net_cls' [ 702.313192][T18920] cgroup: Unknown subsys name 'perf_event' [ 702.319436][T18920] cgroup: Unknown subsys name 'net_cls' [ 702.434177][T18961] cgroup: Unknown subsys name 'perf_event' [ 702.440235][T18961] cgroup: Unknown subsys name 'net_cls' [ 702.893007][T19197] cgroup: Unknown subsys name 'perf_event' [ 702.899670][T19197] cgroup: Unknown subsys name 'net_cls' 20:03:03 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x400000000000000) 20:03:03 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:03:03 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f000016e000/0x3000)=nil, 0x3000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 704.871303][T20384] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 704.894713][T20384] EXT4-fs (sda1): Remounting filesystem read-only [ 704.927817][T20401] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 704.945542][T20401] EXT4-fs (sda1): Remounting filesystem read-only 20:03:04 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xd00000000000000) 20:03:04 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x4, 0x0, 0x0, 0x810084, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:03:04 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x482000000000000) 20:03:04 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8000000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:03:04 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x40000000) 20:03:04 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xe00000000000000) [ 705.481549][T20646] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 705.506494][T20646] EXT4-fs (sda1): Remounting filesystem read-only [ 705.547975][T20655] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 705.588289][T20655] EXT4-fs (sda1): Remounting filesystem read-only 20:03:04 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4000000000000000) 20:03:04 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x48000000) 20:03:04 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xe0ffff00000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 705.963224][T20717] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 705.986975][T20717] EXT4-fs (sda1): Remounting filesystem read-only 20:03:04 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4800000000000000) [ 706.009647][T20720] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:03:04 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xf83f0000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:03:04 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4c00000000000000) [ 706.060377][T20720] EXT4-fs (sda1): Remounting filesystem read-only 20:03:05 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6000000000000000) [ 706.154048][T20733] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 706.188248][T20733] EXT4-fs (sda1): Remounting filesystem read-only [ 706.196192][T20739] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 706.209915][T20739] EXT4-fs (sda1): Remounting filesystem read-only [ 706.853401][T20746] cgroup: Unknown subsys name 'perf_event' [ 706.860691][T20746] cgroup: Unknown subsys name 'net_cls' [ 707.244195][T20879] cgroup: Unknown subsys name 'perf_event' [ 707.250386][T20879] cgroup: Unknown subsys name 'net_cls' [ 707.358728][T20918] cgroup: Unknown subsys name 'perf_event' [ 707.368353][T20918] cgroup: Unknown subsys name 'net_cls' [ 707.520594][T20975] cgroup: Unknown subsys name 'perf_event' [ 707.526777][T20975] cgroup: Unknown subsys name 'net_cls' 20:03:08 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6800000000000000) 20:03:09 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x600000000000000) 20:03:09 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) poll(&(0x7f0000000080)=[{r0, 0x4210}, {0xffffffffffffffff, 0x10748}], 0x2, 0xff0) syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:03:09 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:03:09 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6c00000000000000) 20:03:09 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x1000000000000000) [ 710.216792][T22560] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 710.254266][T22560] EXT4-fs (sda1): Remounting filesystem read-only [ 710.286935][T22578] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 710.301755][T22578] EXT4-fs (sda1): Remounting filesystem read-only 20:03:09 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4c000000) 20:03:09 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xc00000000000000) 20:03:09 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x7400000000000000) 20:03:09 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x1100000000000000) 20:03:09 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:03:09 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xd00000000000000) 20:03:09 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x7a00000000000000) [ 710.455134][T22609] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:03:09 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x60000000) [ 710.498378][T22609] EXT4-fs (sda1): Remounting filesystem read-only [ 710.526311][T22619] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 710.557913][T22619] EXT4-fs (sda1): Remounting filesystem read-only 20:03:09 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000001480)=[{&(0x7f0000000040)=""/188, 0xbc}, {&(0x7f00000002c0)=""/132, 0x84}, {&(0x7f0000000180)=""/9, 0x9}, {&(0x7f0000003640)=""/208, 0xd0}, {&(0x7f0000003580)=""/185, 0xb9}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/243, 0xf3}, {&(0x7f0000002580)=""/4096, 0x1000}], 0x8, 0xd9f, 0x0) preadv(r0, &(0x7f0000003980)=[{&(0x7f0000000100)=""/84, 0x54}, {&(0x7f00000001c0)=""/183, 0xb7}, {&(0x7f0000000280)}, {&(0x7f0000003740)=""/190, 0xbe}, {&(0x7f0000003800)=""/113, 0x71}, {&(0x7f0000003880)=""/107, 0x6b}, {&(0x7f0000003900)=""/103, 0x67}], 0x7, 0xff, 0x5) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:03:09 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x1000000000000000) 20:03:09 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x8cffffff00000000) 20:03:09 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:03:09 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xf6ffffff00000000) [ 711.096835][T22634] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 711.115513][T22634] EXT4-fs (sda1): Remounting filesystem read-only 20:03:10 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x1200000000000000) 20:03:10 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 711.144295][T22640] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 711.167319][T22640] EXT4-fs (sda1): Remounting filesystem read-only [ 711.254448][T22649] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 711.282755][T22649] EXT4-fs (sda1): Remounting filesystem read-only [ 711.298691][T22651] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 711.321920][T22651] EXT4-fs (sda1): Remounting filesystem read-only [ 711.838173][T22655] cgroup: Unknown subsys name 'perf_event' [ 711.844574][T22655] cgroup: Unknown subsys name 'net_cls' [ 712.046044][T22725] cgroup: Unknown subsys name 'perf_event' [ 712.052347][T22725] cgroup: Unknown subsys name 'net_cls' [ 712.693960][T23080] cgroup: Unknown subsys name 'perf_event' [ 712.699988][T23080] cgroup: Unknown subsys name 'net_cls' 20:03:12 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x1200000000000000) 20:03:12 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x1800000000000000) 20:03:12 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:03:12 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, &(0x7f0000000040)) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) r1 = syz_open_dev$vcsn(&(0x7f0000000080), 0x7, 0x280300) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0xbc, r2, 0x300, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x34, 0x1}}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'lblc\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xf8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, '\x00', 0x12}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0xbc}, 0x1, 0x0, 0x0, 0x81}, 0x8000) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x410}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa4, r2, 0x200, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x17}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@private2={0xfc, 0x2, '\x00', 0x1}}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2e}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x64010101}, @IPVS_SVC_ATTR_PE_NAME={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={'\x00', '\xff\xff', @remote}}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x20}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x40}, 0x4000001) [ 713.865104][T23779] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 713.912827][T23779] EXT4-fs (sda1): Remounting filesystem read-only [ 713.930194][T23802] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 713.941824][T23802] EXT4-fs (sda1): Remounting filesystem read-only 20:03:13 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x68000000) 20:03:13 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x2000000000000000) 20:03:13 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x2000000000000000) 20:03:13 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x4, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:03:13 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:03:13 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xf8f73f0000000000) 20:03:13 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x3f00000000000000) 20:03:13 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x2500000000000000) 20:03:13 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6c000000) 20:03:13 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/14, 0xe}, {&(0x7f0000000180)=""/91, 0x5b}], 0x2, 0xd9f, 0x80000) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x88801, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:03:13 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:03:13 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x3f00000000000000) 20:03:13 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x4000080000000000) 20:03:13 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xfeffffff00000000) 20:03:13 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x7, 0x3, &(0x7f0000000240)=[{&(0x7f00000000c0)="05cf1b27e0f6740e061bb4480fb500a47cb8e2b3aaf2b62ffc3ee272d04f238b70", 0x21, 0x2}, {&(0x7f0000000100)="2886ef7ba9478f736b138f8a85238dc93b4f40b522166b10d9403aa8a4176831ba0796f665b08e9ce8de40232b7f67d4f2ec5f69072d3a28ebbe100665eb84ddf9dcad54bd6710b317104372c2f197fbb151b66fe0ccdd03a8445c20c9a43d755b280aa72eda125a8e03bb2ae57006dfdc42bda5d20536bbb92d53389f659bc74fd6173b148dfe40fc", 0x89, 0x1}, {&(0x7f00000001c0)="5f3283268b906a6fbcdf24297fcf22100216fa2f8db12f38ef4edb97ee3ebf2b575d8bfe4526ddce981761e1883c69849ddf149be86c3997eda519f240df759150d46159039227e32bf2b4", 0x4b, 0x7}], 0x8, &(0x7f00000002c0)={[{@fat=@quiet}, {@nodots}, {@dots}], [{@fowner_eq={'fowner', 0x3d, r1}}, {@obj_type={'obj_type', 0x3d, '-]!\\'}}]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:03:13 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x74000000) 20:03:13 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4000000000000000) 20:03:13 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:03:13 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x8102000000000000) 20:03:13 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x7a000000) 20:03:13 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xffefffff00000000) 20:03:13 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4800000000000000) 20:03:13 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 714.734262][T24113] FAT-fs (loop3): Unrecognized mount option "fowner=00000000000005590783" or missing value 20:03:13 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r0, 0x0, r1, 0x0, 0xffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r2, 0x0, r3, 0x0, 0xffffffff, 0x0) renameat2(r0, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000080)='./file0\x00', 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @private=0xa010100}, 0x10) 20:03:13 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x8cffffff) 20:03:13 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xffffff7f00000000) 20:03:13 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x8bffffff00000000) 20:03:13 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4c00000000000000) 20:03:13 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:03:13 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xf6ffffff) 20:03:13 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xffffffff00000000) 20:03:13 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:03:13 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x8cffffff00000000) 20:03:13 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6000000000000000) 20:03:13 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xf8f73f00) 20:03:14 executing program 3: r0 = msgget$private(0x0, 0x4) msgrcv(r0, &(0x7f0000000040), 0x8, 0x1, 0x1000) syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = msgget$private(0x0, 0x0) msgsnd(r2, &(0x7f0000000180)={0x2}, 0x8, 0x0) msgsnd(r2, &(0x7f0000000140)={0x1, "7ce5c1fa324387316e2436a730e8cdb8ec12c6ad53e777c2fdb36cc63fd1217a19f3444d1643b55671b1418eb491c5ffb8315a9234afe12eb07fd14de6dd56cedca1d969f761c1b0d44c00b6ab409ce754de1378549dabc4b0b5dc21301423b1569006c78bcc1f"}, 0x6f, 0x800) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = syz_open_dev$rtc(&(0x7f0000000080), 0x4ed8, 0x0) splice(r3, &(0x7f00000000c0), r1, &(0x7f0000000100)=0x9c, 0x7f, 0xa) r4 = msgget$private(0x0, 0x0) msgsnd(r4, &(0x7f0000000180)={0x2}, 0x8, 0x0) msgrcv(r4, &(0x7f00000001c0)={0x0, ""/193}, 0xc9, 0x1, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/4096) 20:03:14 executing program 2: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x40a00, 0x82) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r2, 0x0, r3, 0x0, 0xffffffff, 0x0) ioctl$FS_IOC_GETFSLABEL(r3, 0x81009431, &(0x7f0000000140)) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) 20:03:14 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6800000000000000) 20:03:14 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xc00000000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:03:14 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xcc26000000000000) 20:03:14 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xfeffffff) 20:03:14 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x6c00000000000000) 20:03:14 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xffefffff) [ 715.759265][T24204] EXT4-fs error: 12 callbacks suppressed [ 715.759328][T24204] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 715.778738][T24204] EXT4-fs: 12 callbacks suppressed [ 715.778752][T24204] EXT4-fs (sda1): Remounting filesystem read-only [ 715.799577][T24213] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:03:14 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xe4ffffff00000000) 20:03:14 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x721e000000000000) 20:03:14 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xd00000000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:03:14 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xf6ffffff00000000) [ 715.818126][T24213] EXT4-fs (sda1): Remounting filesystem read-only [ 715.827221][T24216] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.2: Abort forced by user [ 715.847443][T24216] EXT4-fs (sda1): Remounting filesystem read-only 20:03:15 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) 20:03:15 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xffffefff) 20:03:15 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x731e000000000000) 20:03:15 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xfbffffff00000000) 20:03:15 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0xfffffffffffffffc, 0x0, 0x0, 0xb07400, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x503080, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) move_mount(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00', 0x1) [ 716.580618][T24202] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.2: Abort forced by user [ 716.592424][T24202] EXT4-fs (sda1): Remounting filesystem read-only 20:03:15 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x7400000000000000) 20:03:15 executing program 2: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file1\x00', 0x0, 0x0, 0x0, 0x1400044, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) inotify_add_watch(r1, &(0x7f0000000740)='./file0\x00', 0x40000880) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) mmap(&(0x7f00002e4000/0x2000)=nil, 0x2000, 0x2000003, 0x4080012, r2, 0x48f98000) chmod(&(0x7f0000001940)='./file2\x00', 0x66b51401abb60f6) creat(&(0x7f0000001980)='./file1\x00', 0xd7) preadv(r1, &(0x7f0000000640)=[{&(0x7f0000000040)=""/26, 0x1a}, {&(0x7f0000000140)=""/110, 0x6e}, {&(0x7f00000001c0)=""/142, 0x8e}, {&(0x7f0000000280)=""/182, 0xb6}, {&(0x7f0000000340)=""/208, 0xd0}, {&(0x7f0000000080)=""/29, 0x1d}, {&(0x7f0000000440)=""/26, 0x1a}, {&(0x7f0000000480)=""/81, 0x51}, {&(0x7f0000000500)=""/223, 0xdf}, {&(0x7f0000000600)=""/53, 0x35}], 0xa, 0xd9f, 0x7fffffff) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) write$binfmt_elf64(r1, &(0x7f0000001b40)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7, 0x9, 0x5, 0xb183, 0x2, 0x3, 0xed4, 0x16, 0x40, 0x7a, 0x2, 0x2, 0x38, 0x1, 0x6, 0x9e, 0x3ff}, [{0x60000000, 0x8, 0x690, 0x7, 0x0, 0x7, 0x5, 0x20}], "0ec9116d9517810c579c3104b999fd72c84af00289d94a1c4aca12f0056545742da3a210b4e865ce78b9b8684ac5f5f29e7e9815", ['\x00', '\x00', '\x00']}, 0x3ac) syz_mount_image$tmpfs(&(0x7f0000000780), &(0x7f00000007c0)='./file0\x00', 0x72d8, 0x4, &(0x7f00000018c0)=[{&(0x7f0000000800)="45ac8f47230b6104a5650f0ee5a72d17ff69224576eec48ba22aaf61983767e9168578c3209a3a7c5efd1c", 0x2b, 0xea}, {&(0x7f0000000840)="c5e550", 0x3, 0x1ff}, {&(0x7f0000000880)="f387ec3809e10d379c97ea1cf77d8df9913ed58f7250001f4b9d001fd8b0bcbcf46e3ec1fb9c1f0192", 0x29, 0x1}, {&(0x7f00000008c0)="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", 0x1000, 0x7fff}], 0x820015, &(0x7f0000001a40)=ANY=[]) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001a80), 0x40, 0x0) openat$cgroup_procs(r3, &(0x7f0000001ac0)='cgroup.threads\x00', 0x2, 0x0) open(&(0x7f0000001a00)='./file0\x00', 0x8000, 0x100) move_mount(r0, &(0x7f00000019c0)='./file1\x00', 0xffffffffffffffff, &(0x7f0000001a40)='./file2\x00', 0x4) 20:03:15 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xfeffffff00000000) 20:03:15 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xffffff7f) 20:03:15 executing program 3: syz_open_dev$loop(&(0x7f0000002dc0), 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000000)="0fd8e88691c612422a2416cc30f1a56412d2142e9aa2efa51d9e57307bbac4da278e08b2c94acf6d9ef04fd22da0fc63b417a4cd3b23ce5eafcccb4f26b0e12a45f7a5dd407feb68b7d60971fc7f474c703f0b3cff15ae5d9f73cdaffcb0cd97678711d1c5b84312d91c68f80e0166f10400d152bce547c3bed93ec98eb864117d3d31d8f732f7d43239d178b49491f0813509c96534c1b30808debb", 0x9c}, {&(0x7f00000000c0)="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", 0xfec}, {&(0x7f00000010c0)="b11097bbcaad0b46c10e7fa884e3c2adab5bfdfd7981ed9fb76da97bb0d687d214e4b496ac2b39f89d7d2c975f5186367200b603b1f5fc8f08e09b7141cbfc0af2acbe56ba247709", 0x48}, {&(0x7f0000001140)}, {&(0x7f0000001180)="1604ca338f9941a4d238c1ce3a64a1c41dee21a58e84704d32e66a8654494cf73b2333390dfca9afbed8fe688a7b71cef76e3b636deeef1ec22d79931c2f44b59f433fc76dc1fbcb20220f0e89b9d36f2877949792f9f9c69e943d667ba673f9cb34d52fdd64bdbc519567b6f2f9dba68862673b5f2c652b5ac61abddc951d742c2db080484177ac0b426d3fc1dec9da4d07747a0ca2aee4d2f18421cd4faa5229ea630a3f790720a924dcfdf9dbf426f6bef0f87754d41bdeac5ec5a3eb3859398040fe5bd7faa904516833ca17d62b", 0xd0}, {&(0x7f0000001280)="ca8f36b07746493cd41e62692fb3351a0d5cfcf62b3a0d9834e026616797214c", 0x20}, {&(0x7f0000001380)}, {0x0}, {0x0}], 0x9}, 0x40800) [ 716.744949][T24263] ================================================================== [ 716.746232][T24267] loop2: detected capacity change from 0 to 127 [ 716.753153][T24263] BUG: KCSAN: data-race in copy_process / get_task_exe_file [ 716.753176][T24263] [ 716.753181][T24263] write to 0xffff888107ac106c of 4 bytes by task 24261 on cpu 0: [ 716.777507][T24263] copy_process+0x608/0x2e00 [ 716.782210][T24263] kernel_clone+0x14b/0x680 [ 716.786801][T24263] __x64_sys_clone+0xb4/0xe0 [ 716.791556][T24263] do_syscall_64+0x4a/0x90 [ 716.796081][T24263] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 716.802175][T24263] [ 716.804480][T24263] read to 0xffff888107ac106c of 4 bytes by task 24263 on cpu 1: [ 716.812355][T24263] get_task_exe_file+0x44/0x140 [ 716.817599][T24263] proc_exe_link+0x44/0x100 [ 716.822090][T24263] proc_pid_get_link+0x50/0xb0 [ 716.827247][T24263] step_into+0x974/0xec0 [ 716.831618][T24263] path_openat+0xfc8/0x20b0 [ 716.836101][T24263] do_filp_open+0xd9/0x1f0 [ 716.840511][T24263] do_sys_openat2+0xa3/0x250 [ 716.845190][T24263] __x64_sys_openat+0xef/0x110 [ 716.849959][T24263] do_syscall_64+0x4a/0x90 [ 716.854377][T24263] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 716.860255][T24263] [ 716.862560][T24263] Reported by Kernel Concurrency Sanitizer on: [ 716.869034][T24263] CPU: 1 PID: 24263 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 716.877776][T24263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.887830][T24263] ================================================================== [ 716.932985][T24276] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.2: Abort forced by user [ 716.944634][T24276] EXT4-fs (sda1): Remounting filesystem read-only [ 716.951435][T24276] loop2: detected capacity change from 0 to 127 [ 717.226284][T24288] cgroup: Unknown subsys name 'perf_event' [ 717.232488][T24288] cgroup: Unknown subsys name 'net_cls' 20:03:17 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xe00000000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:03:17 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x7a00000000000000) 20:03:17 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xffffff8c) 20:03:17 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(r0, 0x29, 0x3d, &(0x7f0000000040)=""/149, &(0x7f0000000100)=0x95) 20:03:17 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xff01000000000000) 20:03:17 executing program 2: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x2a24475, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$FIONCLEX(r0, 0x5450) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x129) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) [ 718.384219][T24743] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 718.396563][T24743] EXT4-fs (sda1): Remounting filesystem read-only [ 718.404170][T24744] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 718.416598][T24744] EXT4-fs (sda1): Remounting filesystem read-only 20:03:17 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xfffffff6) 20:03:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000000)="0fd8e88691c612422a2416cc30f1a56412d2142e9aa2efa51d9e57307bbac4da278e08b2c94acf6d9ef04fd22da0fc63b417a4cd3b23ce5eafcccb4f26b0e12a45f7a5dd407feb68b7d60971fc7f474c703f0b3cff15ae5d9f73cdaffcb0cd97678711d1c5b84312d91c68f80e0166f10400d152bce547c3bed93ec98eb864117d3d31d8f732f7d43239d178b49491f0813509c96534c1b308", 0x99}, {&(0x7f00000000c0)="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", 0x1000}, {&(0x7f00000010c0)="b11097bbcaad0b46c10e7fa884e3c2adab5bfdfd7981ed9fb76da97bb0d687d214e4b496ac2b39f89d7d2c975f5186367200b603b1f5fc8f08e09b7141cbfc0af2acbe56ba2477", 0x47}, {&(0x7f0000001140)="09d3e209cb73442718", 0x9}, {&(0x7f0000001180)="1604ca338f9941a4d238c1ce3a64a1c41dee21a58e84704d32e66a8654494cf73b2333390dfca9afbed8fe688a7b71cef76e3b636deeef1ec22d79931c2f44b59f433fc76dc1fbcb20220f0e89b9d36f2877949792f9f9c69e943d667ba673f9cb34d52fdd64bdbc5195", 0x6a}, {&(0x7f0000001280)="ca8f36b07746493cd41e62692fb3351a0d5cfcf62b3a0d9834e026616797214c0fe10d4a7d522903cc911e22fb4e67f429b0be3660711270f6e3aa6a5a76f5bb6c7a3f1a1231c62ddd92c6f822da96f27e17c453245b5b1547dc69356da85235d70eb120486feaae54b50a3dff0c592b410b5cbbc94e70e0ca327758c58841902313c47a434a6762a4e73e318d3ad8f617df86cd1037b6deb91b2def93c6bbbefa580e9ec4cc1dd4c95f5bea0656ec6b1f06f95368e8940e444f1b93aa2ebeefb23c872775c0b232a4fc739306b76b775a1e6ace19056deff080b7e35daafe91cf78891e4c581c280c9b2b55294a779bdeadd15d", 0xf4}, {&(0x7f0000001380)="5c0c1da0d805ab4f319d293e15dd493a06503f72dc0e1ce01042a71ce5c16c5c93862ffa24fa614160ce6a7b9eb01ecf46e03b235ee0190febc64fb6c62d29b1d5e076d3b8a779a1edc72deacdc0c298a769e4616d0c6bf24a745ada8b54fdc238d03f844edcfe0dfb7fa59600dc61e93b80c416372e0b4feec720bbf32a78b52198dc22b56d082fa6115afc6a65cf44f6cefdaae85fc9e6625cd592b4a8eb2c809309e4bf", 0xa5}, {&(0x7f0000001480)="5b1c900a25ffb03116", 0x9}, {&(0x7f00000014c0)}], 0x9}, 0x40800) 20:03:17 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xff0f000000000000) 20:03:17 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x8cffffff00000000) [ 718.477179][T24757] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.2: Abort forced by user [ 718.500669][T24757] EXT4-fs (sda1): Remounting filesystem read-only [ 718.542007][T24758] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 718.565976][T24758] EXT4-fs (sda1): Remounting filesystem read-only 20:03:17 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) writev(r0, &(0x7f0000001300)=[{&(0x7f0000000140)="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", 0xfe}, {&(0x7f0000000240)="344f5fb042dd923fda59ce36b305b563e8cc414fcbb1d73423d5772841358467e384dc53ab7728441d880654464a8094237d259365140b6943a9391a0d5a721b65743985bd8c41bee133cbbaea67b87e9459aa7cea3c5c9cdbe55557018fecb92c83febff052886a9ee2ac11afa81f0ac65aa0575ce4f05bec3f39912deb4a73dd4be98117de791ee5f75836cda52aec691ead6df76d95a55524d6827bed9565920f24159cb1a52312141e3420b69c6e3cbf2a216c783a7511ab2391f33501cb4467b6542136ffb9d7446870dc6477a314098507f6b608802e1cf0f4b7fba9f64d187613c502da680e21355b0bafe28d2a3ad380559c97e503b5d9c4f29b41556ea34d1501dd8c0f89d67b2815aa771065ed76679e8fabd466dc65e578a506bc86b0a9270af7cff1cda7e68a34ab3432d748389904828db9807734e7d82eedd21347b3d511cbf043f2575827c003914fb2cbc6138e231d7f424cd4e06be80a10923f824b9f35fa639a4b6d2291a37e7ef701976171ddce489d43556d469c48c136f14a2422863497563d99074c24f3f3071388c5f510b2a9c146837698c5676ac536688c273c2b7ed24c38d68393cda067b0e232264d512504d6d7dc1dfa874a524a8091e273d0b7bb2fd3108a2978a39353afb1303da7ff90299bc6faa686590bbb055093b8022a44843e3154564f07456844782d3aff2a27278894bd2cd5b434b4cd7d4167a60fbe5f526fdbce2e8fe9dd3c5295d26e7a94ae202f865c86d141c4bb5974ecad43f4ff12b590ad1863bbde0f8c7d851745e9fa4f544480f1ff8ab256f4bd5b6a312fffc3583f29db3f58a035fcf225484c87d30837192093c69f117b09f12063f8d9118387e5204cf3ddd48f4efc76691e381174af57150a6202d35443d89a21ecd1a4989cb7c7316b3e5b84b0392eef77409057a661bf3f58684099455237cf93dd8c006edd5144fcc46fb252c983d8076327a43a666f4cfa24666fd285aeb8ef07b1e887843d044da5f2a1dd76d3cfbcf7f5c101fbd59c56ee7cd4c78faa5c8df6e860696b2593ef78b828fcbd295e574e1b07ba1ee9bbe2166a7de129d35d123e465ba84a5a9a12745ed63af67bddb8bbe1f046a5dd9a72f79f315e88948b45bffc1ffc93fdff9bdbc6cbb10f7c6cdc5fe4f4c9b13aa4667b32f1d58f58ed25661e555b04270e1c3a5d33ac9154416de609c4b6f4817e49e2a5b537d97f35d22202fb1ee29031f9b315791a989cf5c9d53ef6fb2decddd2a486fc9945cc6737c61e9ca85b8b48e1aa3b6d59c56654a264068b70caa59945b2f231967b2971e2cf98b718a9f30ff1242f5427686fb611e0b16c6c56e862d63b46bb5187c3e67352d14935dde4ed43fbbbc7e1af54f755335d1e2f24ccfe3b3eef17c463aa6a26f990fc0e25efc9a36a7642cad741531dd47a5ef92fd38f5826e0445038e8a730a486f28a4dec8a2392f99ca42e7bf862e8162278a2d1a4ed5cf5f0b8aec63399e78ff17b6f1d802dc6a750629c30941b6f5bc319a31a570a56e0175f6a12a7b1609d15481f0042eacec0aa1e0f8f82154ceeb21387d9dc42d008db74133864ffcd39799f84231168261ff84b0948fac9804232827b696272bd6e6fed0645e0e9c8e7f487a9464f98b0b413791e5c1151311572e0294c8bd294012f2ab5309883a2275fcb99a6e4f2e5e8ee23bcc475f8b5d8d0d0383db9af02a0384548cc6790226339518da2db3fabca95b7c7f1e21e84c780a14be846f0174fffa07bd140c9faccf9d6f656373c97c39f50f35221abb651375ecd644831e403bc9402a6d530aad5e83b4a73cf53c7d8320dd311f00b5848c159f99ae6ae8902cb2253e76a0013d19da7b5a71f49dffed2668c7d832a8ea890ed500b746eaa9b6ee00df9be8a03d0c42f3e360acfc27fddd489c86af5cd68583432dbe259544ba1d4f16da1c05ba897fd6d22eb51a1a642d2f0f0f020e1bd7f1e7c1e960807587d81e0958db9c69f3fc6807a043d3989207e6a73213fcebdb0a5c14eaccbcaa289a3d20c827770877076083868c62fc8adc17ff69e7e8d66dd544c18efc7989b1fc8a3f19697fbb1f6b36169366dc57cbad0e23d953cce185e673d6a7580c6a763da832f29a83d2070db2d93caf12b85a9c407cf74a4cf853cc47c909bea2fc85a1b796535f1436d6ae151dd566c61392a2503b9b8b5e216413f23ad4a0b9a822abad1ba8443dca27e9f3ee6dee16a51e37b764b3c9e5d3200c273b3e25e39f7c33510f6a37dbb8bb6b5dc1aafdee4ec6545226017920562c9f402ce8e30b007cf16bd30f90f7cc0f3a521bcfe7552f1f0d04fead08ad77e213acf120f4846915ff1992389d7afd239ee3cfc4c5caf58bb19b174b0fd1589b9e3e0d7855a1e50e98a91112582dde405d0a503387a8b74c099325422cf66239af850e47a39ce0b3dc0f9e3f56bb8060662775d8015e690e629109ebb16da2e34711cc4dcf4db3469c116c3275e24c29f08ad8d032534d921823795815bbeaf019a28b9655ef25bb05ef59f5317cc2e51d66a608280d31eeb16dfef5eebc9143ea21e0b8c590c997f72f16b49da181c68cee1ffecf5d6303af2acb4d8090a5d44ca8784d7f53169f25f4db714376a5709f718abf07921d947b78832a25acff2e9841a244c94e1a08067ecf791c168ed9e1468d2225609e215a227ad3c52583d19ec3f076b88771d1343b7b9eae45b7425d7e1ee5cef4619f8eb6f1c4d188040c08afab06bf6f71d39c81370ffb4cdd9b8f819eba747d9fc257253fb07f3eb351838ab885c8cc62d48b207d4157e77fe20081a3b351ce011dd2db1e903d629382583810e66886e6411c7be9e5881b61af4b4ec2001167efcb3d4343802f51bd46761565959cdc8be7cf38fb90cf1e22e260ad2917f95279f1c2f54931ee17eaa829def5a271b1bf3e68f087687599cc0c7a00c557851d5c76a61b086a717f37783a538567fb29d3a0abe22d55c152a7a39715d5175027bda2ef92fc15ce4bda71c8587b39620417cf4c11cbe23e6c839d33b617190adcd0cc58420a4ac73d7a92dc1c1b2ddbcd9339de65cacf018f4d6dc57d31de9d5d95b988a8ef45848165c37998bc44c95e60a4e09e2139909a437f69ca4aa8f50e35d635b292a03041697cebbc6a81b574fa812e2a34d0a83b3dedb3af4a9feae7eb6fd979cd75eecfc9938ef1a2a837cad3f0276503bc1b3a963266180ce6b15e0297ec33c6f9c6d0b6ffdd58c717b2067688744e65abbe0da21a50d658ed4e5428857af47b18873147d2776ee4dca4ea0646015134affd6e7840dfafb6f700eab021cf72dc38c6287d032e464e94954853f888024d8e5ccda937f30333b7cb48cbebc4253a3301ac52c14612bc3b0685d2b38249982d929130e7e86e50a34693e2d92d3b17aa9edfa07dbf246eecb9d464c7eb7ef697fc58f40770ec1aea8b4ec1426499a35b6fb7638a063dcaa131b3fccbae642a22bc3a0205350457c3e6e6e2ec1d73b856d68fb8ebc11c1f03e70f163c54f53baeb6bf2b5ac368ee8ff243a644b3a8fdf9f62c0ccca1b415f3276cc91f9b45187bbba6122701ade761aca95a52b72929e5341f36aed2112ebc463331af291333b246a46c46716c033b9541c8cdbdb3fed4da616f3595196c21b9a128b3b5f835c300071358542b12469aa5f7e9111fe1721280e0d088e0861f8de72bdcadb958544437c7c851e0466ffc8503814bdb827ce00a042f5d58a8c09457209b24cfb60941349eb36e7f3aa59d707795b8db8b76457d396ab6de00d254f5c25bd9a4a38d445adc2a7e847be3fa064b1ae2f3d9781733c12e6b065416146eef7d2481ef74be075afaafeb552ad8ef56ec5e9a79e87e86abca5db03db9c7fea63efdd955f6b35a1cfc91e82529e0c7cb7e8e5f4002dc31420776ee96ba5d858d74ba8e780f894389c249e382b350bd1651c87a9aacfd21798bbfbde2b0c00d5e4af0e852ca7f879ea0692cba13ba8c097751bbb36403a0115802ebfdb8b08fd2f6e7e2849700084f12d4efb957099511023d836e2492c99aa259f6c35a017ea62f4e14cbfcbcb8c356f885c7477d908f180064a31f250b3795111907f866630d77cfa177308a822464f5a635f724bcecab9fafd84d4a99071612434bdf9f93b678e6fd7b78e4cdce090a7dc501cd152791ceb5dd79a5b16dfa60cd19013c5e0ed31d30722635b07bb4319ece2f5ee05ab3a26eb4f12100d8a11d5c265ba0aba2e935e6c81c79af7e8438be63845dbad7d37a0583e4d663c7dc1100c4defe558fb6ed74f73c5bc038c2f381d911f92ec7e20e6de9d7b6eccd90000494c4675d78b4b5e2ad46d70f26ae800771c9a7b2e96bbea93f294a38635fbc88309122c0c85e6c9d5a6a233f0ae4b0e17be00c56d4969fe5ec8ab31cd4f0c6eae2d0b3d2b4bc5745ff29caa4e0ac40316860035bd15d4867fa001bf357957817421d7abf3fa82b4426f9b39141b90114549d4a3f30bb2bce8651a1e9b7b97e61c7ffa84d709293c572d8546de15b313499d675977cc798d87f8e09c59e46f9908d52f8f8f1c55b270a21a17d89bfeab72d05963fef4aaeafbd523049dfc90cea6f52768f8b7f7368780625bfc437104801b3cc28416bc4b16d0d89b30a25624990b87a2006b1781d92c84fa28e46609cf4cee5496072bab6fd1e602cfe93d94797ed70e8abfc73fdd2a7ef11e77d8b553f6db3ce49d74f3fdb2bdd82c9846ecdc149c84de1e74514afe28367250547e1a21158fe3f46bdac90269b654671c347abc96599cb8f2507f565ce4cef2ee459ae438dca347d36e1f2fc4b3420a05a22f2287d51a6c2359b326987ba93b0c2223b0c9984268153deb83a99d4e954950edd152d1d2618adb0558659e0fc8ca927b8d184b95fae1601ea05a1ef004b41f49e9b451bb6caec54c52c46cd2c86dcb0d7fae37801022a0e363f3ce9129ad8e2bf937893a7befc25e037e454aed57f42d1841f633b1b1f4ba5b2af2cd5d68a6c27915772913869402a41cb57cc14a3374b5ddda1b1d56755873889bdacff0379ae212cf41c7db33ced22ceebd130329776f6ddcb9c4e6b38ef03a8b7b304c9a1b0d01966b77fce074c54cb4c16f232c2421ef4a0116becc90976464b4346060cc0a066e8b52ccbb4e8ebf6d43839f3ac59a4f83d8bc9ed0eefac528becef23791e1591068eea6fe438c9fb71e2b0a7dbfc99eb66bd556b74c47c91eb1a4048f2c36dcd51d2831eae48db79a4c9aa3610eee96bf1b3c60e8a3b18933ee1c3778bf87cb43965a6f4052bb4aa928b408cba6491f716790f32d664e11f9e6294ae2ede52aa13102c4640f7f9d07e9223bf3d7ff9c2a94ed37d72778211ac1e2d47373279d18ff5dee08223fa109078071b1432ad28d44a3a00d8de341759aeb5a5208a4446cf671cfc718738b6036d87a6208f34510c3ebb2d708f1d7caea4ee1a91f9fd86594b0fa6d34f04c36ceed35cdb657cf86ac28c213b14d607d571793bc38acc3efb5199798f814928d491a3d2fadba5e9c76b6fd3b8c34918f56801819b89da8d9439ffc7cfb6cebe49f9784462e6d1d3eaedce2a4b00165cc4f6417e6915b4e7dd4e027a1b5747d3c6e05221eb142c5c0ca8903fbed4e440b0169ce1d1da54733780d8ddf3fff965725dc61d25cf8646e8b6ac88e70176e8db32e5737ee2d1e39dd8beaa654fec9bb35f24c6d92b77d6c0a4640b0e8b91cec9c337228c429d16f8c1ec83d2f8d1731e28b7450018c733213e1bd0da97d5e920dbca0ba9bf87b8e", 0x1000}, {&(0x7f0000001240)="ed60514f143e07b768d2b6dbc47d1911b32b0b411c8ae466a55c407c808cb2ad10da873722b842430fc260950c1645a5b5c85ee319943793f746cbcef99933bcc5b7cd02dc3ea14a08721586df0d0b8fef0b80af6c5c3951d812bf89a06451e9cc0eb9234ea259a9", 0x68}, {&(0x7f0000000080)="7a619e29538a6c35f86715ec329f53300389b5abbd5769fdb5263b72913c0881a64f9393ac", 0x25}, {&(0x7f00000012c0)="d93171cf66ee28b7b051139644518aacbb878ea0a394b76d291f", 0x1a}], 0x5) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10021, 0x0) [ 718.604161][T24768] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:03:17 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xf6ffffff00000000) [ 718.644740][T24768] EXT4-fs (sda1): Remounting filesystem read-only 20:03:17 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:03:17 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xf8f73f0000000000) 20:03:17 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lseek(r0, 0xdc7, 0x4) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r1, 0xc0109428, &(0x7f0000000040)={0x3, 0x800}) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) 20:03:17 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1100000000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:03:17 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xfeffffff00000000) 20:03:17 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1200000000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 720.100370][T24816] cgroup: Unknown subsys name 'perf_event' [ 720.106998][T24816] cgroup: Unknown subsys name 'net_cls' [ 720.427895][T24920] cgroup: Unknown subsys name 'perf_event' [ 720.437900][T24920] cgroup: Unknown subsys name 'net_cls' [ 720.445779][T24924] cgroup: Unknown subsys name 'perf_event' [ 720.451935][T24924] cgroup: Unknown subsys name 'net_cls' 20:03:21 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xfffffffe) 20:03:21 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xffefffff00000000) 20:03:21 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:03:21 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x8100, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f0000000200)=@v3={0x3000000, [{0x6bf, 0x3}, {0x4a75, 0x200}], r1}, 0x18, 0x7135b1e2db429610) r2 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000280)='./file0/file0\x00', 0x9, 0x1, &(0x7f0000000340)=[{&(0x7f00000002c0)="12ec196c8ffa0e39a161468f2ac2919d0a6599c652a73e113fb409e260f8b940e94587004a5467a6fd15f69d91ffad0a405175adb3f2d7a35269142e1270d0630c81b72ec2eb43e4b6f9adbef19c", 0x4e, 0x8}], 0x11050, &(0x7f0000000380)={[{@shortname_mixed}], [{@hash}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsroot={'smackfsroot', 0x3d, 'security.capability\x00'}}, {@uid_gt={'uid>', r1}}, {@smackfsdef={'smackfsdef', 0x3d, 'security.capability\x00'}}, {@obj_role={'obj_role', 0x3d, 'security.capability\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) mmap(&(0x7f0000669000/0x2000)=nil, 0x2000, 0x1000000, 0x1010, r2, 0x5ddfb000) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) 20:03:21 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0xffffffff00000000) 20:03:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x8, 0x4) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 20:03:21 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x80000000000) 20:03:21 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) write(r1, &(0x7f00000000c0)="a2b4d4e929b33fa01ca4a51720f36a28f695ecaa03e28c1af102341b446058eaeae05f3b61d4a71c31af957bc78b9bf2271e4b655c1fa2c20877", 0x3a) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f0000000240)=@sha1={0x1, "f13e53af77285818b82898f75d4bf03dbbbcc112"}, 0x15, 0x2) [ 722.613750][T26198] EXT4-fs error: 8 callbacks suppressed [ 722.613765][T26198] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user 20:03:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000002c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)=""/28, 0x1c}, 0x5}], 0x1, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002dc0), r0) 20:03:21 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0xffffff7f00000000) 20:03:21 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x1000000000000) [ 722.686512][T26198] EXT4-fs: 8 callbacks suppressed [ 722.686527][T26198] EXT4-fs (sda1): Remounting filesystem read-only [ 722.709918][T26191] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.2: Abort forced by user [ 722.726141][T26191] EXT4-fs (sda1): Remounting filesystem read-only 20:03:21 executing program 2: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) r2 = openat$incfs(r0, &(0x7f0000000040)='.log\x00', 0x108000, 0x190) move_mount(r2, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) [ 722.744986][T26217] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 722.762742][T26217] EXT4-fs (sda1): Remounting filesystem read-only 20:03:21 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x4000000000000) 20:03:21 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:03:21 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x8000000000000) [ 722.868992][T26235] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.2: Abort forced by user [ 722.905736][T26235] EXT4-fs (sda1): Remounting filesystem read-only 20:03:21 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x7055, 0xd0800) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8010, r1, 0xf52f3000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) [ 722.929400][T26236] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 722.949883][T26236] EXT4-fs (sda1): Remounting filesystem read-only [ 722.967235][T26240] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 723.003430][T26240] EXT4-fs (sda1): Remounting filesystem read-only 20:03:21 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2500000000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 723.047003][T26246] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.2: Abort forced by user 20:03:21 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0xfffffffffffffc83, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) [ 723.088580][T26246] EXT4-fs (sda1): Remounting filesystem read-only [ 723.107454][T26250] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 723.124138][T26250] EXT4-fs (sda1): Remounting filesystem read-only 20:03:22 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 723.166304][T26251] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 723.183587][T26251] EXT4-fs (sda1): Remounting filesystem read-only [ 723.270287][T26255] EXT4-fs error (device sda1): ext4_remount:5934: comm syz-executor.5: Abort forced by user [ 723.289917][T26255] EXT4-fs (sda1): Remounting filesystem read-only 20:03:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000002c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)=""/28, 0x1c}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, &(0x7f0000002d40)={0x77359400}) syz_genetlink_get_family_id$ethtool(&(0x7f0000002dc0), r0) 20:03:22 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) [ 724.287978][T26272] cgroup: Unknown subsys name 'perf_event' [ 724.294243][T26272] cgroup: Unknown subsys name 'net_cls' [ 724.661968][T26387] cgroup: Unknown subsys name 'perf_event' [ 724.668419][T26387] cgroup: Unknown subsys name 'net_cls' [ 724.688130][T26393] cgroup: Unknown subsys name 'perf_event' [ 724.694634][T26393] cgroup: Unknown subsys name 'net_cls' 20:03:25 executing program 3: r0 = epoll_create(0x7) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000001c0)) 20:03:25 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x90800, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='/dfv/md0\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nsfs\x00', 0x20800b8, &(0x7f00000001c0)='*@:\x00') mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000200)=""/156, 0x9c}], 0x1, 0x53c9, 0xd55) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) 20:03:25 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$int_out(r0, 0x5460, &(0x7f0000000040)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0) sendmsg$NFT_MSG_GETRULE(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)={0xe0, 0x7, 0xa, 0x3, 0x0, 0x0, {0x3, 0x0, 0x5}, [@NFTA_RULE_COMPAT={0x3, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_IPV4={0x8, 0x1, 0x1, 0x0, 0x33}, @NFTA_RULE_COMPAT_PROTO_IPV4={0x8}, @NFTA_RULE_COMPAT_PROTO_IPV6={0x8, 0x1, 0x1, 0x0, 0x2c}, @NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0xa01}, @NFTA_RULE_COMPAT_FLAGS={0x8}]}, @NFTA_RULE_COMPAT={0x1c, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_IPV6={0x8, 0x1, 0x1, 0x0, 0x87}, @NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x883e}, @NFTA_RULE_COMPAT_PROTO_IPV4={0x8, 0x1, 0x1, 0x0, 0x6}]}, @NFTA_RULE_COMPAT={0x2c, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_IPV4={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_RULE_COMPAT_PROTO_IPV6={0x8, 0x1, 0x1, 0x0, 0x3b}, @NFTA_RULE_COMPAT_PROTO_IPV6={0x8, 0x1, 0x1, 0x0, 0x89}, @NFTA_RULE_COMPAT_PROTO_IPV4={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0xf8}, @NFTA_RULE_COMPAT_PROTO_BRIDGE={0x0, 0x1, 0x1, 0x0, 0x8917}, @NFTA_RULE_COMPAT_PROTO_IPV6={0x0, 0x1, 0x1, 0x0, 0x89}]}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x5}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_USERDATA={0x3f, 0x7, 0x1, 0x0, "8f3e2693896a88e4e3613c090faaa2e848e1492ed1605d10f0d0b9ad8eff1a1adce631ce6430f0e40e5c8c6dab6b1a28321f510afff8e915383add"}]}, 0xe0}, 0x1, 0x0, 0x0, 0x20040084}, 0x40) 20:03:25 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3319404, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x31388a0, &(0x7f0000000680)=ANY=[]) 20:03:25 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0x5d}, {&(0x7f0000000400)="0a9e886070070a68d14f25cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) write$binfmt_misc(r1, 0x0, 0x4dca) inotify_add_watch(r1, &(0x7f00000000c0)='./file0\x00', 0x10000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "08648d0f1206d49d0c1ed871cb542dbf02f5d422"}, 0x15, 0x0)