00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x0, 0x0, 0x12020, &(0x7f0000000180)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x100}}, {@nodelalloc}, {@usrjquota}, {@dioread_lock}, {@delalloc}]}) chdir(&(0x7f0000000000)='./file0\x00') 00:27:59 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)=ANY=[@ANYBLOB="756c65300d0000000000d7c5e9896c39facb00"]) mount(&(0x7f0000000040)=@md0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='configfs\x00', 0x2a10004, &(0x7f0000000200)='ext2\x00') chdir(&(0x7f0000000000)='./file0\x00') [ 251.131523][T19276] configfs: Unknown parameter 'ext2' [ 251.163345][T19276] configfs: Unknown parameter 'ext2' 00:28:00 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}, 0x0, 0x2}}]}, 0x184}}, 0x0) 00:28:00 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}]}) 00:28:00 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) 00:28:00 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000000)='usrjquota', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 00:28:00 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:00 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 251.939310][T19297] EXT4-fs: 98 callbacks suppressed [ 251.939323][T19297] EXT4-fs (sda1): dax option not supported [ 251.954663][T19301] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 251.964815][T19301] EXT4-fs (sda1): re-mounted. Opts: sysvgroups,journal_checksum,,errors=continue. Quota mode: none. [ 251.975675][T19299] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring 00:28:00 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:00 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2200000000000000, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) [ 251.985849][T19299] EXT4-fs (sda1): re-mounted. Opts: sysvgroups,journal_checksum,,errors=continue. Quota mode: none. [ 251.996722][T19300] EXT4-fs (sda1): quotafile must be on filesystem root [ 252.003946][T19304] EXT4-fs (sda1): dax option not supported [ 252.019247][T19302] EXT4-fs (sda1): re-mounted. Opts: sysvgroups,,errors=continue. Quota mode: none. [ 252.028605][T19305] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring 00:28:00 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x93) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:00 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:00 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}]}) [ 252.056302][T19305] EXT4-fs (sda1): re-mounted. Opts: sysvgroups,journal_checksum,,errors=continue. Quota mode: none. 00:28:00 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:01 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}, 0x0, 0x2}}]}, 0x184}}, 0x0) 00:28:01 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2e00000000000000, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) 00:28:01 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:01 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1021001, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x77c32, &(0x7f0000000040)=ANY=[@ANYBLOB="7573726a717d6f74613dffb09d8d6c65302c00"]) open(&(0x7f0000000140)='./file0/file0\x00', 0x60, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x130) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x40004, 0x80) 00:28:01 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:01 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:01 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x11350a1, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) creat(&(0x7f0000000040)='./file0\x00', 0x90) creat(&(0x7f0000000000)='./file0\x00', 0x17) 00:28:01 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3300000000000000, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) 00:28:01 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:01 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:01 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}]}) 00:28:01 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:02 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}, 0x0, 0x2}}]}, 0x184}}, 0x0) 00:28:02 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)=ANY=[@ANYBLOB="7573728c71750500613d2e2f66696c65302c00"]) 00:28:02 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) 00:28:02 executing program 5: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}, 0x0, 0x2}}]}, 0x184}}, 0x0) 00:28:02 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:02 executing program 4: mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:02 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:02 executing program 4: mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:02 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) 00:28:02 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)={0x30000000}) dup3(r1, r0, 0x0) r3 = epoll_create(0x5) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000200)) mount_setattr(r4, &(0x7f0000000000)='./file0\x00', 0x900, &(0x7f0000000040)={0x8a, 0x1, 0x120000}, 0x20) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 00:28:02 executing program 4: mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:02 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)=ANY=[@ANYBLOB='uqrjquota=./fileE,\x00']) 00:28:03 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}, 0x0, 0x2}}]}, 0x184}}, 0x0) 00:28:03 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xb, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:03 executing program 4: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:03 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) 00:28:03 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x184) creat(&(0x7f0000000040)='./file0\x00', 0x102) acct(&(0x7f0000000140)='./file0\x00') mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 00:28:03 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000003840), 0x2, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:03 executing program 4: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:03 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfeffffff00000000, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) 00:28:03 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x80) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)=ANY=[@ANYBLOB='usrjquoha=./file0,\x00']) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x8) 00:28:03 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:03 executing program 4: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:03 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:04 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}, 0x0, 0x2}}]}, 0x184}}, 0x0) 00:28:04 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:04 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1202e, &(0x7f00000001c0)={[{@dax}]}) 00:28:04 executing program 0: ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f00000001c0)=0x7) mkdir(&(0x7f0000000040)='./file0\x00', 0x6e) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200)=0x3) lsetxattr$trusted_overlay_opaque(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f00000002c0), 0x2, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xb21004, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="2f6465762f6c6f6f7030f3dee8b34141493e8e0d78777f10feff070000872419daed04c89ab4a6371d1cc564881eccb2d8ac04cbce"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='sockfs\x00', 0x80809, &(0x7f0000000140)='-#\x00') mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x50) 00:28:04 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:04 executing program 5 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:04 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:04 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0/file0\x00', 0x16) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x4, 0x0, 0x0, 0x12020, &(0x7f0000000180)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) [ 255.598148][T19494] FAULT_INJECTION: forcing a failure. [ 255.598148][T19494] name failslab, interval 1, probability 0, space 0, times 0 [ 255.610807][T19494] CPU: 0 PID: 19494 Comm: syz-executor.5 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 255.620955][T19494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.631067][T19494] Call Trace: [ 255.634334][T19494] dump_stack_lvl+0xd6/0x122 [ 255.638986][T19494] dump_stack+0x11/0x1b [ 255.643146][T19494] should_fail+0x23c/0x250 00:28:04 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 255.647570][T19494] ? getname_flags+0x84/0x3f0 [ 255.652250][T19494] __should_failslab+0x81/0x90 [ 255.657006][T19494] should_failslab+0x5/0x20 [ 255.661508][T19494] kmem_cache_alloc+0x4f/0x300 [ 255.666271][T19494] ? __cond_resched+0x11/0x40 [ 255.670941][T19494] getname_flags+0x84/0x3f0 [ 255.675440][T19494] __x64_sys_mkdir+0x31/0x50 [ 255.680036][T19494] do_syscall_64+0x44/0xa0 [ 255.684489][T19494] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 255.690392][T19494] RIP: 0033:0x465707 00:28:04 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 255.694259][T19494] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 255.713843][T19494] RSP: 002b:00007f5595b03fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 255.722249][T19494] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000465707 [ 255.730220][T19494] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000100 [ 255.738190][T19494] RBP: 00007f5595b04040 R08: 0000000000000000 R09: 0000000000012020 00:28:04 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x10, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:04 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12033, &(0x7f00000001c0)={[{@dax}]}) [ 255.746165][T19494] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000200000c0 [ 255.754132][T19494] R13: 0000000020000100 R14: 00007f5595b04000 R15: 0000000020000000 00:28:04 executing program 5 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:04 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:04 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x11, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:04 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000000)=[{0x2c}, {0x2c}, {0x6}]}) mkdir(0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 00:28:04 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}, 0x0, 0x2}}]}, 0x184}}, 0x0) 00:28:04 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax, 0x22}]}) [ 256.535602][T19540] FAULT_INJECTION: forcing a failure. [ 256.535602][T19540] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 256.548712][T19540] CPU: 0 PID: 19540 Comm: syz-executor.5 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 256.558869][T19540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.568917][T19540] Call Trace: [ 256.572186][T19540] dump_stack_lvl+0xd6/0x122 [ 256.576768][T19540] dump_stack+0x11/0x1b [ 256.580966][T19540] should_fail+0x23c/0x250 [ 256.585377][T19540] should_fail_usercopy+0x16/0x20 [ 256.590411][T19540] strncpy_from_user+0x21/0x250 [ 256.595261][T19540] getname_flags+0xb8/0x3f0 [ 256.599757][T19540] __x64_sys_mkdir+0x31/0x50 [ 256.604404][T19540] do_syscall_64+0x44/0xa0 [ 256.608879][T19540] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 256.614855][T19540] RIP: 0033:0x465707 [ 256.618740][T19540] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 256.638335][T19540] RSP: 002b:00007f5595b03fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 256.646776][T19540] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000465707 [ 256.654744][T19540] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000100 [ 256.662735][T19540] RBP: 00007f5595b04040 R08: 0000000000000000 R09: 0000000000012020 [ 256.670691][T19540] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000200000c0 00:28:05 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:05 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x12, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 256.678645][T19540] R13: 0000000020000100 R14: 00007f5595b04000 R15: 0000000020000000 00:28:05 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax, 0x2e}]}) [ 256.709502][ T22] audit: type=1326 audit(1631579285.174:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19535 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 00:28:05 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:05 executing program 5 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:05 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x18, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 256.950738][T19570] FAULT_INJECTION: forcing a failure. [ 256.950738][T19570] name failslab, interval 1, probability 0, space 0, times 0 [ 256.963364][T19570] CPU: 1 PID: 19570 Comm: syz-executor.5 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 256.973511][T19570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.983547][T19570] Call Trace: [ 256.986818][T19570] dump_stack_lvl+0xd6/0x122 [ 256.991410][T19570] dump_stack+0x11/0x1b [ 256.995560][T19570] should_fail+0x23c/0x250 [ 256.999977][T19570] ? __se_sys_mount+0x4e/0x2f0 [ 257.004748][T19570] __should_failslab+0x81/0x90 [ 257.009514][T19570] should_failslab+0x5/0x20 [ 257.014012][T19570] __kmalloc_track_caller+0x6d/0x350 [ 257.019294][T19570] ? strnlen_user+0x137/0x1c0 [ 257.023970][T19570] strndup_user+0x73/0x120 [ 257.028329][T19574] EXT4-fs: 92 callbacks suppressed [ 257.028339][T19574] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 257.028402][T19570] __se_sys_mount+0x4e/0x2f0 00:28:05 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1000, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x1}, 0x10) setreuid(0x0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000004900)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',dfltuid=', @ANYRESHEX=r4]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2400) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000004900)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r8, @ANYBLOB=',wfdno=', @ANYRESHEX=r9, @ANYBLOB=',dfltuid=', @ANYRESHEX=r11]) setxattr$system_posix_acl(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000580)={{}, {}, [{}, {0x2, 0x4, 0xee00}, {0x2, 0x3}, {0x2, 0x5}, {0x2, 0x3}], {0x4, 0x4}, [{0x8, 0x0, r4}, {0x8, 0x6, 0xffffffffffffffff}, {0x8, 0x6, r5}, {0x8, 0x3, r6}, {0x8, 0x6}, {0x8, 0x4, r7}, {0x8, 0x4}, {0x8, 0x2, 0xee01}, {0x8, 0x1, r11}]}, 0x94, 0x2) sendmsg$nl_generic(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2c, 0x16, 0x1, 0x0, 0x0, {0xa}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x14, 0x6, 0x0, 0x0, @binary="ce33de19a52cffc5b3a749fca5a6c2d7"}]}]}, 0x2c}}, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000004c0)=ANY=[@ANYBLOB="75696c6566892c0adb9d0a268334908c833e111da026553be251e025af892b9d1f48658e1d17bed9ebb5010e702507630323bf3128f05c2d87677dcf7335e16b9f43fdd8144e55c4"]) listxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)=""/47, 0x2f) 00:28:05 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 257.047346][T19570] __x64_sys_mount+0x63/0x70 [ 257.051936][T19570] do_syscall_64+0x44/0xa0 [ 257.056354][T19570] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 257.062248][T19570] RIP: 0033:0x467b1a [ 257.066133][T19570] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 257.085737][T19570] RSP: 002b:00007f5595b03fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 257.094125][T19570] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 257.102077][T19570] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 257.110025][T19570] RBP: 00007f5595b04040 R08: 00007f5595b04040 R09: 00000000200000c0 [ 257.117972][T19570] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 257.125919][T19570] R13: 0000000020000100 R14: 00007f5595b04000 R15: 0000000020000000 [ 257.135650][T19574] EXT4-fs (sda1): re-mounted. Opts: sysvgroups,journal_checksum,,errors=continue. Quota mode: none. 00:28:05 executing program 5 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 257.147100][T19571] EXT4-fs (sda1): Unrecognized mount option "dax." or missing value [ 257.166509][T19579] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 257.186270][T19579] EXT4-fs (sda1): re-mounted. Opts: sysvgroups,journal_checksum,,errors=continue. Quota mode: none. [ 257.199112][T19582] EXT4-fs (sda1): Unrecognized mount option "dax." or missing value [ 257.224669][T19585] FAULT_INJECTION: forcing a failure. [ 257.224669][T19585] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 257.237727][T19585] CPU: 0 PID: 19585 Comm: syz-executor.5 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 257.247875][T19585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.257914][T19585] Call Trace: [ 257.261182][T19585] dump_stack_lvl+0xd6/0x122 [ 257.265761][T19585] dump_stack+0x11/0x1b [ 257.269902][T19585] should_fail+0x23c/0x250 [ 257.274306][T19585] should_fail_usercopy+0x16/0x20 [ 257.279318][T19585] _copy_from_user+0x1c/0xd0 [ 257.283898][T19585] strndup_user+0xb0/0x120 [ 257.288306][T19585] __se_sys_mount+0x4e/0x2f0 [ 257.292895][T19585] ? do_mkdirat+0x293/0x2c0 [ 257.297393][T19585] __x64_sys_mount+0x63/0x70 [ 257.301969][T19585] do_syscall_64+0x44/0xa0 [ 257.306380][T19585] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 257.312266][T19585] RIP: 0033:0x467b1a [ 257.316144][T19585] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 257.335734][T19585] RSP: 002b:00007f5595b03fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 257.344143][T19585] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 257.352098][T19585] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 257.360059][T19585] RBP: 00007f5595b04040 R08: 00007f5595b04040 R09: 00000000200000c0 00:28:05 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}, 0x0, 0x2}}]}, 0x184}}, 0x0) 00:28:05 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:05 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x19, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:05 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax, 0x33}]}) 00:28:05 executing program 5 (fault-call:2 fault-nth:4): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 257.368015][T19585] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 257.375972][T19585] R13: 0000000020000100 R14: 00007f5595b04000 R15: 0000000020000000 [ 257.385436][T19589] EXT4-fs (sda1): Unrecognized mount option "uilef‰" or missing value [ 257.409797][T19586] EXT4-fs (sda1): Unrecognized mount option "uilef‰" or missing value 00:28:05 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x90000, 0x0) r0 = geteuid() mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x20000, &(0x7f00000001c0)=ANY=[@ANYBLOB='huge=always,nr_blocks=7k0,uid=', @ANYRESHEX=r0, @ANYBLOB=',huge=always,mpol=local=relative,nr_inodes=-k6,mpol=local=static,nr_inodes=24g,uid=', @ANYRESDEC=0xee01, @ANYBLOB="2c667375752e81fec2ed22dbb3613862c75093f9ad6f75aedaaaf9b8727f79efa1f103a9d082797e55232d6636", @ANYRESDEC=0xee01, @ANYBLOB=',audit,fowner<', @ANYRESDEC, @ANYBLOB=',obj_role=@,subj_user=ext2\x00,\x00']) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 00:28:05 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 257.458168][T19599] EXT4-fs (sda1): Unrecognized mount option "dax3" or missing value [ 257.474153][T19601] EXT4-fs (sda1): Unrecognized mount option "dax3" or missing value [ 257.492734][T19604] FAULT_INJECTION: forcing a failure. [ 257.492734][T19604] name failslab, interval 1, probability 0, space 0, times 0 [ 257.505373][T19604] CPU: 1 PID: 19604 Comm: syz-executor.5 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 257.515606][T19604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.525641][T19604] Call Trace: [ 257.528899][T19604] dump_stack_lvl+0xd6/0x122 [ 257.533510][T19604] dump_stack+0x11/0x1b [ 257.537641][T19604] should_fail+0x23c/0x250 [ 257.542052][T19604] __should_failslab+0x81/0x90 [ 257.546824][T19604] ? __se_sys_mount+0xf7/0x2f0 [ 257.551606][T19604] should_failslab+0x5/0x20 [ 257.556090][T19604] kmem_cache_alloc_trace+0x52/0x320 [ 257.561350][T19604] ? _copy_from_user+0x94/0xd0 [ 257.566091][T19604] __se_sys_mount+0xf7/0x2f0 [ 257.570661][T19604] __x64_sys_mount+0x63/0x70 [ 257.575228][T19604] do_syscall_64+0x44/0xa0 [ 257.579638][T19604] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 257.585516][T19604] RIP: 0033:0x467b1a 00:28:06 executing program 5 (fault-call:2 fault-nth:5): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 257.589385][T19604] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 257.609105][T19604] RSP: 002b:00007f5595b03fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 257.617494][T19604] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 257.625445][T19604] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 257.633394][T19604] RBP: 00007f5595b04040 R08: 00007f5595b04040 R09: 00000000200000c0 [ 257.641349][T19604] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 257.649296][T19604] R13: 0000000020000100 R14: 00007f5595b04000 R15: 0000000020000000 00:28:06 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) 00:28:06 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x22, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 257.775673][T19624] FAULT_INJECTION: forcing a failure. [ 257.775673][T19624] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 257.788739][T19624] CPU: 0 PID: 19624 Comm: syz-executor.5 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 257.798888][T19624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.808935][T19624] Call Trace: [ 257.812205][T19624] dump_stack_lvl+0xd6/0x122 [ 257.816795][T19624] dump_stack+0x11/0x1b [ 257.820945][T19624] should_fail+0x23c/0x250 [ 257.825350][T19624] should_fail_usercopy+0x16/0x20 [ 257.830361][T19624] _copy_from_user+0x1c/0xd0 [ 257.834946][T19624] __se_sys_mount+0x119/0x2f0 [ 257.839623][T19624] __x64_sys_mount+0x63/0x70 [ 257.844212][T19624] do_syscall_64+0x44/0xa0 [ 257.848625][T19624] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 257.854518][T19624] RIP: 0033:0x467b1a 00:28:06 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 257.858406][T19624] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 257.878004][T19624] RSP: 002b:00007f5595b03fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 257.886408][T19624] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 257.894375][T19624] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 257.902334][T19624] RBP: 00007f5595b04040 R08: 00007f5595b04040 R09: 00000000200000c0 [ 257.910307][T19624] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 257.918267][T19624] R13: 0000000020000100 R14: 00007f5595b04000 R15: 0000000020000000 00:28:06 executing program 0: ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000001c0)={0x0, @ethernet={0x6, @random="7f67ad008eca"}, @tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x4, 0x4}}, @xdp={0x2c, 0x0, 0x0, 0x32}, 0x70, 0x0, 0x0, 0x0, 0xfff, &(0x7f0000000000)='vlan0\x00', 0x2fb, 0xffffffffffffffff, 0x200}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x56, r0}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000580)={0x0, @phonet={0x23, 0x8e, 0x96, 0x4}, @rc={0x1f, @any, 0x3}, @rc={0x1f, @any, 0xf8}, 0xec8e, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)='netpci0\x00', 0x8, 0x10001, 0x7f}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000400)=@getsa={0x15c, 0x12, 0x10, 0x70bd2d, 0x25dfdbfe, {@in6=@private1, 0x4d5, 0xa, 0x33}, [@replay_val={0x10, 0xa, {0x70bd2d, 0x70bd29, 0x80}}, @algo_auth={0x115, 0x1, {{'blake2s-160-generic\x00'}, 0x668, "04e74982b5a21e127a2bbb5f844fd232ebe72ebabcc5cc792d8526ead79934d0fa71f58a6f29c383e1541daa4b32487b8259b6786aece8efb6f9844b0c51cfb4f99328b0f2831ffed5d4c46ecc715b86cccb83fcd24fc22e7b4b48a6210d106ad6ed0cf058422cf33df43c5c9a92301d4add83eeaffc7636d6f4a8159b82e515f68d69e4b5eba28935dcd00d0cfbff3b250f44d7dcdf101d5ff8767af4590b766a4960de034f542196ed55b7367f6d8fb52e57b5569a0db8d08b965a0b6efab68802fc03ba5ad085837c8ba639"}}, @offload={0xc, 0x1c, {r0, 0x3}}]}, 0x15c}, 0x1, 0x0, 0x0, 0x10}, 0x4004081) chroot(&(0x7f0000000140)='./file0\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 00:28:06 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}, 0x0, 0x2}}]}, 0x184}}, 0x0) 00:28:06 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x25, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:06 executing program 5 (fault-call:2 fault-nth:6): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:06 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}], [], 0x2}) 00:28:06 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:06 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x305080, 0x80) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000480)=@v1={0x2, "b51d1d6cbd86cde4c2c04779"}, 0xd, 0x6) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) openat(r0, &(0x7f0000000040)='./file1\x00', 0x20000, 0x101) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2f00000000004204feb061000000000000000000e2881d4028bbf92467c383f2c9086cca7d15d0658f06119141ff3c0551a8991c5b83913c089aff8534076b3011d1301800591d12f73b16900cfe32901faa9227eeaa065b062f4a76a053ee6f2284b8a482dfbb69eeb787e64673a5a43991f36ea8c33cf225b3660ea87da75758e386a69334b604a44171686c165ffe369d7476c437bc15413d8e5f86a75cb62a0c8ce25449ba7c2c8f929d6771ba8c32996e13b0a58ab76f704ceadb7041daf77f0ea0e03a72a8d83373f08a451a46ed9262cb69216880823f874637531de92db52624bde2e469cfd9fa9b00"/249], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='nilfs2\x00', 0x2080, &(0x7f0000000240)='/)\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r2 = syz_open_pts(r1, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000080)) open(&(0x7f00000002c0)='./file1\x00', 0x126000, 0x82) chdir(&(0x7f0000000400)='./file1\x00') dup3(r2, r1, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/devices/msr', 0x1, 0x4) inotify_add_watch(r4, &(0x7f0000000340)='./file0\x00', 0x21) r5 = dup3(0xffffffffffffffff, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r3, &(0x7f0000000200)) openat(r5, &(0x7f0000000280)='./file1\x00', 0x410000, 0x20) 00:28:06 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:06 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2e, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 258.370295][T19649] FAULT_INJECTION: forcing a failure. [ 258.370295][T19649] name failslab, interval 1, probability 0, space 0, times 0 [ 258.382923][T19649] CPU: 0 PID: 19649 Comm: syz-executor.5 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 258.393074][T19649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.403116][T19649] Call Trace: [ 258.406383][T19649] dump_stack_lvl+0xd6/0x122 [ 258.410972][T19649] dump_stack+0x11/0x1b [ 258.415123][T19649] should_fail+0x23c/0x250 [ 258.419519][T19649] ? getname_flags+0x84/0x3f0 [ 258.424176][T19649] __should_failslab+0x81/0x90 [ 258.428931][T19649] should_failslab+0x5/0x20 [ 258.433410][T19649] kmem_cache_alloc+0x4f/0x300 [ 258.438183][T19649] ? should_fail+0xd6/0x250 [ 258.442689][T19649] getname_flags+0x84/0x3f0 [ 258.447175][T19649] ? should_fail+0xd6/0x250 [ 258.451653][T19649] user_path_at_empty+0x28/0x110 [ 258.456571][T19649] __se_sys_mount+0x217/0x2f0 [ 258.461232][T19649] __x64_sys_mount+0x63/0x70 [ 258.465803][T19649] do_syscall_64+0x44/0xa0 [ 258.470204][T19649] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 258.476077][T19649] RIP: 0033:0x467b1a [ 258.479957][T19649] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 258.499542][T19649] RSP: 002b:00007f5595b03fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 258.507930][T19649] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a 00:28:07 executing program 5 (fault-call:2 fault-nth:7): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:07 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) open_tree(r1, &(0x7f0000000000)='./file0\x00', 0x0) [ 258.515880][T19649] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 258.523833][T19649] RBP: 00007f5595b04040 R08: 00007f5595b04040 R09: 00000000200000c0 [ 258.531782][T19649] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 258.539729][T19649] R13: 0000000020000100 R14: 00007f5595b04000 R15: 0000000020000000 [ 258.614465][T19668] FAULT_INJECTION: forcing a failure. [ 258.614465][T19668] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 258.627527][T19668] CPU: 1 PID: 19668 Comm: syz-executor.5 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 258.637673][T19668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.647715][T19668] Call Trace: [ 258.650984][T19668] dump_stack_lvl+0xd6/0x122 [ 258.655572][T19668] dump_stack+0x11/0x1b [ 258.659722][T19668] should_fail+0x23c/0x250 [ 258.664127][T19668] should_fail_usercopy+0x16/0x20 [ 258.669141][T19668] strncpy_from_user+0x21/0x250 [ 258.673996][T19668] getname_flags+0xb8/0x3f0 [ 258.678500][T19668] ? should_fail+0xd6/0x250 [ 258.682995][T19668] user_path_at_empty+0x28/0x110 [ 258.687928][T19668] __se_sys_mount+0x217/0x2f0 [ 258.692598][T19668] __x64_sys_mount+0x63/0x70 [ 258.697181][T19668] do_syscall_64+0x44/0xa0 [ 258.701597][T19668] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 258.707487][T19668] RIP: 0033:0x467b1a [ 258.711373][T19668] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 258.730974][T19668] RSP: 002b:00007f5595b03fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 258.739375][T19668] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 258.747341][T19668] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 258.755309][T19668] RBP: 00007f5595b04040 R08: 00007f5595b04040 R09: 00000000200000c0 00:28:07 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}], [], 0x3}) [ 258.763276][T19668] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 258.771328][T19668] R13: 0000000020000100 R14: 00007f5595b04000 R15: 0000000020000000 00:28:07 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:07 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, 0x0, 0x0) 00:28:07 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x300, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:07 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000240)=ANY=[@ANYBLOB="7573726b71756f74613d2e2f66696c65302c005e30df6f79205ed2068f1c983e553873e58df1fab8e9ad8cdb76cb027d93a9f7163f8cedc26417b32b1979a03fe6921d72c996726d108cbe8c769492979d0ff2c070ef518b18a576c20f2a20bc51bf4eedc0451a1a10d915be89406028e8785abaf2e2a5b96c9a271c6d56ff2efa3e11956e"]) 00:28:07 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}], [], 0x4}) 00:28:07 executing program 5 (fault-call:2 fault-nth:8): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:07 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:07 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 259.278947][T19698] FAULT_INJECTION: forcing a failure. [ 259.278947][T19698] name failslab, interval 1, probability 0, space 0, times 0 [ 259.291633][T19698] CPU: 1 PID: 19698 Comm: syz-executor.5 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 259.301782][T19698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.311828][T19698] Call Trace: [ 259.315094][T19698] dump_stack_lvl+0xd6/0x122 [ 259.319705][T19698] dump_stack+0x11/0x1b [ 259.323855][T19698] should_fail+0x23c/0x250 [ 259.328251][T19698] __should_failslab+0x81/0x90 [ 259.333016][T19698] ? alloc_fs_context+0x46/0x500 [ 259.338015][T19698] should_failslab+0x5/0x20 [ 259.342496][T19698] kmem_cache_alloc_trace+0x52/0x320 [ 259.347758][T19698] alloc_fs_context+0x46/0x500 [ 259.352497][T19698] ? security_capable+0x91/0xa0 [ 259.357343][T19698] fs_context_for_reconfigure+0x42/0x50 [ 259.362889][T19698] path_mount+0x122a/0x1d20 [ 259.367369][T19698] __se_sys_mount+0x24b/0x2f0 [ 259.372157][T19698] __x64_sys_mount+0x63/0x70 [ 259.376723][T19698] do_syscall_64+0x44/0xa0 [ 259.381116][T19698] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 259.386986][T19698] RIP: 0033:0x467b1a [ 259.390857][T19698] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 259.410437][T19698] RSP: 002b:00007f5595b03fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 259.418871][T19698] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a 00:28:07 executing program 5 (fault-call:2 fault-nth:9): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 259.426823][T19698] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 259.434770][T19698] RBP: 00007f5595b04040 R08: 00007f5595b04040 R09: 00000000200000c0 [ 259.442715][T19698] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 259.450661][T19698] R13: 0000000020000100 R14: 00007f5595b04000 R15: 0000000020000000 00:28:08 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) chdir(&(0x7f00000002c0)='./file0\x00') mount(&(0x7f0000000040)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='gfs2meta\x00', 0x80, &(0x7f00000001c0)='*]\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="550000002a007f33deba2f977333bd930a0000ce01a843089100fe803900080008000000009eb43c6a95a0fb432c00000000fb83de448daa72540d8102d269c4d4133ab82286926700"/85, 0x55}], 0x1}, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12032, &(0x7f0000000200)=ANY=[]) getsockname$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x6e) 00:28:08 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}], [], 0x7}) 00:28:08 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x500, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 259.507853][T19714] FAULT_INJECTION: forcing a failure. [ 259.507853][T19714] name failslab, interval 1, probability 0, space 0, times 0 [ 259.520496][T19714] CPU: 1 PID: 19714 Comm: syz-executor.5 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 259.530645][T19714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.540689][T19714] Call Trace: [ 259.543947][T19714] dump_stack_lvl+0xd6/0x122 [ 259.548517][T19714] dump_stack+0x11/0x1b [ 259.552706][T19714] should_fail+0x23c/0x250 [ 259.557165][T19714] __should_failslab+0x81/0x90 [ 259.561918][T19714] ? legacy_init_fs_context+0x2d/0x70 [ 259.567282][T19714] should_failslab+0x5/0x20 [ 259.571778][T19714] kmem_cache_alloc_trace+0x52/0x320 [ 259.577093][T19714] ? alloc_fs_context+0x46/0x500 [ 259.582007][T19714] legacy_init_fs_context+0x2d/0x70 [ 259.587251][T19714] alloc_fs_context+0x419/0x500 [ 259.592098][T19714] fs_context_for_reconfigure+0x42/0x50 [ 259.597644][T19714] path_mount+0x122a/0x1d20 [ 259.602129][T19714] __se_sys_mount+0x24b/0x2f0 [ 259.606790][T19714] __x64_sys_mount+0x63/0x70 [ 259.611365][T19714] do_syscall_64+0x44/0xa0 [ 259.615863][T19714] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 259.621756][T19714] RIP: 0033:0x467b1a [ 259.625625][T19714] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 259.645208][T19714] RSP: 002b:00007f5595b03fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 259.653599][T19714] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 259.661605][T19714] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 259.669590][T19714] RBP: 00007f5595b04040 R08: 00007f5595b04040 R09: 00000000200000c0 [ 259.677618][T19714] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 259.685565][T19714] R13: 0000000020000100 R14: 00007f5595b04000 R15: 0000000020000000 00:28:08 executing program 5 (fault-call:2 fault-nth:10): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 259.988032][T19728] FAULT_INJECTION: forcing a failure. [ 259.988032][T19728] name failslab, interval 1, probability 0, space 0, times 0 [ 260.000695][T19728] CPU: 1 PID: 19728 Comm: syz-executor.5 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 260.010844][T19728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.020894][T19728] Call Trace: [ 260.024155][T19728] dump_stack_lvl+0xd6/0x122 [ 260.028838][T19728] dump_stack+0x11/0x1b [ 260.032976][T19728] should_fail+0x23c/0x250 [ 260.037372][T19728] ? ext4_remount+0x67/0x1980 [ 260.042109][T19728] __should_failslab+0x81/0x90 [ 260.046860][T19728] should_failslab+0x5/0x20 [ 260.051343][T19728] __kmalloc_track_caller+0x6d/0x350 [ 260.056602][T19728] kstrdup+0x31/0x70 [ 260.060474][T19728] ext4_remount+0x67/0x1980 [ 260.065057][T19728] ? __list_lru_walk_one+0x2e2/0x320 [ 260.070320][T19728] ? shrink_dcache_sb+0x2d0/0x2d0 [ 260.075377][T19728] ? shrink_lock_dentry+0x34/0x280 [ 260.080466][T19728] ? __list_del_entry_valid+0x54/0xc0 [ 260.085814][T19728] ? shrink_dentry_list+0x30f/0x340 [ 260.091028][T19728] ? ext4_statfs+0x6b0/0x6b0 [ 260.095663][T19728] legacy_reconfigure+0x8e/0xa0 [ 260.100492][T19728] reconfigure_super+0x2d3/0x4f0 [ 260.105402][T19728] path_mount+0x145a/0x1d20 [ 260.109895][T19728] __se_sys_mount+0x24b/0x2f0 [ 260.114551][T19728] __x64_sys_mount+0x63/0x70 [ 260.119171][T19728] do_syscall_64+0x44/0xa0 [ 260.123566][T19728] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 260.129449][T19728] RIP: 0033:0x467b1a [ 260.133316][T19728] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 260.152904][T19728] RSP: 002b:00007f5595b03fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 260.161353][T19728] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 260.169300][T19728] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 260.177248][T19728] RBP: 00007f5595b04040 R08: 00007f5595b04040 R09: 00000000200000c0 00:28:08 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, 0x0, 0x0) 00:28:08 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:08 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) chdir(&(0x7f0000000000)='./file0\x00') mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0xb41057124e485f60, 0x0) 00:28:08 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}], [], 0x22}) 00:28:08 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x600, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:08 executing program 5 (fault-call:2 fault-nth:11): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 260.185288][T19728] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 260.193238][T19728] R13: 0000000020000100 R14: 00007f5595b04000 R15: 0000000020000000 00:28:08 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:08 executing program 0: ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000001c0)={0x0, @ethernet={0x6, @random="7f67ad008eca"}, @tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x4, 0x4}}, @xdp={0x2c, 0x0, 0x0, 0x32}, 0x70, 0x0, 0x0, 0x0, 0xfff, &(0x7f0000000000)='vlan0\x00', 0x2fb, 0xffffffffffffffff, 0x200}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x56, r0}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000580)={0x0, @phonet={0x23, 0x8e, 0x96, 0x4}, @rc={0x1f, @any, 0x3}, @rc={0x1f, @any, 0xf8}, 0xec8e, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)='netpci0\x00', 0x8, 0x10001, 0x7f}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000400)=@getsa={0x15c, 0x12, 0x10, 0x70bd2d, 0x25dfdbfe, {@in6=@private1, 0x4d5, 0xa, 0x33}, [@replay_val={0x10, 0xa, {0x70bd2d, 0x70bd29, 0x80}}, @algo_auth={0x115, 0x1, {{'blake2s-160-generic\x00'}, 0x668, "04e74982b5a21e127a2bbb5f844fd232ebe72ebabcc5cc792d8526ead79934d0fa71f58a6f29c383e1541daa4b32487b8259b6786aece8efb6f9844b0c51cfb4f99328b0f2831ffed5d4c46ecc715b86cccb83fcd24fc22e7b4b48a6210d106ad6ed0cf058422cf33df43c5c9a92301d4add83eeaffc7636d6f4a8159b82e515f68d69e4b5eba28935dcd00d0cfbff3b250f44d7dcdf101d5ff8767af4590b766a4960de034f542196ed55b7367f6d8fb52e57b5569a0db8d08b965a0b6efab68802fc03ba5ad085837c8ba639"}}, @offload={0xc, 0x1c, {r0, 0x3}}]}, 0x15c}, 0x1, 0x0, 0x0, 0x10}, 0x4004081) chroot(&(0x7f0000000140)='./file0\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 00:28:08 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:08 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}], [], 0x2e}) [ 260.276606][T19752] FAULT_INJECTION: forcing a failure. [ 260.276606][T19752] name failslab, interval 1, probability 0, space 0, times 0 [ 260.289271][T19752] CPU: 0 PID: 19752 Comm: syz-executor.5 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 260.299414][T19752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.309457][T19752] Call Trace: [ 260.312733][T19752] dump_stack_lvl+0xd6/0x122 [ 260.317385][T19752] dump_stack+0x11/0x1b [ 260.321527][T19752] should_fail+0x23c/0x250 [ 260.325995][T19752] ? mempool_alloc_slab+0x16/0x20 [ 260.330995][T19752] __should_failslab+0x81/0x90 [ 260.335736][T19752] should_failslab+0x5/0x20 [ 260.340292][T19752] kmem_cache_alloc+0x4f/0x300 [ 260.345034][T19752] ? chksum_update+0x39/0x50 [ 260.349602][T19752] mempool_alloc_slab+0x16/0x20 [ 260.354431][T19752] ? mempool_free+0x130/0x130 [ 260.359136][T19752] mempool_alloc+0x9d/0x310 [ 260.363727][T19752] ? match_token+0x414/0x440 [ 260.368297][T19752] bio_alloc_bioset+0xcc/0x530 [ 260.373039][T19752] submit_bh_wbc+0x130/0x330 [ 260.377693][T19752] ? ext4_update_super+0x71c/0x740 [ 260.382791][T19752] __sync_dirty_buffer+0x136/0x1e0 [ 260.387892][T19752] ext4_commit_super+0x1f6/0x290 [ 260.392817][T19752] ext4_remount+0xff7/0x1980 [ 260.397386][T19752] ? ext4_statfs+0x6b0/0x6b0 [ 260.401952][T19752] legacy_reconfigure+0x8e/0xa0 [ 260.406834][T19752] reconfigure_super+0x2d3/0x4f0 [ 260.411744][T19752] path_mount+0x145a/0x1d20 [ 260.416226][T19752] __se_sys_mount+0x24b/0x2f0 [ 260.420954][T19752] __x64_sys_mount+0x63/0x70 [ 260.425521][T19752] do_syscall_64+0x44/0xa0 [ 260.429994][T19752] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 260.435874][T19752] RIP: 0033:0x467b1a [ 260.439743][T19752] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 260.459364][T19752] RSP: 002b:00007f5595b03fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 260.467758][T19752] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 260.475704][T19752] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 260.483700][T19752] RBP: 00007f5595b04040 R08: 00007f5595b04040 R09: 00000000200000c0 [ 260.491650][T19752] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 260.499641][T19752] R13: 0000000020000100 R14: 00007f5595b04000 R15: 0000000020000000 00:28:09 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x700, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:09 executing program 5 (fault-call:2 fault-nth:12): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 260.835698][T19776] FAULT_INJECTION: forcing a failure. [ 260.835698][T19776] name failslab, interval 1, probability 0, space 0, times 0 [ 260.848424][T19776] CPU: 0 PID: 19776 Comm: syz-executor.5 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 260.858598][T19776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.868629][T19776] Call Trace: [ 260.871951][T19776] dump_stack_lvl+0xd6/0x122 [ 260.876522][T19776] dump_stack+0x11/0x1b [ 260.880721][T19776] should_fail+0x23c/0x250 [ 260.885128][T19776] __should_failslab+0x81/0x90 [ 260.889871][T19776] should_failslab+0x5/0x20 [ 260.894414][T19776] kmem_cache_alloc_node+0x61/0x2c0 [ 260.899585][T19776] ? create_task_io_context+0x36/0x210 [ 260.905019][T19776] ? __d_add+0x3bf/0x490 [ 260.909295][T19776] create_task_io_context+0x36/0x210 [ 260.914607][T19776] submit_bio_checks+0x7c3/0x850 [ 260.919599][T19776] ? mempool_alloc_slab+0x16/0x20 [ 260.924599][T19776] submit_bio_noacct+0x33/0x7d0 [ 260.929427][T19776] submit_bio+0x10c/0x190 [ 260.933849][T19776] submit_bh_wbc+0x2f3/0x330 [ 260.938422][T19776] __sync_dirty_buffer+0x136/0x1e0 [ 260.943507][T19776] ext4_commit_super+0x1f6/0x290 [ 260.948462][T19776] ext4_remount+0xff7/0x1980 [ 260.953140][T19776] ? __dentry_kill+0x456/0x4e0 [ 260.957882][T19776] ? ext4_statfs+0x6b0/0x6b0 [ 260.962450][T19776] legacy_reconfigure+0x8e/0xa0 [ 260.967363][T19776] reconfigure_super+0x2d3/0x4f0 [ 260.972275][T19776] path_mount+0x145a/0x1d20 [ 260.976816][T19776] __se_sys_mount+0x24b/0x2f0 [ 260.981500][T19776] __x64_sys_mount+0x63/0x70 [ 260.986069][T19776] do_syscall_64+0x44/0xa0 [ 260.990522][T19776] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 260.996406][T19776] RIP: 0033:0x467b1a [ 261.000311][T19776] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 261.019903][T19776] RSP: 002b:00007f5595b03fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 261.028292][T19776] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a 00:28:09 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, 0x0, 0x0) 00:28:09 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x900, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:09 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax, 0x22}]}) 00:28:09 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}], [], 0x33}) 00:28:09 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, 0x0) 00:28:09 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, 0x0) [ 261.036292][T19776] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 261.044238][T19776] RBP: 00007f5595b04040 R08: 00007f5595b04040 R09: 00000000200000c0 [ 261.052187][T19776] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 261.060192][T19776] R13: 0000000020000100 R14: 00007f5595b04000 R15: 0000000020000000 00:28:09 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)={0x408000, 0x19, 0x10}, 0x18) move_mount(r0, &(0x7f0000000180)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x1) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000280)=ANY=[@ANYBLOB="6502705fcd2eacfd9abc5bcf063b9e506e728730bfaa30f7c272400917fb4da0a5f588f818a00db896c706d24d843f0ba0da008335fd52a679f5561100fd16fb49bc7a76d9e486079e77223a94b287d1b39ac9d9929d7df647ec80cfd318ad67f170d2bbbc37adad366ef936"]) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r2 = syz_open_pts(r1, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000080)) dup3(r2, r1, 0x0) r4 = epoll_create(0x5) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1, 0x4010, r2, 0x32654000) r5 = dup3(r4, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r3, &(0x7f0000000200)) getdents(r5, &(0x7f0000000000)=""/24, 0x18) 00:28:09 executing program 5 (fault-call:2 fault-nth:13): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:09 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa00, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:09 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, 0x0) 00:28:09 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, 0x0) [ 261.187779][T19805] FAULT_INJECTION: forcing a failure. [ 261.187779][T19805] name failslab, interval 1, probability 0, space 0, times 0 [ 261.200608][T19805] CPU: 1 PID: 19805 Comm: syz-executor.5 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 261.210842][T19805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.220949][T19805] Call Trace: [ 261.224214][T19805] dump_stack_lvl+0xd6/0x122 [ 261.228846][T19805] dump_stack+0x11/0x1b [ 261.232979][T19805] should_fail+0x23c/0x250 00:28:09 executing program 0 (fault-call:10 fault-nth:0): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)) [ 261.237374][T19805] ? getname_flags+0x84/0x3f0 [ 261.242073][T19805] __should_failslab+0x81/0x90 [ 261.246840][T19805] should_failslab+0x5/0x20 [ 261.251515][T19805] kmem_cache_alloc+0x4f/0x300 [ 261.256314][T19805] getname_flags+0x84/0x3f0 [ 261.260795][T19805] getname+0x15/0x20 [ 261.264699][T19805] do_sys_openat2+0x6d/0x2b0 [ 261.269280][T19805] ? __se_sys_mount+0x26f/0x2f0 [ 261.274186][T19805] __x64_sys_openat+0xef/0x110 [ 261.278948][T19805] do_syscall_64+0x44/0xa0 [ 261.283347][T19805] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 261.289222][T19805] RIP: 0033:0x4196e4 [ 261.293091][T19805] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 261.312673][T19805] RSP: 002b:00007f5595b03f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 261.321058][T19805] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004196e4 [ 261.329022][T19805] RDX: 0000000000010000 RSI: 0000000020000100 RDI: 00000000ffffff9c [ 261.336984][T19805] RBP: 0000000020000100 R08: 0000000000000000 R09: 00000000200000c0 [ 261.344933][T19805] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 261.352879][T19805] R13: 0000000020000100 R14: 00007f5595b04000 R15: 0000000020000000 [ 261.692657][T19825] FAULT_INJECTION: forcing a failure. [ 261.692657][T19825] name failslab, interval 1, probability 0, space 0, times 0 [ 261.705267][T19825] CPU: 1 PID: 19825 Comm: syz-executor.0 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 261.715419][T19825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.725486][T19825] Call Trace: [ 261.728744][T19825] dump_stack_lvl+0xd6/0x122 [ 261.733339][T19825] dump_stack+0x11/0x1b [ 261.737471][T19825] should_fail+0x23c/0x250 [ 261.741868][T19825] ? getname_flags+0x84/0x3f0 [ 261.746582][T19825] __should_failslab+0x81/0x90 [ 261.751386][T19825] should_failslab+0x5/0x20 [ 261.755868][T19825] kmem_cache_alloc+0x4f/0x300 [ 261.760662][T19825] ? __cond_resched+0x11/0x40 [ 261.765321][T19825] getname_flags+0x84/0x3f0 [ 261.769809][T19825] __x64_sys_mkdir+0x31/0x50 [ 261.774429][T19825] do_syscall_64+0x44/0xa0 [ 261.778888][T19825] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 261.784761][T19825] RIP: 0033:0x465707 [ 261.788711][T19825] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 261.808294][T19825] RSP: 002b:00007f1443f49fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 261.816688][T19825] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000465707 [ 261.824639][T19825] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000100 [ 261.832587][T19825] RBP: 00007f1443f4a040 R08: 0000000000000000 R09: 0000000000012020 [ 261.840535][T19825] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000200000c0 [ 261.848481][T19825] R13: 0000000020000100 R14: 00007f1443f4a000 R15: 0000000020000180 00:28:10 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}]}) 00:28:10 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='cgroup\x00', 0xc2, &(0x7f0000000200)='[\x00') 00:28:10 executing program 5 (fault-call:2 fault-nth:14): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:10 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xb00, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:10 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 00:28:10 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}]}) [ 262.033180][T19832] EXT4-fs: 79 callbacks suppressed [ 262.033192][T19832] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 262.059125][T19832] EXT4-fs (sda1): re-mounted. Opts: sysvgroups,journal_checksum,,errors=continue. Quota mode: none. [ 262.070119][T19837] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 262.080483][T19837] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. [ 262.090760][T19843] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 262.099040][T19837] FAULT_INJECTION: forcing a failure. [ 262.099040][T19837] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 262.101250][T19843] EXT4-fs (sda1): re-mounted. Opts: sysvgroups,journal_checksum,,errors=continue. Quota mode: none. 00:28:10 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc00, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 262.113059][T19837] CPU: 0 PID: 19837 Comm: syz-executor.5 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 262.124213][T19836] EXT4-fs (sda1): dax option not supported [ 262.133901][T19837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.133913][T19837] Call Trace: [ 262.133921][T19837] dump_stack_lvl+0xd6/0x122 [ 262.157649][T19837] dump_stack+0x11/0x1b [ 262.161784][T19837] should_fail+0x23c/0x250 [ 262.166184][T19837] should_fail_usercopy+0x16/0x20 [ 262.171184][T19837] strncpy_from_user+0x21/0x250 [ 262.176014][T19837] getname_flags+0xb8/0x3f0 [ 262.180502][T19837] getname+0x15/0x20 [ 262.184467][T19837] do_sys_openat2+0x6d/0x2b0 [ 262.189095][T19837] ? __se_sys_mount+0x26f/0x2f0 [ 262.193926][T19837] __x64_sys_openat+0xef/0x110 [ 262.198676][T19837] do_syscall_64+0x44/0xa0 [ 262.203075][T19837] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 262.208952][T19837] RIP: 0033:0x4196e4 [ 262.212824][T19837] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 262.232406][T19837] RSP: 002b:00007f5595b03f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 262.240844][T19837] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004196e4 [ 262.248792][T19837] RDX: 0000000000010000 RSI: 0000000020000100 RDI: 00000000ffffff9c [ 262.256739][T19837] RBP: 0000000020000100 R08: 0000000000000000 R09: 00000000200000c0 [ 262.264782][T19837] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 262.272734][T19837] R13: 0000000020000100 R14: 00007f5595b04000 R15: 0000000020000000 [ 262.280950][T19844] cgroup: Unknown subsys name '[' [ 262.284029][T19841] EXT4-fs (sda1): re-mounted. Opts: sysvgroups,,errors=continue. Quota mode: none. 00:28:10 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}]}) [ 262.332402][T19836] EXT4-fs (sda1): dax option not supported 00:28:10 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 262.398615][T19851] EXT4-fs (sda1): re-mounted. Opts: sysvgroups,,errors=continue. Quota mode: none. 00:28:10 executing program 0 (fault-call:10 fault-nth:1): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:11 executing program 5 (fault-call:2 fault-nth:15): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:11 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x21) mount$tmpfs(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000180), 0x20a009, &(0x7f00000003c0)=ANY=[@ANYBLOB="687567653d616c7761797301687567653d616c776179732c6d6f64653d30303030303030303030303030203030303030303053002b30342c687567653d77697468696e400000000000000064653d30303030303030303030303030060c30303030303031312c726f6f74636f6e746578743d73746166665f7565723d739ab3b860415ade41b8d12a5c9aeeb16ca80f6e22eba18457386e2d21", @ANYRESDEC=0xee00, @ANYBLOB=',context=system_u,\x00']) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000280)={'L-', 0x298}, 0x16, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) [ 262.601716][T19863] FAULT_INJECTION: forcing a failure. [ 262.601716][T19863] name failslab, interval 1, probability 0, space 0, times 0 [ 262.614465][T19863] CPU: 1 PID: 19863 Comm: syz-executor.5 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 262.624615][T19863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.634666][T19863] Call Trace: [ 262.637929][T19863] dump_stack_lvl+0xd6/0x122 [ 262.642500][T19863] dump_stack+0x11/0x1b [ 262.646632][T19863] should_fail+0x23c/0x250 [ 262.651025][T19863] ? __alloc_file+0x2e/0x1a0 [ 262.655601][T19863] __should_failslab+0x81/0x90 [ 262.660353][T19863] should_failslab+0x5/0x20 [ 262.664857][T19863] kmem_cache_alloc+0x4f/0x300 [ 262.669689][T19863] __alloc_file+0x2e/0x1a0 [ 262.674108][T19863] alloc_empty_file+0xcd/0x1c0 [ 262.678885][T19863] path_openat+0x6a/0x1ec0 [ 262.683344][T19863] ? ext4_remount+0x1788/0x1980 [ 262.688228][T19863] ? __dentry_kill+0x456/0x4e0 [ 262.693024][T19863] do_filp_open+0x105/0x220 [ 262.697510][T19863] do_sys_openat2+0xb5/0x2b0 [ 262.702097][T19863] ? __se_sys_mount+0x26f/0x2f0 [ 262.706963][T19863] __x64_sys_openat+0xef/0x110 [ 262.711803][T19863] do_syscall_64+0x44/0xa0 [ 262.716208][T19863] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 262.722110][T19863] RIP: 0033:0x4196e4 [ 262.725988][T19863] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 262.745599][T19863] RSP: 002b:00007f5595b03f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 262.754008][T19863] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004196e4 [ 262.761976][T19863] RDX: 0000000000010000 RSI: 0000000020000100 RDI: 00000000ffffff9c [ 262.769945][T19863] RBP: 0000000020000100 R08: 0000000000000000 R09: 00000000200000c0 [ 262.777979][T19863] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 262.785938][T19863] R13: 0000000020000100 R14: 00007f5595b04000 R15: 0000000020000000 [ 262.794417][T19869] FAULT_INJECTION: forcing a failure. [ 262.794417][T19869] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 262.807520][T19869] CPU: 0 PID: 19869 Comm: syz-executor.0 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 262.817674][T19869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.827801][T19869] Call Trace: [ 262.831070][T19869] dump_stack_lvl+0xd6/0x122 [ 262.835659][T19869] dump_stack+0x11/0x1b [ 262.839792][T19869] should_fail+0x23c/0x250 [ 262.844265][T19869] should_fail_usercopy+0x16/0x20 [ 262.849265][T19869] strncpy_from_user+0x21/0x250 [ 262.854106][T19869] getname_flags+0xb8/0x3f0 [ 262.858619][T19869] __x64_sys_mkdir+0x31/0x50 [ 262.863193][T19869] do_syscall_64+0x44/0xa0 [ 262.867670][T19869] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 262.873553][T19869] RIP: 0033:0x465707 [ 262.877426][T19869] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 00:28:11 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 00:28:11 executing program 4 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:11 executing program 5 (fault-call:2 fault-nth:16): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:11 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd00, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 262.897007][T19869] RSP: 002b:00007f1443f49fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 262.905461][T19869] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000465707 [ 262.913502][T19869] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000100 [ 262.921482][T19869] RBP: 00007f1443f4a040 R08: 0000000000000000 R09: 0000000000012020 [ 262.929433][T19869] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000200000c0 [ 262.937426][T19869] R13: 0000000020000100 R14: 00007f1443f4a000 R15: 0000000020000180 [ 262.980314][T19877] FAULT_INJECTION: forcing a failure. [ 262.980314][T19877] name failslab, interval 1, probability 0, space 0, times 0 [ 262.982538][T19876] FAULT_INJECTION: forcing a failure. [ 262.982538][T19876] name failslab, interval 1, probability 0, space 0, times 0 [ 262.993004][T19877] CPU: 1 PID: 19877 Comm: syz-executor.5 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 263.015639][T19877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.025682][T19877] Call Trace: [ 263.028944][T19877] dump_stack_lvl+0xd6/0x122 [ 263.033571][T19877] dump_stack+0x11/0x1b [ 263.037710][T19877] should_fail+0x23c/0x250 [ 263.042113][T19877] ? security_file_alloc+0x30/0x190 [ 263.047455][T19877] __should_failslab+0x81/0x90 [ 263.052207][T19877] should_failslab+0x5/0x20 [ 263.056697][T19877] kmem_cache_alloc+0x4f/0x300 [ 263.061570][T19877] security_file_alloc+0x30/0x190 [ 263.066667][T19877] __alloc_file+0x83/0x1a0 [ 263.071134][T19877] alloc_empty_file+0xcd/0x1c0 [ 263.075965][T19877] path_openat+0x6a/0x1ec0 [ 263.080374][T19877] ? ext4_remount+0x1788/0x1980 [ 263.085212][T19877] ? __dentry_kill+0x456/0x4e0 [ 263.090032][T19877] do_filp_open+0x105/0x220 [ 263.094543][T19877] do_sys_openat2+0xb5/0x2b0 [ 263.099120][T19877] ? __se_sys_mount+0x26f/0x2f0 [ 263.103960][T19877] __x64_sys_openat+0xef/0x110 [ 263.108714][T19877] do_syscall_64+0x44/0xa0 [ 263.113160][T19877] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 263.119054][T19877] RIP: 0033:0x4196e4 [ 263.122931][T19877] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 263.142524][T19877] RSP: 002b:00007f5595b03f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 263.150923][T19877] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004196e4 [ 263.158878][T19877] RDX: 0000000000010000 RSI: 0000000020000100 RDI: 00000000ffffff9c [ 263.166835][T19877] RBP: 0000000020000100 R08: 0000000000000000 R09: 00000000200000c0 [ 263.174873][T19877] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 263.182827][T19877] R13: 0000000020000100 R14: 00007f5595b04000 R15: 0000000020000000 [ 263.190788][T19876] CPU: 0 PID: 19876 Comm: syz-executor.4 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 263.200954][T19876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.211022][T19876] Call Trace: [ 263.214295][T19876] dump_stack_lvl+0xd6/0x122 [ 263.218941][T19876] dump_stack+0x11/0x1b [ 263.223073][T19876] should_fail+0x23c/0x250 [ 263.227469][T19876] ? getname_flags+0x84/0x3f0 [ 263.232129][T19876] __should_failslab+0x81/0x90 [ 263.236870][T19876] should_failslab+0x5/0x20 [ 263.241353][T19876] kmem_cache_alloc+0x4f/0x300 [ 263.246214][T19876] ? __cond_resched+0x11/0x40 [ 263.250876][T19876] getname_flags+0x84/0x3f0 [ 263.255472][T19876] __x64_sys_mkdir+0x31/0x50 [ 263.260044][T19876] do_syscall_64+0x44/0xa0 [ 263.264449][T19876] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 263.270348][T19876] RIP: 0033:0x465707 [ 263.274233][T19876] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 263.293919][T19876] RSP: 002b:00007f09f3a6afa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 263.302375][T19876] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000465707 [ 263.310329][T19876] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000100 [ 263.318287][T19876] RBP: 00007f09f3a6b040 R08: 0000000000000000 R09: 0000000000012020 00:28:11 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x34, 0x0, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_TX_POWER={0x8, 0xb, 0x3}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x48001}, 0x4000000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) 00:28:11 executing program 5 (fault-call:2 fault-nth:17): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 263.326249][T19876] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000200000c0 [ 263.334209][T19876] R13: 0000000020000100 R14: 00007f09f3a6b000 R15: 0000000020000000 00:28:11 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe00, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:11 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x4200, 0x0) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@random={'trusted.', ':\x00'}, &(0x7f0000000100)='\x00', 0x1, 0x0) [ 263.394830][T19893] FAULT_INJECTION: forcing a failure. [ 263.394830][T19893] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 263.407918][T19893] CPU: 1 PID: 19893 Comm: syz-executor.5 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 263.418144][T19893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.428226][T19893] Call Trace: [ 263.431493][T19893] dump_stack_lvl+0xd6/0x122 [ 263.436084][T19893] dump_stack+0x11/0x1b [ 263.440242][T19893] should_fail+0x23c/0x250 [ 263.444663][T19893] should_fail_usercopy+0x16/0x20 [ 263.449685][T19893] _copy_to_user+0x1c/0x90 [ 263.454174][T19893] simple_read_from_buffer+0xab/0x120 [ 263.459551][T19893] proc_fail_nth_read+0x10d/0x150 [ 263.464638][T19893] ? proc_fault_inject_write+0x230/0x230 [ 263.470270][T19893] vfs_read+0x1e6/0x750 [ 263.474423][T19893] ? putname+0xb8/0xd0 [ 263.478496][T19893] ? __fget_light+0x21b/0x260 [ 263.483173][T19893] ? __cond_resched+0x11/0x40 [ 263.487840][T19893] ksys_read+0xd9/0x190 [ 263.491997][T19893] __x64_sys_read+0x3e/0x50 [ 263.496494][T19893] do_syscall_64+0x44/0xa0 [ 263.500912][T19893] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 263.506806][T19893] RIP: 0033:0x41937c [ 263.510692][T19893] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 263.530298][T19893] RSP: 002b:00007f5595b04170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 263.538699][T19893] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000041937c [ 263.546664][T19893] RDX: 000000000000000f RSI: 00007f5595b041e0 RDI: 0000000000000003 [ 263.554674][T19893] RBP: 00007f5595b041d0 R08: 0000000000000000 R09: 00000000200000c0 [ 263.562683][T19893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 263.570656][T19893] R13: 00007ffcd8153b2f R14: 00007f5595b04300 R15: 0000000000022000 00:28:12 executing program 0 (fault-call:10 fault-nth:2): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:12 executing program 4 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:12 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:12 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='sockfs\x00', 0x800, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000040)=ANY=[@ANYBLOB="ea77c7c99db4443e014e805ab6c93654bfc6d4b4b8a68f0000003d0000000000000000bc0d0200000000000000875b9a7cf556"]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1, 0x22) [ 263.701785][T19908] FAULT_INJECTION: forcing a failure. [ 263.701785][T19908] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 263.714920][T19908] CPU: 0 PID: 19908 Comm: syz-executor.4 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 263.725053][T19908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.735168][T19908] Call Trace: [ 263.738444][T19908] dump_stack_lvl+0xd6/0x122 [ 263.742349][T19914] FAULT_INJECTION: forcing a failure. [ 263.742349][T19914] name failslab, interval 1, probability 0, space 0, times 0 [ 263.743038][T19908] dump_stack+0x11/0x1b [ 263.759750][T19908] should_fail+0x23c/0x250 [ 263.764177][T19908] should_fail_usercopy+0x16/0x20 [ 263.769194][T19908] strncpy_from_user+0x21/0x250 [ 263.774089][T19908] getname_flags+0xb8/0x3f0 [ 263.778620][T19908] __x64_sys_mkdir+0x31/0x50 [ 263.783203][T19908] do_syscall_64+0x44/0xa0 [ 263.787614][T19908] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 263.793613][T19908] RIP: 0033:0x465707 [ 263.797556][T19908] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 263.817237][T19908] RSP: 002b:00007f09f3a6afa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 263.825636][T19908] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000465707 [ 263.833595][T19908] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000100 [ 263.841551][T19908] RBP: 00007f09f3a6b040 R08: 0000000000000000 R09: 0000000000012020 [ 263.849590][T19908] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000200000c0 [ 263.857553][T19908] R13: 0000000020000100 R14: 00007f09f3a6b000 R15: 0000000020000000 [ 263.865532][T19914] CPU: 1 PID: 19914 Comm: syz-executor.0 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 263.875686][T19914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.885737][T19914] Call Trace: [ 263.889001][T19914] dump_stack_lvl+0xd6/0x122 [ 263.893577][T19914] dump_stack+0x11/0x1b [ 263.897722][T19914] should_fail+0x23c/0x250 [ 263.902117][T19914] ? __se_sys_mount+0x4e/0x2f0 [ 263.906866][T19914] __should_failslab+0x81/0x90 [ 263.911616][T19914] should_failslab+0x5/0x20 [ 263.916098][T19914] __kmalloc_track_caller+0x6d/0x350 [ 263.921423][T19914] ? do_mkdirat+0x293/0x2c0 [ 263.925911][T19914] ? strnlen_user+0x137/0x1c0 [ 263.930570][T19914] strndup_user+0x73/0x120 [ 263.934982][T19914] __se_sys_mount+0x4e/0x2f0 [ 263.939557][T19914] ? do_mkdirat+0x293/0x2c0 [ 263.944063][T19914] __x64_sys_mount+0x63/0x70 [ 263.948677][T19914] do_syscall_64+0x44/0xa0 [ 263.953078][T19914] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 263.958955][T19914] RIP: 0033:0x467b1a [ 263.962830][T19914] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 263.982417][T19914] RSP: 002b:00007f1443f49fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 263.990807][T19914] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 263.998759][T19914] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 264.006754][T19914] RBP: 00007f1443f4a040 R08: 00007f1443f4a040 R09: 00000000200000c0 [ 264.014710][T19914] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 264.022677][T19914] R13: 0000000020000100 R14: 00007f1443f4a000 R15: 0000000020000180 00:28:12 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 00:28:12 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:12 executing program 4 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:12 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1100, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:12 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0xffff, 0x8, &(0x7f00000006c0)=[{&(0x7f0000000280)="21f74a37768ac281fecc86aa5bafbe3a6bb9888c1ce815d2ae4d65772d79ae353463b9d705fe7ae06f43d771b241b7abc2713e2727092172a831bb6695f5fbea4acc0ba96951ff7a012f7e94dc572536a9f5edce437bbe2c9ab80e", 0x5b, 0x6}, {&(0x7f0000000300)="08ffb3e076225754950c15c8a5d874", 0xf, 0x4}, {&(0x7f00000003c0)="b50d75fb51450818d055367792c91df92c8b954a854af20ad6934f2dcccc1d9b35d1b1bf3b5309d0fed7a89e481d550c7726430144f3cb807e286f5c196c0fbf9546f8c5f582795eaf4bc09912cd096cfee382df5e6cedcaa5e4c925c4a79adb37e51ec4d768cfa03136a87dc88fb1ce131a69ab1d0fb73a5e4c22504afd35153674ac3ae35cb9ed9131518303b450093589aa29fba4255d8133fa250036aee1cd76c31c92", 0xa5, 0x9}, {&(0x7f0000000340)="96be2bff4a7559e53047d1169eaf464e9ce294c6779ee411ae0feaefa73fb03f76a764d73cdf867b2c6aaae4e2b19b12", 0x30, 0x1}, {&(0x7f0000000480)="7b39988d6116af37f32f9cb5a68c4e224176e616e0b6a3d6e74f37b5cb495b5dc7559e9f75924324c971194c874fbcc027e000e43cca7406d9d24cb674e226f575ae52c68a88c27eb27db7452264ec91078851b29818d078ee745d65969514f85c7846e6a841eae17302f9e3906943ffc695252954d9e6ce506db1383714491e1919", 0x82, 0xfa}, {&(0x7f0000000540)="5837124b3aa291e73837ca0aefd39223302c01775c0e15354fbf0e99cfbb17f4d997738bf33060218ed0c59fc802d22d1e281ad50df1f83a2d3dd3d112af2a6bfb2d29", 0x43, 0xff}, {&(0x7f00000005c0)="871a059b3590243dedd9009d1a8ac062076a9b33ed4c6532c0df6c75dda17ba3e8c913898674cf1573f7f097c5cbdb2ce9129c1ed96c69f841dd2af7d2f81b9f3c54dc456e63f3f1c650bb241b4b43707bdce5c917250f20cc10080d4a61e6d06b4cd2928cf5b90b23561ddbeb2e08d61d6f2bd2c6b8a361bbd1ccd3886f807691c12d3be4dfda721dae4dee5c3ba721cf2ccfeb7fbdea2a200e241d1e5ade6e6f8379959e989ddf3f500c9e3df9a9105d611a8bab", 0xb5, 0x8000}, {&(0x7f0000000680)="e41335e9264ade8d08c30a76f59ab7370e72a837f0e730a8524479a101e1b6cee77ef6e82827b36fdd6b51e8b2d97f3e1c86", 0x32, 0x10000}], 0x40040, &(0x7f0000000780)={[{@grpquota}, {@nombcache}, {@nojournal_checksum}, {@nojournal_checksum}, {@data_err_ignore}], [{@fowner_lt={'fowner<', 0xee01}}]}) mkdir(&(0x7f00000008c0)='./file0\x00', 0x20) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)=ANY=[@ANYBLOB="0047f3777f"]) name_to_handle_at(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=@xfs_parent={0x1c, 0x82, {0x1000, 0x14000, 0x1000, 0x8}}, &(0x7f0000000180), 0x1400) mount$bind(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00', &(0x7f0000000880), 0x0, 0x0) [ 264.232066][T19926] loop3: detected capacity change from 0 to 256 [ 264.257884][T19936] FAULT_INJECTION: forcing a failure. [ 264.257884][T19936] name failslab, interval 1, probability 0, space 0, times 0 [ 264.270533][T19936] CPU: 0 PID: 19936 Comm: syz-executor.4 Tainted: G W 5.15.0-rc1-syzkaller #0 00:28:12 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1200, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:12 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 264.280687][T19936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.290732][T19936] Call Trace: [ 264.293996][T19936] dump_stack_lvl+0xd6/0x122 [ 264.298569][T19936] dump_stack+0x11/0x1b [ 264.302704][T19936] should_fail+0x23c/0x250 [ 264.307096][T19936] ? __se_sys_mount+0x4e/0x2f0 [ 264.311841][T19936] __should_failslab+0x81/0x90 [ 264.316584][T19936] should_failslab+0x5/0x20 [ 264.321077][T19936] __kmalloc_track_caller+0x6d/0x350 [ 264.326342][T19936] ? do_mkdirat+0x293/0x2c0 [ 264.330830][T19936] ? strnlen_user+0x137/0x1c0 [ 264.335487][T19936] strndup_user+0x73/0x120 [ 264.339885][T19936] __se_sys_mount+0x4e/0x2f0 [ 264.344454][T19936] ? do_mkdirat+0x293/0x2c0 [ 264.349007][T19936] __x64_sys_mount+0x63/0x70 [ 264.353580][T19936] do_syscall_64+0x44/0xa0 [ 264.357992][T19936] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 264.363906][T19936] RIP: 0033:0x467b1a [ 264.367777][T19936] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 264.387362][T19936] RSP: 002b:00007f09f3a6afa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 264.395756][T19936] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 264.403710][T19936] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 264.411669][T19936] RBP: 00007f09f3a6b040 R08: 00007f09f3a6b040 R09: 00000000200000c0 [ 264.419629][T19936] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 00:28:12 executing program 4 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 264.427582][T19936] R13: 0000000020000100 R14: 00007f09f3a6b000 R15: 0000000020000000 00:28:13 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file1\x00', 0xd5, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f6a6f75726e616c5f63ff65636b73756d2c6461782c5f71666d743d7666736f6c642c7265737569643d", @ANYRESHEX=0x0, @ANYBLOB=',journal_dev=0x0000000000000002,data=journal,acl,\x00']) 00:28:13 executing program 0 (fault-call:10 fault-nth:3): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)) [ 264.556461][T19957] FAULT_INJECTION: forcing a failure. [ 264.556461][T19957] name failslab, interval 1, probability 0, space 0, times 0 [ 264.569135][T19957] CPU: 1 PID: 19957 Comm: syz-executor.4 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 264.579287][T19957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.589332][T19957] Call Trace: [ 264.592609][T19957] dump_stack_lvl+0xd6/0x122 [ 264.597201][T19957] dump_stack+0x11/0x1b [ 264.601345][T19957] should_fail+0x23c/0x250 [ 264.605755][T19957] ? security_inode_alloc+0x30/0x180 [ 264.611035][T19957] __should_failslab+0x81/0x90 [ 264.615794][T19957] should_failslab+0x5/0x20 [ 264.620286][T19957] kmem_cache_alloc+0x4f/0x300 [ 264.625045][T19957] security_inode_alloc+0x30/0x180 [ 264.630153][T19957] inode_init_always+0x20d/0x440 [ 264.635094][T19957] ? set_qf_name+0x230/0x230 [ 264.639681][T19957] new_inode_pseudo+0x73/0x1c0 [ 264.644444][T19957] new_inode+0x21/0x120 [ 264.648591][T19957] __ext4_new_inode+0x13f/0x2fd0 [ 264.653526][T19957] ? __dquot_initialize+0x13d/0x7f0 [ 264.658715][T19957] ext4_mkdir+0x28a/0x760 [ 264.663057][T19957] vfs_mkdir+0x2c3/0x3e0 [ 264.667309][T19957] do_mkdirat+0x12e/0x2c0 [ 264.671656][T19957] __x64_sys_mkdir+0x40/0x50 [ 264.676255][T19957] do_syscall_64+0x44/0xa0 [ 264.680670][T19957] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 264.686575][T19957] RIP: 0033:0x465707 [ 264.690464][T19957] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 264.710064][T19957] RSP: 002b:00007f09f3a49fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 264.718477][T19957] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000465707 [ 264.726446][T19957] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000100 [ 264.734424][T19957] RBP: 00007f09f3a4a040 R08: 0000000000000000 R09: 0000000000012020 [ 264.742393][T19957] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000200000c0 00:28:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)={0x30, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x5, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0x30}}, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00000005c0f68b", @ANYRES32=0x0, @ANYBLOB="11000700dc8a41fc425c62d992f293228200000004000b0008006e8004000200300050800d000400fe9e8de6e2fb63eb23000000100008800400020004000100040001000a000400ce6209a3d0540000"], 0x6c}, 0x1, 0x0, 0x0, 0x50}, 0x40) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)={0x30, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x5, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0x30}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)={0x30, r6, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x5, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0x30}}, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000001340)={0x15e4, r6, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_FEATURES_WANTED={0x3f0, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x82, 0x5, "8e3a9a33d747d087117422dcd39b5300705cbdf3c7ccab126d07c58d6ce23e5aa7f31f3c06228d084f37de703954116679cd19fbd90d571db5f7c2f1b2aa26d255663bcc7ae001b0e1d6665ba0780f5a8be96f068d7c36cac746a0b33ab1d245db1b214548f611a8283bcd858504a31942e2ddfbd2eb1a4de9952c030f3c"}, @ETHTOOL_A_BITSET_BITS={0xc8, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'nl80211\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xe0}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'dax'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ':\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'dax'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0xe1, 0x4, "514e07472914d8a1d4581e00b9b92fda04c705bf77e170d753708a1616cd9f3545b6816b6a0281228f4c5fbd31b8d9186d57b807cf9ebb74448faa6d3dbc4a1adada162654fa6d7afa153106bfc0f756fe497bda5d823c28717df3acdbc847581eb9d07d10b6c79719602383b4c87fe2a4282c6e0de40a6586b0d25b2973f6714f5411685faa8b79849825c89500776ae2725b9329e8ff62fd4c4b2ca657cac5fae139b239b230c453fe1c67732d1dd1c0d3a3a5291dbe824d1fa20e90e10c0936385cbaddf7508730b8092e707af64338f0887bfb0336f0b92b05bfb2"}, @ETHTOOL_A_BITSET_MASK={0x39, 0x5, "d0683f8977f0c504baff421086a0f21758c807e45755882b77dddaa6a29f6e325df23ecee377eb85bbe33c782a17fbcd9581c448af"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}, @ETHTOOL_A_BITSET_BITS={0x174, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '!(%#\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '*-{\x00)l)\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '.$}\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'nl80211\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'nl80211\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'nl80211\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x400}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x751d}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\\-[\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\\#\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8000}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x173}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xf9\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'nl80211\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'dax'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'dax'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x114, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x89, 0x5, "acaa7529b3f7d0dd4b07f51fe62e8e05322dbf05ebab0b3f798b5990a6847f30f73cf1b0547b766bf743a882ae0722484b21de9726996b1f033a3162b571fe592da2f06a2e12c37bcfda23eeb5990fceb8756a908308733ea3ec8e61bdaf7fb7fa955649ed2a02036af1d7c0f29ca74ce52cba220dea38e9242ce856532e443e8b07840e46"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x29c7b766}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x77, 0x5, "bc7ce7133830a5497af552b31df26c45359002f6fb1962ca9bc8141b4020a9705b63107578274aea51be6a49dbbc26db3be39ec94549b3bcf4eea19aa8b19cdc4a2dab053b1ad024faa8a0e1bf185c733d253837528c31feadcf09c98cae4f0461df9fd52c0b4c6fced760d5b152874441cd07"}]}, @ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xe3c3d19732a6d8bc}]}, @ETHTOOL_A_FEATURES_WANTED={0x10a0, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}, @ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0x88, 0x5, "ca11a9f6da219fd848d45db3e4b98926b97c6838a430ff61e8902b3b37fb3cc7db36534257a7728f73b1a3899c4fea4a6e8d1594e694bb0269c75ce8c3e2ac60779f88d10fc45a19c746641fdb0aeb379826d37e9e2c33d8ed4e9eea23e56f1063834961840b98fa50e9a9a264d897fb5fabec1e348c6bd055a4a8628602cc353be582ae"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xfffffd82}]}]}, 0x15e4}, 0x1, 0x0, 0x0, 0x20000010}, 0x800) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) [ 264.750358][T19957] R13: 0000000020000100 R14: 00007f09f3a4a000 R15: 0000000020000000 [ 264.766301][T19967] FAULT_INJECTION: forcing a failure. [ 264.766301][T19967] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 264.779430][T19967] CPU: 0 PID: 19967 Comm: syz-executor.0 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 264.789582][T19967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.799626][T19967] Call Trace: [ 264.802891][T19967] dump_stack_lvl+0xd6/0x122 00:28:13 executing program 4 (fault-call:2 fault-nth:4): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 264.807475][T19967] dump_stack+0x11/0x1b [ 264.811619][T19967] should_fail+0x23c/0x250 [ 264.816041][T19967] should_fail_usercopy+0x16/0x20 [ 264.821068][T19967] _copy_from_user+0x1c/0xd0 [ 264.825655][T19967] strndup_user+0xb0/0x120 [ 264.830078][T19967] __se_sys_mount+0x4e/0x2f0 [ 264.834676][T19967] ? do_mkdirat+0x293/0x2c0 [ 264.839193][T19967] __x64_sys_mount+0x63/0x70 [ 264.843794][T19967] do_syscall_64+0x44/0xa0 [ 264.848218][T19967] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 264.854102][T19967] RIP: 0033:0x467b1a [ 264.857991][T19967] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 264.860093][T19975] FAULT_INJECTION: forcing a failure. [ 264.860093][T19975] name failslab, interval 1, probability 0, space 0, times 0 [ 264.877589][T19967] RSP: 002b:00007f1443f49fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 264.877611][T19967] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 264.877625][T19967] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 264.914453][T19967] RBP: 00007f1443f4a040 R08: 00007f1443f4a040 R09: 00000000200000c0 [ 264.922412][T19967] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 264.930372][T19967] R13: 0000000020000100 R14: 00007f1443f4a000 R15: 0000000020000180 [ 264.938336][T19975] CPU: 1 PID: 19975 Comm: syz-executor.4 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 264.948482][T19975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.958513][T19975] Call Trace: [ 264.961784][T19975] dump_stack_lvl+0xd6/0x122 [ 264.966367][T19975] dump_stack+0x11/0x1b [ 264.970506][T19975] should_fail+0x23c/0x250 [ 264.974901][T19975] __should_failslab+0x81/0x90 [ 264.979646][T19975] ? __se_sys_mount+0xf7/0x2f0 [ 264.984389][T19975] should_failslab+0x5/0x20 [ 264.988873][T19975] kmem_cache_alloc_trace+0x52/0x320 [ 264.994143][T19975] ? _copy_from_user+0x94/0xd0 [ 264.998893][T19975] __se_sys_mount+0xf7/0x2f0 [ 265.003462][T19975] __x64_sys_mount+0x63/0x70 [ 265.008030][T19975] do_syscall_64+0x44/0xa0 [ 265.012427][T19975] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 265.018302][T19975] RIP: 0033:0x467b1a [ 265.022187][T19975] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 265.041776][T19975] RSP: 002b:00007f09f3a6afa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 265.050167][T19975] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a 00:28:13 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 00:28:13 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1800, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:13 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:13 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2992490, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) 00:28:13 executing program 4 (fault-call:2 fault-nth:5): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 265.058116][T19975] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 265.066065][T19975] RBP: 00007f09f3a6b040 R08: 00007f09f3a6b040 R09: 00000000200000c0 [ 265.074018][T19975] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 265.081972][T19975] R13: 0000000020000100 R14: 00007f09f3a6b000 R15: 0000000020000000 00:28:13 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:13 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1900, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 265.189353][T19994] FAULT_INJECTION: forcing a failure. [ 265.189353][T19994] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 265.202424][T19994] CPU: 0 PID: 19994 Comm: syz-executor.4 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 265.212566][T19994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.222617][T19994] Call Trace: [ 265.225891][T19994] dump_stack_lvl+0xd6/0x122 [ 265.230480][T19994] dump_stack+0x11/0x1b [ 265.234637][T19994] should_fail+0x23c/0x250 [ 265.239044][T19994] should_fail_usercopy+0x16/0x20 [ 265.244063][T19994] _copy_from_user+0x1c/0xd0 [ 265.248644][T19994] __se_sys_mount+0x119/0x2f0 [ 265.253327][T19994] __x64_sys_mount+0x63/0x70 [ 265.257916][T19994] do_syscall_64+0x44/0xa0 [ 265.262325][T19994] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 265.268220][T19994] RIP: 0033:0x467b1a [ 265.272107][T19994] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 265.291711][T19994] RSP: 002b:00007f09f3a6afa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 265.300122][T19994] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 265.308083][T19994] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 265.316041][T19994] RBP: 00007f09f3a6b040 R08: 00007f09f3a6b040 R09: 00000000200000c0 [ 265.324004][T19994] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 265.331972][T19994] R13: 0000000020000100 R14: 00007f09f3a6b000 R15: 0000000020000000 00:28:13 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)=ANY=[@ANYBLOB="006fc40453ea0ffe07773b1a2535a49d6b7425003afe3ff708f7"]) r1 = geteuid() r2 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r5) r6 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r7) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000004900)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r8, @ANYBLOB=',wfdno=', @ANYRESHEX=r9, @ANYBLOB=',dfltuid=', @ANYRESHEX=r11]) setxattr$system_posix_acl(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000300)={{}, {0x1, 0x4}, [{0x2, 0x1, 0xee00}, {0x2, 0x6}, {0x2, 0x3, 0xee01}, {0x2, 0x2, r1}, {0x2, 0x1, r3}, {0x2, 0x6, r5}, {0x2, 0x6, r7}], {0x4, 0x6}, [{0x8, 0x5, r11}], {0x10, 0x2}, {0x20, 0x3}}, 0x64, 0x3) chdir(&(0x7f0000000040)='./file1\x00') openat(r0, &(0x7f0000000000)='./file1\x00', 0x800, 0x89) 00:28:14 executing program 0 (fault-call:10 fault-nth:4): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:14 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2200, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:14 executing program 4 (fault-call:2 fault-nth:6): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:14 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 265.582592][T20025] FAULT_INJECTION: forcing a failure. [ 265.582592][T20025] name failslab, interval 1, probability 0, space 0, times 0 [ 265.595232][T20025] CPU: 0 PID: 20025 Comm: syz-executor.4 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 265.605403][T20025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.615446][T20025] Call Trace: [ 265.618706][T20025] dump_stack_lvl+0xd6/0x122 [ 265.623295][T20025] dump_stack+0x11/0x1b [ 265.627430][T20025] should_fail+0x23c/0x250 [ 265.631827][T20025] ? getname_flags+0x84/0x3f0 [ 265.636483][T20025] __should_failslab+0x81/0x90 [ 265.641226][T20025] should_failslab+0x5/0x20 [ 265.645708][T20025] kmem_cache_alloc+0x4f/0x300 [ 265.650446][T20025] ? should_fail+0xd6/0x250 [ 265.654927][T20025] getname_flags+0x84/0x3f0 [ 265.659418][T20025] ? should_fail+0xd6/0x250 [ 265.663901][T20025] user_path_at_empty+0x28/0x110 [ 265.668825][T20025] __se_sys_mount+0x217/0x2f0 [ 265.673483][T20025] __x64_sys_mount+0x63/0x70 [ 265.678055][T20025] do_syscall_64+0x44/0xa0 [ 265.682456][T20025] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 265.688339][T20025] RIP: 0033:0x467b1a [ 265.692213][T20025] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 265.711808][T20025] RSP: 002b:00007f09f3a6afa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 265.720198][T20025] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 265.728149][T20025] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 265.736104][T20025] RBP: 00007f09f3a6b040 R08: 00007f09f3a6b040 R09: 00000000200000c0 [ 265.744067][T20025] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 265.752016][T20025] R13: 0000000020000100 R14: 00007f09f3a6b000 R15: 0000000020000000 [ 265.760535][T20029] FAULT_INJECTION: forcing a failure. [ 265.760535][T20029] name failslab, interval 1, probability 0, space 0, times 0 [ 265.773148][T20029] CPU: 0 PID: 20029 Comm: syz-executor.0 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 265.783287][T20029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.793323][T20029] Call Trace: [ 265.796598][T20029] dump_stack_lvl+0xd6/0x122 [ 265.801197][T20029] dump_stack+0x11/0x1b [ 265.805353][T20029] should_fail+0x23c/0x250 [ 265.809759][T20029] __should_failslab+0x81/0x90 [ 265.814537][T20029] ? __se_sys_mount+0xf7/0x2f0 [ 265.819305][T20029] should_failslab+0x5/0x20 [ 265.823801][T20029] kmem_cache_alloc_trace+0x52/0x320 [ 265.829066][T20029] ? _copy_from_user+0x94/0xd0 [ 265.833810][T20029] __se_sys_mount+0xf7/0x2f0 [ 265.838378][T20029] __x64_sys_mount+0x63/0x70 [ 265.842953][T20029] do_syscall_64+0x44/0xa0 [ 265.847356][T20029] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 265.853236][T20029] RIP: 0033:0x467b1a [ 265.857121][T20029] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 265.876822][T20029] RSP: 002b:00007f1443f49fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 265.885228][T20029] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 265.893179][T20029] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 265.901131][T20029] RBP: 00007f1443f4a040 R08: 00007f1443f4a040 R09: 00000000200000c0 [ 265.909093][T20029] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 265.917044][T20029] R13: 0000000020000100 R14: 00007f1443f4a000 R15: 0000000020000180 00:28:14 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:14 executing program 4 (fault-call:2 fault-nth:7): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:14 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2500, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:14 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 00:28:14 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000180)='./file1\x00', 0xfff, 0x7, &(0x7f0000001540)=[{&(0x7f0000000200)="2d3158ae2c6524ccfe8a4c8de4ca7480685dde991ed89361706ed2899600bb3edd2206a6e10cacf80a870c5e068bfabeabb34c8f1a4ac2f963b99b343e56d29351be0280372950dfa3b424787880fe63b8111a25c68fb590719f5260b462891381a8009f2991a8a7f23a3adcc389cc4ec32328abff89540120f4df00cd7c3d20d60e9258edbfbc37f05aaaa92162d757f502524b5a24777238b1cdf4384e69bd7ea97bb5d9ad8741aaba112bdd07e79b84f84880a516170615d685cb88c49e", 0xbf, 0x100000001}, {&(0x7f00000002c0)="910893f3fcacf303f94f43499d60039fdb072fa977e30ea5b854d0e1fb9f93", 0x1f}, {&(0x7f0000000300)="deeeae50e6c798a6d2745dd97533bad1476f1639d87670d5ff4892d63b2b4365259d61f99ffc9ab3bb89caed47e84bfe585102fad0222770d187f3fe20e7cdd194491b5a247e7b0e08236d8d950963b19c854644331f0b4daeacb871fa8c7a705f69", 0x62, 0x1000}, {&(0x7f00000003c0)="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", 0x1000, 0x4}, {&(0x7f00000013c0)="324cb9c124472c7972be26d832dacbdc656e055c6fa98fe9d0a7dfd4ef74803f1956376ed518fe0ac61f27962e3f941c4e69b4763ca15baf06c200802f26a25320274285e984930bea5ecc172dc08ce10dfb159584109d8ece1de49f1f3b4190d64b14f5dd2c3d5e39ea6ef8b603aaa96184fbb69a12c03e495109f324537944d9ab8ade2e2de0e1337e7c61af2fa65f823954edb75ee4c00363df36e51f5b4b5331c44a54e56dca4de64f119dadd43658082a4ab1", 0xb5, 0x1148}, {&(0x7f0000001480)="8d507cc2c0f7c2f7e38d5fe635ea62deb5e16ced4f601805aeae2ddd61ae1f111c5330be04d001361665e460158d4c0c13edd55a9ea77db296ffa87dfa9abdc58723d1104fb32ec91953b08dff3f35cd165359c756", 0x55, 0x2}, {&(0x7f0000001500)="14a578ddd09e", 0x6, 0x100000000}], 0x200022, &(0x7f0000001600)={[{@dots}, {@nodots}, {@nodots}, {@nodots}, {@fat=@nfs_nostale_ro}, {@nodots}, {@dots}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) open(&(0x7f0000000000)='./file1\x00', 0x181001, 0x1) [ 266.012855][T20036] loop3: detected capacity change from 0 to 264192 [ 266.043242][T20046] FAULT_INJECTION: forcing a failure. [ 266.043242][T20046] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 266.056327][T20046] CPU: 1 PID: 20046 Comm: syz-executor.4 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 266.066480][T20046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.076527][T20046] Call Trace: [ 266.079789][T20046] dump_stack_lvl+0xd6/0x122 [ 266.084361][T20046] dump_stack+0x11/0x1b [ 266.088495][T20046] should_fail+0x23c/0x250 [ 266.092888][T20046] should_fail_usercopy+0x16/0x20 [ 266.097892][T20046] strncpy_from_user+0x21/0x250 [ 266.102735][T20046] getname_flags+0xb8/0x3f0 [ 266.107216][T20046] ? should_fail+0xd6/0x250 [ 266.111695][T20046] user_path_at_empty+0x28/0x110 [ 266.116614][T20046] __se_sys_mount+0x217/0x2f0 [ 266.121276][T20046] __x64_sys_mount+0x63/0x70 [ 266.125847][T20046] do_syscall_64+0x44/0xa0 [ 266.130244][T20046] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 266.136124][T20046] RIP: 0033:0x467b1a [ 266.139996][T20046] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 266.159584][T20046] RSP: 002b:00007f09f3a6afa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 266.163408][T20036] loop3: detected capacity change from 0 to 264192 [ 266.167976][T20046] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 266.167991][T20046] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 266.190381][T20046] RBP: 00007f09f3a6b040 R08: 00007f09f3a6b040 R09: 00000000200000c0 [ 266.198336][T20046] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 00:28:14 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x18, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:14 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2e00, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 266.206298][T20046] R13: 0000000020000100 R14: 00007f09f3a6b000 R15: 0000000020000000 00:28:14 executing program 4 (fault-call:2 fault-nth:8): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:14 executing program 0 (fault-call:10 fault-nth:5): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:14 executing program 3: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000400)="dee7030022cf9e5e1dbac27b0426fc0299c40800000000000000c894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r0) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000000)='\x00', &(0x7f0000000040)) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)=ANY=[@ANYBLOB]) 00:28:15 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3f00, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:15 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x19, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 266.573907][T20079] FAULT_INJECTION: forcing a failure. [ 266.573907][T20079] name failslab, interval 1, probability 0, space 0, times 0 [ 266.586539][T20079] CPU: 1 PID: 20079 Comm: syz-executor.4 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 266.596684][T20079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.606734][T20079] Call Trace: [ 266.610010][T20079] dump_stack_lvl+0xd6/0x122 [ 266.614607][T20079] dump_stack+0x11/0x1b [ 266.618813][T20079] should_fail+0x23c/0x250 [ 266.623229][T20079] __should_failslab+0x81/0x90 [ 266.628021][T20079] ? alloc_fs_context+0x46/0x500 [ 266.632943][T20079] should_failslab+0x5/0x20 [ 266.637431][T20079] kmem_cache_alloc_trace+0x52/0x320 [ 266.642719][T20079] alloc_fs_context+0x46/0x500 [ 266.647469][T20079] ? security_capable+0x91/0xa0 [ 266.652299][T20079] fs_context_for_reconfigure+0x42/0x50 [ 266.657832][T20079] path_mount+0x122a/0x1d20 [ 266.662327][T20079] __se_sys_mount+0x24b/0x2f0 [ 266.667134][T20079] __x64_sys_mount+0x63/0x70 [ 266.671708][T20079] do_syscall_64+0x44/0xa0 [ 266.676171][T20079] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 266.682049][T20079] RIP: 0033:0x467b1a [ 266.685948][T20079] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 266.705542][T20079] RSP: 002b:00007f09f3a6afa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 266.713941][T20079] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 266.721898][T20079] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 266.729849][T20079] RBP: 00007f09f3a6b040 R08: 00007f09f3a6b040 R09: 00000000200000c0 [ 266.737801][T20079] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 266.745765][T20079] R13: 0000000020000100 R14: 00007f09f3a6b000 R15: 0000000020000000 [ 266.754355][T20085] FAULT_INJECTION: forcing a failure. [ 266.754355][T20085] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 266.767445][T20085] CPU: 0 PID: 20085 Comm: syz-executor.0 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 266.777596][T20085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.787645][T20085] Call Trace: [ 266.790913][T20085] dump_stack_lvl+0xd6/0x122 [ 266.795485][T20085] dump_stack+0x11/0x1b [ 266.799622][T20085] should_fail+0x23c/0x250 [ 266.804018][T20085] should_fail_usercopy+0x16/0x20 [ 266.809021][T20085] _copy_from_user+0x1c/0xd0 [ 266.813592][T20085] __se_sys_mount+0x119/0x2f0 [ 266.818267][T20085] __x64_sys_mount+0x63/0x70 [ 266.822836][T20085] do_syscall_64+0x44/0xa0 [ 266.827234][T20085] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 266.833113][T20085] RIP: 0033:0x467b1a [ 266.836986][T20085] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 266.856573][T20085] RSP: 002b:00007f1443f49fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 266.864967][T20085] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a 00:28:15 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 00:28:15 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000180), 0x1480, 0x0) 00:28:15 executing program 4 (fault-call:2 fault-nth:9): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:15 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x22, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:15 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 266.872931][T20085] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 266.880944][T20085] RBP: 00007f1443f4a040 R08: 00007f1443f4a040 R09: 00000000200000c0 [ 266.888894][T20085] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 266.896850][T20085] R13: 0000000020000100 R14: 00007f1443f4a000 R15: 0000000020000180 00:28:15 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 266.977339][T20104] FAULT_INJECTION: forcing a failure. [ 266.977339][T20104] name failslab, interval 1, probability 0, space 0, times 0 [ 266.989984][T20104] CPU: 1 PID: 20104 Comm: syz-executor.4 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 267.000138][T20104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.010174][T20104] Call Trace: [ 267.013436][T20104] dump_stack_lvl+0xd6/0x122 [ 267.018050][T20104] dump_stack+0x11/0x1b [ 267.022185][T20104] should_fail+0x23c/0x250 [ 267.026602][T20104] __should_failslab+0x81/0x90 [ 267.031345][T20104] ? legacy_init_fs_context+0x2d/0x70 [ 267.036742][T20104] should_failslab+0x5/0x20 [ 267.041240][T20104] kmem_cache_alloc_trace+0x52/0x320 [ 267.046507][T20104] ? alloc_fs_context+0x46/0x500 [ 267.051519][T20104] legacy_init_fs_context+0x2d/0x70 [ 267.056725][T20104] alloc_fs_context+0x419/0x500 [ 267.061634][T20104] fs_context_for_reconfigure+0x42/0x50 [ 267.067193][T20104] path_mount+0x122a/0x1d20 [ 267.071699][T20104] __se_sys_mount+0x24b/0x2f0 [ 267.076383][T20104] __x64_sys_mount+0x63/0x70 [ 267.080973][T20104] do_syscall_64+0x44/0xa0 [ 267.085457][T20104] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 267.091382][T20104] RIP: 0033:0x467b1a [ 267.095269][T20104] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 267.114961][T20104] RSP: 002b:00007f09f3a6afa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 267.123455][T20104] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 267.131418][T20104] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 267.139384][T20104] RBP: 00007f09f3a6b040 R08: 00007f09f3a6b040 R09: 00000000200000c0 [ 267.147354][T20104] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 267.155319][T20104] R13: 0000000020000100 R14: 00007f09f3a6b000 R15: 0000000020000000 [ 267.164582][T20106] EXT4-fs: 111 callbacks suppressed [ 267.164595][T20106] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring 00:28:15 executing program 4 (fault-call:2 fault-nth:10): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:15 executing program 0 (fault-call:10 fault-nth:6): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)) [ 267.391392][T20106] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. [ 267.402348][T20103] EXT4-fs (sda1): dax option not supported [ 267.420772][T20113] FAULT_INJECTION: forcing a failure. [ 267.420772][T20113] name failslab, interval 1, probability 0, space 0, times 0 00:28:15 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x2) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000140)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_channels={0x3c, 0x1, 0x0, 0x0, 0x9, 0x1, 0x9, 0x6, 0x719}}) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000240)=ANY=[@ANYBLOB="6461782c82c71d0a6f3b6a6b8f9e462943d4000a0b8f68bf07f5ede262c75d87633e24675aabf56de1b997efaa67543c5117b91d63c99dd7dc568ff9d82149e27ee8baec92ebe3c23fe5f1c0e013612957af68ab73794c7bbb0fecad08e2cc50baa16ce292ef94d03a9b8a055f4aebff25447d"]) 00:28:15 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2e, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 267.433423][T20113] CPU: 1 PID: 20113 Comm: syz-executor.4 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 267.443630][T20113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.453738][T20113] Call Trace: [ 267.457007][T20113] dump_stack_lvl+0xd6/0x122 [ 267.461694][T20113] dump_stack+0x11/0x1b [ 267.465837][T20113] should_fail+0x23c/0x250 [ 267.470256][T20113] ? ext4_remount+0x67/0x1980 [ 267.474987][T20113] __should_failslab+0x81/0x90 [ 267.479735][T20113] should_failslab+0x5/0x20 [ 267.484251][T20113] __kmalloc_track_caller+0x6d/0x350 [ 267.489518][T20113] kstrdup+0x31/0x70 [ 267.493395][T20113] ext4_remount+0x67/0x1980 [ 267.497882][T20113] ? __cond_resched+0x11/0x40 [ 267.502538][T20113] ? __dentry_kill+0x456/0x4e0 [ 267.507283][T20113] ? shrink_dentry_list+0x30f/0x340 [ 267.512520][T20113] ? ext4_statfs+0x6b0/0x6b0 [ 267.517088][T20113] legacy_reconfigure+0x8e/0xa0 [ 267.521923][T20113] reconfigure_super+0x2d3/0x4f0 [ 267.526917][T20113] path_mount+0x145a/0x1d20 [ 267.531401][T20113] __se_sys_mount+0x24b/0x2f0 [ 267.536061][T20113] __x64_sys_mount+0x63/0x70 [ 267.540689][T20113] do_syscall_64+0x44/0xa0 [ 267.545127][T20113] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 267.551022][T20113] RIP: 0033:0x467b1a [ 267.554893][T20113] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 267.574485][T20113] RSP: 002b:00007f09f3a6afa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 267.582983][T20113] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 267.590940][T20113] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 267.598897][T20113] RBP: 00007f09f3a6b040 R08: 00007f09f3a6b040 R09: 00000000200000c0 [ 267.606884][T20113] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 267.614835][T20113] R13: 0000000020000100 R14: 00007f09f3a6b000 R15: 0000000020000000 [ 267.623304][T20119] FAULT_INJECTION: forcing a failure. [ 267.623304][T20119] name failslab, interval 1, probability 0, space 0, times 0 [ 267.624072][T20118] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 267.635920][T20119] CPU: 0 PID: 20119 Comm: syz-executor.0 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 267.651662][T20118] EXT4-fs (sda1): re-mounted. Opts: sysvgroups,journal_checksum,,errors=continue. Quota mode: none. [ 267.655346][T20119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.655360][T20119] Call Trace: [ 267.655367][T20119] dump_stack_lvl+0xd6/0x122 00:28:16 executing program 4 (fault-call:2 fault-nth:11): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:16 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x80000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 267.671239][T20118] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 267.676191][T20119] dump_stack+0x11/0x1b [ 267.676216][T20119] should_fail+0x23c/0x250 [ 267.683572][T20118] EXT4-fs (sda1): re-mounted. Opts: sysvgroups,journal_checksum,,errors=continue. Quota mode: none. [ 267.684046][T20119] ? getname_flags+0x84/0x3f0 [ 267.684071][T20119] __should_failslab+0x81/0x90 [ 267.722075][T20119] should_failslab+0x5/0x20 [ 267.726573][T20119] kmem_cache_alloc+0x4f/0x300 [ 267.731319][T20119] getname_flags+0x84/0x3f0 [ 267.735803][T20119] user_path_at_empty+0x28/0x110 [ 267.740724][T20119] __se_sys_mount+0x217/0x2f0 [ 267.745407][T20119] __x64_sys_mount+0x63/0x70 [ 267.749984][T20119] do_syscall_64+0x44/0xa0 [ 267.754411][T20119] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 267.760288][T20119] RIP: 0033:0x467b1a [ 267.764159][T20119] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 267.783759][T20119] RSP: 002b:00007f1443f49fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 00:28:16 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x0, 0x0, 0x0, {{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}, 0x0, 0x2}}]}, 0x184}}, 0x0) [ 267.792151][T20119] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 267.800105][T20119] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 267.808073][T20119] RBP: 00007f1443f4a040 R08: 00007f1443f4a040 R09: 00000000200000c0 [ 267.816022][T20119] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 267.823972][T20119] R13: 0000000020000100 R14: 00007f1443f4a000 R15: 0000000020000180 00:28:16 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x5) r0 = open(&(0x7f0000000180)='./file0\x00', 0x101000, 0x10) splice(r0, &(0x7f00000014c0)=0x1, r0, &(0x7f0000001500)=0x2, 0x5, 0xc) syz_mount_image$nfs(&(0x7f0000000040), &(0x7f0000000340)='./file0\x00', 0x100000001, 0x4, &(0x7f0000001540)=[{&(0x7f00000001c0)="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", 0xfa, 0x101}, {&(0x7f00000003c0)="004712a9fd6d22097d92dd92a31dcd492d77fd7a91ec60dbfab2e7ee87ef050ed180192dca92eaff0dff29357f5c04dbbe2fc6b9c4000ec19e904a86244197ab51bddb700ca215dafd3f805a23af168a223d011de06f2ec1cc983600316574028d37165b446b1c70b8ec1bc51036c6f5883396caa0f317bded8e61cac97b4c10bbb03ba99355687e421f29252b1e3e2588a3a7ab263a8b8c8ee1669702ac693da7f136932d54709545e93cd7a738349714f8ee88d7a12f14b650b57167992e7d33e77458a289289b351deb2f6050c6e0e2b3669d508ab35b62b1a948c00d7885157133f840a8ebc56a212365", 0xec, 0x7}, {&(0x7f00000002c0)="c34d081985dab709d0b8d5bd0671633c9ae239ee354d23651db818518a2a0d82564143f319f13c638ed587592bc337fbcb95968781e24746f23060fbbd0a27d55e", 0x41, 0x2}, {&(0x7f00000004c0)="4b7e76504a3c939e62fc656203e4afc9e076c8a7eda92f937b99dad8f4da8c40c642e9c312bafc4c179e19921cc8b945bc0b78d2d832bce614e6e7c7561f9e823f3168230f76364eaf0d2564d212cc4e77d73a03525c6dafeffb6e5df8b4cd277a497daf6beffa36c5f6e5f3231baa96c7a9e3fc965077148af7327f1cc9d0236888522ecc1821d6a4932d3a81246a611462afb708dd85ebd0e8ff825445718e1ddb9af5a748a8e8e048c8b86a694a4baa3d8467ef009ab2db5ff4158447995c7907ef6332d9e837dd9317d46a160fa28f5cc692af1a0f67389a7438d70ddb7e6f87faad75151f1870a1b94c7895b738a6d589bbb170c63d1be01d7859f9960a86a17449057280dd5df5773a3cca0d77ae6e3d9084ecb8ecfc2b6d5a634bf758c74d98d2248086c136986624056cd707d2b3a2c4bec4a1ebd306a327639de1e7104ff567e0d85bf26671eac285fe1bcaac3f4029c19fc1bc72f1a5d1b68fee3c5a19ed140191ddc7d39e12f8a236b6da07ea773e7c0426fa672a6be8815b3205da32c554b4826b3d24c1bdfd08505f9ac45ba01543d8898e4b494aeb280f85352b8fafbf73b9182f7f25517ec4626f96b93c19bf7e4bef540f1bd354464bd0e24e57a6c20ee0372ee030d0895b6d836904b13b87772bc7710e7ec32c8abbcc890a298b44c5968f6809c2c30f6ef5f80bdfc04eda90287bbc68fb5514ae2a3e00f9b34e0fd122a4be7db8cce2e37b1dfb516aab9a44f0b4432a660ffd15f4d3dd2f842c4401e72953ce3619a2a787b11511e09f23fc3102dc037a8c801541d066dc590ccd88f5c06c816a8e240aabe3d417704bb37207adba74b9b7e9491172664923908a66553d23b9d853a8b66559cfb323c1dabd31255861ad7706d22e767c1df1ae8af879503d9981bd88b03ba1ef1053059e86716980230c89131da6d39fcc2d7faf8c7926399c70ae1cfef45dfc0d6593011ce068072aed8249329289eae037eb85af7881b54bf50ff770f0e2978b31533d1286f5c22512afec522c91ecf257df089f99016c053cb94450f41de0ebb9e093214b815f5008441755e08316e779b5f62339115c0531b3c07ef876e93e7e1b3d106bd47f1e71cd502a7cd8960240cede732d2891d7413a79132496633af616db5f104e62ee426ff1b08205209d0b8d14391b4a737dbdc60515cd79763b6615bd3e4f33db4d9ee3e81ea0b56a758cb95026f2e40bb0ecf3f4b4568821d587b314771f413a4e2633b6f4adbe201d4cf5e55b43f25bf1c7d17c72aa35492fbfb66c4f9a6424443da920259222b13e06bbe576e264cff10dce0f1239717fdf0c57404f4d35992b414164abec31b816fa799493f9a83ba63ce5257fe86c91d458756789d573e9e0b7dd9053a3f6bdc9518608bf7ec31983e210b83db2c65648926d22e029274cb54f27e154d52a486f9a78534d3a7a0185a1860979c4773c5201393441138e2078d886f90c4edbc440e5402a1e479ab5afeefb29bdaee5dd483ec7460a3b9e37109a6ec435dfada08cc53adb71ee795724b152dde6a98ee4e1ebe61e3db5d8b36ed3d1743054ce73298a75e7e0e20db1931981c6633b9c06d42126fe41da360f71bfe908e88734b8a501cbb4fca172107168c9da3da6c3d000bc6ff2175e1ff6d57e47e6bd421012a23c8d3e620f06e68ed262b3cb0966392289ba2dec249dd888a9f71720859fbaa26f97bd968d71ef727eeaf7ca05bbe4dbd7d536c5b95209e91d42b853f665898282e26ee0da130c6a9d3f8ecbf4920710ceef0d7929ffe6260cf62e5e10529383c742f99c0762c4bd636b25d6b2d137ad039c9434b542a4ee08ebb99b03ae57743e86e9adc3c8da1587d0f6eaeee566f6942253b0140abfc75fdb4e554f9bd734284667df0ba7a373cadfbeb952bf99596d595c26f34ec96069c8a7bd6abf755e96e20a574e12dde42193506da63d0cf145c88652b5622c236169ac433bd19f47a2ff9a2c696c0d51ac39fc2d7feb6eaebcdc2bc54b036053e15a7a5d43c760db8ed1a90e62d19db49c835db437b84c78b8f9cc8d95eb538472ba80548174dcc6dcdae020d1304ec47c9eab6ea9a6744156840eddd7c8c016a635dfa58925d830d1bd307ab81444d1bb9ab562893f954938ef320845fe574913bd6521eda6d10dcbb466efddf8f0f4f41b0967cf90319fda089147d2a18d05fec71712076be8312797308eddf1e8e1d42d6ba1079483afe9a610bf21ada891f3182399e0abafb77d9ce2d1742e8da2d71718011ca5e36aa14b279007585df39bac3393e39a2f34d2c1a696a0f4d46be672426c34a7117698cb241de56f8ab66a1b9f9e486b7df2326fe6ceed6a111a1f8a275a29181add0fe809d5caa07da7bf706edbdb207734e8974e1a3ea32712a5be4123ec28a84cc2ac0f5ee6153f708511b3b182abe2d7ee9fdaaf9b477e6c05381ebbf18748fdecda1bbb56e1a10dae858733a2624b750d0a80b04fe83929df81738568592695a0c4d58f9aafeac219a257f7739be2d1d77751410f2b8d2aabc7896f8727c85bc7f9a18a8db6819aeb0c3c8e068a33a136989e1eb9c1140ceff6911cceeb46c0065e5de9e0e6db06238c816207911606915887ebd22d1846d082e3182ce7bc7ea78a150bd15a549a9905762953af29aaac9be72ef2cb16c05fc082e6651a4832d067f55cd845e3dd569f0d451a8b1b4ffd8279e7e6bf85128660058e84af621115851ffad8ac3171f66ee076f6014d422376c8157d6e1447877d2ac19b7479e58d44be4269080390db4d7cabe261873f2ecc035e70c4f96004d57f5aef8e9c289f74f28f11c76be0d5b17c598d90cfeafd8606852863324d46aab2061e1010085238d0cbb3b03b1a845adeb74cc835b46749d237603763874676568fb0c0149bcba304e72d62b0ffe52c1c0be364eda435a81972badb7bfe38977ae6347bcb8925457576e67ad7ba42ce9b1a42a71b187d37d815fe24b896a0d9ef0ba29cda4ff5c361cce92a772c0336a3d1befdf587320d79f304c14f48b6a26d45ba844e03b23de3b9d080d0148876d38a514e4c70ca01f5d24ec126b70ac24115da9e3b04f60e419a958e50792aaafae6393366dfaef8579328664e09890f6ffc1cd96bee8d4a07cf6eda61aff4ba110e5ccaa84ca634db5f373d73ea031eb9b152f4d71f0a52eae9cdfa7a647ca374c7c66d81ce978643dff923e28a6bfd0ca572a76eded3075cd125a50bf2beb5868e269644f99fa0530e6edac3e0d9c57dcbe0f414f76076a7b84ca0a8e998fa28d83a9397023aa552a02eaccfb53803e70d932b62da7f51636f545ce82983bfca1c4880f0d994a6f5c55e20a3b73bb6540374683cbbdc52c672c5e9e7d139f8d163a6846eb2c6460570f8775523f38da52af88758bd81d39807aa865b3a54f23074d0ee26859b505c9c7ae48dc00a1a93a175970e52ce27ead6b92ac84a448c2448a7f1a4cc5d7df914c7add421fb0dc226cef5b10e69c40328ee7c00e80fff39c3ab4583188a7479fa9a849bc07076a07629a4fc79b39c91b3a41a1aca8a1064d43d6d44d5a1833ad0a9530d01c58132f877287f9654b6811b8c2b94d8f84b7302a7bfe992559b1dda3f3aed926fe9762102a07bd23e5ee2bc16726b9e2e56715f2c673443c464d4177c4601adbf17541867d6bb37772d3463679a8ca567b45d749d6216606186d68bd286aa2fd336c5e92d598843126471a876993b28111a6da0cca91da305ae8a27aa28702d488f878223bb203a55cb2e32d3a8763a4f0f98898fe62c8e659a4653e2258494d1cfd965ef9b774bcb11c74317529ecf8fa635d64891b08b8aa73de9fb71c168233497c6e582409990be4ae33f3fd9d8579edf8124c37de41be3b708ea3ec5b68a7c45f348fa4836566d2e497a6b9924374300f1c57515c77aa96fe075cbd2258ccb263e7378723ae3e31ecf5ffacc37abbf686b2cde082d8eab4aaa81db351de8684790dc12ae76dd5c6a8cb5a1eae14c81f7d2ecabec220719be19fa8a5c6ebde808c45304873f96af4ea212f7aa7d5033df1a85e8a552bdba0c2e874a24f7a2735acf1b0c41ea67be57fc31dd7869e55ac5ec7f725228e36573e083397a15ed8ee54d95e1a17e19ac67d6c7531208277167c115bbbe5bdfa86b5cdfa35eae3e361d2bb5f1c1abdfc9099aafcb4f08539cec21e6e0740cf1c0d62564ba09d985e3a9a93f854d8cde501a02d2e243fa61f5973e4b543406e0962f425a9462cd66fdc9d8097d80feb7b4eb618e45781aa9bbf115e16e80e487b20aa92d072ca43ecbe57689d3c7e4ee657f280a3d1517b2b114ce2f1745d0b7ddf7e67d341cc7456ee63661deec72f192d3392782c3441d212cf3d55f2b39eb5656051151625a58edf82077e825a0be99cd63341555e67f21bd453197d928c3d07ff8f51ff86ffe832c5643047ffa093fd6995a1b231d431676018f049e9685859897361f70e8525b7bc78cfb449087c6228a52efd8a96c5fee11b5ca2466e3eec4e41dc800d1207c89cf98d1f23688140bd3f76b48c5639babba8ecb512231b554dc215afb233f1885197b6e23867063694cbf9fe21af3f38476525c28533b6877c42b42108b89e877bbfa6b8e89d10ec803ebd1cfb2ddff8658be350be699fe07cd8713da4aea8221e0b159b94bf54ef621fbcbd6bc4a73a22e083a5e518b2b4e7b9acba6394b4a77fa506fb1d58f01c13625560d746524f00af9dfc20856a99bbd77ec384ec1621574ee1e9681a719a0d071aa759a9e59dfbd958cb09f4a2d79422e073ae1b2a65f30bda4d1bd0be1a0dff2c256a32f67ee59344c310ea554e957748f390b868aa652143d7b7bf2f0124d392000bd694a2e6773791d4caa45e01c14af5d9591742341153c09ba153290d6dbc7455105ff970eb83e24b0f09543921d1b63eb39bd6ac6c7cfb5b9e089b186ba9ac3e07d0405048bcd9707ece344ed8539b5d0a8d8411a57f4db42ffa23f3f173e4b38fcf1aa8d76b8c66e323d6ba8a64a800de9fa2b3b497fe0ebafa399b699d61b2de6d6a407c12565ab0ccc745adc04a55c9ff41de1b356c73da2a52e215eddc5072ee288c34f8576926bbe441bca882473712efcf9877ade7abc410b2903f007e109b278f6e26e021e33b2c3cdd89e4fb36584d069905d719e05ca568480441eed93c7748f480374899b03c71d130f899c12159d503721be22a1798e10d937d4562cb27e7bb23f7766d249f6239e9b7b59aa616ba6509819dbe577a814316995dcb64eb954d9ef65cc8b942a86f6d33744d43156db1237382eefc72e9dae4039a601afbefacb65653b3f7820e8a52a82163cf9cc9100d05e1ecd0e6d97dc5de2212f96e9f6e47b5abe31c3875c07170f6bb586c0435e69ee4f823d106213ee0fe3a894b5b9079ba212a1037fba1194f95a466cef1f76e4acd60f761833fabf1e984f246a6f3edca902a51a6a5a646f694ff0a59d822fdd0f48a134c22fed993a0173f887bb2e93607778c30f923cdd3bf1642b9329509cb9f86c2ad3be99af5a992707b2d8a3eeaffcca5445f050267e69370ac1c4fff9d8048a5c39ec742183efc1021f972ffa2914cb3c3606fd128596b941266c9948c01e80721a68ce143519b28a1f0133003863095fbad71c6c4b4882167e77f9abad71ad2c741d484d7766abc28b8b274446de83d81ea22de74bc031a701d23846e1582c51c65908a6e7ec616a603f0a1d1c0864ad2a82463af3749652d8ff32ee366ff0c19a62244d68146b4c9578818319", 0x1000, 0xffffffffe3ed4507}], 0x40408, &(0x7f00000016c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0, @ANYRES32]) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB="68e83a2995660e977bd476c5d903208fef79"]) [ 267.890668][T20132] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 267.910160][T20132] FAULT_INJECTION: forcing a failure. [ 267.910160][T20132] name failslab, interval 1, probability 0, space 0, times 0 [ 267.922794][T20132] CPU: 1 PID: 20132 Comm: syz-executor.4 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 267.932962][T20132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.943013][T20132] Call Trace: [ 267.946293][T20132] dump_stack_lvl+0xd6/0x122 [ 267.950875][T20132] dump_stack+0x11/0x1b [ 267.955017][T20132] should_fail+0x23c/0x250 [ 267.959516][T20132] ? mempool_alloc_slab+0x16/0x20 [ 267.964522][T20132] __should_failslab+0x81/0x90 [ 267.969283][T20132] should_failslab+0x5/0x20 [ 267.973768][T20132] kmem_cache_alloc+0x4f/0x300 [ 267.978511][T20132] ? chksum_update+0x39/0x50 [ 267.983083][T20132] mempool_alloc_slab+0x16/0x20 [ 267.988018][T20132] ? mempool_free+0x130/0x130 [ 267.992673][T20132] mempool_alloc+0x9d/0x310 [ 267.997221][T20132] bio_alloc_bioset+0xcc/0x530 [ 268.001964][T20132] submit_bh_wbc+0x130/0x330 [ 268.006537][T20132] ? ext4_update_super+0x71c/0x740 [ 268.011630][T20132] __sync_dirty_buffer+0x136/0x1e0 [ 268.016729][T20132] ext4_commit_super+0x1f6/0x290 [ 268.021654][T20132] ext4_remount+0xff7/0x1980 [ 268.026287][T20132] ? __dentry_kill+0x456/0x4e0 [ 268.031034][T20132] ? ext4_statfs+0x6b0/0x6b0 [ 268.035754][T20132] legacy_reconfigure+0x8e/0xa0 [ 268.040632][T20132] reconfigure_super+0x2d3/0x4f0 [ 268.045564][T20132] path_mount+0x145a/0x1d20 [ 268.050051][T20132] __se_sys_mount+0x24b/0x2f0 [ 268.054810][T20132] __x64_sys_mount+0x63/0x70 [ 268.059384][T20132] do_syscall_64+0x44/0xa0 [ 268.063787][T20132] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 268.069725][T20132] RIP: 0033:0x467b1a [ 268.073596][T20132] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 268.093179][T20132] RSP: 002b:00007f09f3a6afa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 268.101573][T20132] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 268.109561][T20132] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 268.117517][T20132] RBP: 00007f09f3a6b040 R08: 00007f09f3a6b040 R09: 00000000200000c0 [ 268.125477][T20132] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 268.133429][T20132] R13: 0000000020000100 R14: 00007f09f3a6b000 R15: 0000000020000000 00:28:16 executing program 4 (fault-call:2 fault-nth:12): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 268.147833][T20132] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. [ 268.157734][T20135] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 268.191174][T20144] loop3: detected capacity change from 0 to 264192 00:28:16 executing program 0 (fault-call:10 fault-nth:7): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:16 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 268.359054][T20147] EXT4-fs: error -4 creating inode table initialization thread [ 268.452438][T20155] FAULT_INJECTION: forcing a failure. [ 268.452438][T20155] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 268.465512][T20155] CPU: 0 PID: 20155 Comm: syz-executor.0 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 268.475663][T20155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.481841][T20149] FAULT_INJECTION: forcing a failure. [ 268.481841][T20149] name failslab, interval 1, probability 0, space 0, times 0 [ 268.485709][T20155] Call Trace: [ 268.485719][T20155] dump_stack_lvl+0xd6/0x122 [ 268.506116][T20155] dump_stack+0x11/0x1b [ 268.510262][T20155] should_fail+0x23c/0x250 [ 268.514664][T20155] should_fail_usercopy+0x16/0x20 [ 268.519678][T20155] strncpy_from_user+0x21/0x250 [ 268.524524][T20155] getname_flags+0xb8/0x3f0 [ 268.529017][T20155] ? should_fail+0xd6/0x250 [ 268.533507][T20155] user_path_at_empty+0x28/0x110 [ 268.538437][T20155] __se_sys_mount+0x217/0x2f0 [ 268.543104][T20155] __x64_sys_mount+0x63/0x70 [ 268.547690][T20155] do_syscall_64+0x44/0xa0 [ 268.552099][T20155] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 268.557989][T20155] RIP: 0033:0x467b1a [ 268.561871][T20155] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 268.581469][T20155] RSP: 002b:00007f1443f6afa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 268.589870][T20155] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a 00:28:17 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3ff7f8, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 268.597827][T20155] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 268.605782][T20155] RBP: 00007f1443f6b040 R08: 00007f1443f6b040 R09: 00000000200000c0 [ 268.613744][T20155] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 268.621706][T20155] R13: 0000000020000100 R14: 00007f1443f6b000 R15: 0000000020000180 [ 268.629670][T20149] CPU: 1 PID: 20149 Comm: syz-executor.4 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 268.639820][T20149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.649869][T20149] Call Trace: [ 268.653139][T20149] dump_stack_lvl+0xd6/0x122 [ 268.657731][T20149] dump_stack+0x11/0x1b [ 268.661931][T20149] should_fail+0x23c/0x250 [ 268.666385][T20149] __should_failslab+0x81/0x90 [ 268.671182][T20149] ? ext4_register_li_request+0x2b0/0x690 [ 268.677028][T20149] should_failslab+0x5/0x20 [ 268.681512][T20149] kmem_cache_alloc_trace+0x52/0x320 [ 268.686780][T20149] ? ext4_register_li_request+0x102/0x690 [ 268.692487][T20149] ext4_register_li_request+0x2b0/0x690 [ 268.698118][T20149] ext4_remount+0xf70/0x1980 [ 268.702689][T20149] ? __dentry_kill+0x456/0x4e0 [ 268.707435][T20149] ? ext4_statfs+0x6b0/0x6b0 [ 268.712008][T20149] legacy_reconfigure+0x8e/0xa0 [ 268.716853][T20149] reconfigure_super+0x2d3/0x4f0 [ 268.721786][T20149] path_mount+0x145a/0x1d20 [ 268.726269][T20149] __se_sys_mount+0x24b/0x2f0 [ 268.730928][T20149] __x64_sys_mount+0x63/0x70 [ 268.735563][T20149] do_syscall_64+0x44/0xa0 [ 268.739965][T20149] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 268.745840][T20149] RIP: 0033:0x467b1a [ 268.749711][T20149] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 268.769300][T20149] RSP: 002b:00007f09f3a6afa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 268.777697][T20149] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 268.785734][T20149] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 268.793686][T20149] RBP: 00007f09f3a6b040 R08: 00007f09f3a6b040 R09: 00000000200000c0 00:28:17 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x0, 0x0, 0x0, {{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}, 0x0, 0x2}}]}, 0x184}}, 0x0) 00:28:17 executing program 4 (fault-call:2 fault-nth:13): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:17 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 268.801659][T20149] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 268.809612][T20149] R13: 0000000020000100 R14: 00007f09f3a6b000 R15: 0000000020000000 [ 268.836136][T20144] loop3: detected capacity change from 0 to 264192 00:28:17 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3ff800, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:17 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1800, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 268.884571][T20176] FAULT_INJECTION: forcing a failure. [ 268.884571][T20176] name failslab, interval 1, probability 0, space 0, times 0 [ 268.897278][T20176] CPU: 0 PID: 20176 Comm: syz-executor.4 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 268.907458][T20176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.917566][T20176] Call Trace: [ 268.920838][T20176] dump_stack_lvl+0xd6/0x122 [ 268.925469][T20176] dump_stack+0x11/0x1b [ 268.929623][T20176] should_fail+0x23c/0x250 [ 268.934016][T20176] ? getname_flags+0x84/0x3f0 [ 268.938756][T20176] __should_failslab+0x81/0x90 [ 268.943509][T20176] should_failslab+0x5/0x20 [ 268.948073][T20176] kmem_cache_alloc+0x4f/0x300 [ 268.952847][T20176] getname_flags+0x84/0x3f0 [ 268.957331][T20176] getname+0x15/0x20 [ 268.961336][T20176] do_sys_openat2+0x6d/0x2b0 [ 268.965908][T20176] ? __se_sys_mount+0x26f/0x2f0 [ 268.970740][T20176] __x64_sys_openat+0xef/0x110 [ 268.975484][T20176] do_syscall_64+0x44/0xa0 [ 268.979883][T20176] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 268.985767][T20176] RIP: 0033:0x4196e4 [ 268.989671][T20176] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 269.009367][T20176] RSP: 002b:00007f09f3a6af30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 269.017922][T20176] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004196e4 [ 269.025873][T20176] RDX: 0000000000010000 RSI: 0000000020000100 RDI: 00000000ffffff9c [ 269.033865][T20176] RBP: 0000000020000100 R08: 0000000000000000 R09: 00000000200000c0 [ 269.041818][T20176] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 269.049769][T20176] R13: 0000000020000100 R14: 00007f09f3a6b000 R15: 0000000020000000 00:28:17 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x800000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:17 executing program 0 (fault-call:10 fault-nth:8): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:17 executing program 3: ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000000)={0x6, 0x2}) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x80041, 0x8) ioctl$BTRFS_IOC_SNAP_CREATE(0xffffffffffffffff, 0x50009401, &(0x7f00000003c0)={{r0}, "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"}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4000, 0x42) 00:28:17 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf83f00, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:17 executing program 4 (fault-call:2 fault-nth:14): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 269.365294][T20198] FAULT_INJECTION: forcing a failure. [ 269.365294][T20198] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 269.378371][T20198] CPU: 1 PID: 20198 Comm: syz-executor.4 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 269.388523][T20198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.398573][T20198] Call Trace: [ 269.401834][T20198] dump_stack_lvl+0xd6/0x122 [ 269.406407][T20198] dump_stack+0x11/0x1b [ 269.410553][T20198] should_fail+0x23c/0x250 [ 269.414993][T20198] should_fail_usercopy+0x16/0x20 [ 269.419995][T20198] strncpy_from_user+0x21/0x250 [ 269.424860][T20198] getname_flags+0xb8/0x3f0 [ 269.429366][T20198] getname+0x15/0x20 [ 269.430074][T20203] FAULT_INJECTION: forcing a failure. [ 269.430074][T20203] name failslab, interval 1, probability 0, space 0, times 0 [ 269.433286][T20198] do_sys_openat2+0x6d/0x2b0 [ 269.450433][T20198] ? __se_sys_mount+0x26f/0x2f0 [ 269.455284][T20198] __x64_sys_openat+0xef/0x110 [ 269.460047][T20198] do_syscall_64+0x44/0xa0 [ 269.464511][T20198] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 269.470403][T20198] RIP: 0033:0x4196e4 [ 269.474339][T20198] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 269.494001][T20198] RSP: 002b:00007f09f3a6af30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 269.502411][T20198] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004196e4 00:28:18 executing program 4 (fault-call:2 fault-nth:15): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 269.510373][T20198] RDX: 0000000000010000 RSI: 0000000020000100 RDI: 00000000ffffff9c [ 269.518416][T20198] RBP: 0000000020000100 R08: 0000000000000000 R09: 00000000200000c0 [ 269.526377][T20198] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 269.534456][T20198] R13: 0000000020000100 R14: 00007f09f3a6b000 R15: 0000000020000000 [ 269.542421][T20203] CPU: 0 PID: 20203 Comm: syz-executor.0 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 269.552579][T20203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.562639][T20203] Call Trace: [ 269.565936][T20203] dump_stack_lvl+0xd6/0x122 [ 269.570523][T20203] dump_stack+0x11/0x1b [ 269.574664][T20203] should_fail+0x23c/0x250 [ 269.579127][T20203] __should_failslab+0x81/0x90 [ 269.583879][T20203] ? alloc_fs_context+0x46/0x500 [ 269.588827][T20203] should_failslab+0x5/0x20 [ 269.593314][T20203] kmem_cache_alloc_trace+0x52/0x320 [ 269.598708][T20203] alloc_fs_context+0x46/0x500 [ 269.603466][T20203] ? security_capable+0x91/0xa0 [ 269.608375][T20203] fs_context_for_reconfigure+0x42/0x50 [ 269.613935][T20203] path_mount+0x122a/0x1d20 [ 269.618471][T20203] __se_sys_mount+0x24b/0x2f0 [ 269.623153][T20203] __x64_sys_mount+0x63/0x70 [ 269.627765][T20203] do_syscall_64+0x44/0xa0 [ 269.632163][T20203] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 269.638093][T20203] RIP: 0033:0x467b1a [ 269.641984][T20203] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 00:28:18 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)={0xa0882, 0x9, 0x10}, 0x18) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x10c000, &(0x7f0000000200)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@loose}, {@posixacl}, {@cache_mmap}, {@loose}], [{@obj_type={'obj_type', 0x3d, 'ext3\x00'}}, {@smackfsfloor}]}}) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000280)=ANY=[@ANYBLOB="6461782c00a644321c59e704813af62b8d533fb8e6277c8bf631ce4d085cab521c37"]) mount(&(0x7f0000000300)=@sr0, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='zonefs\x00', 0x51447, &(0x7f0000000400)='\x00') 00:28:18 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x0, 0x0, 0x0, {{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}, 0x0, 0x2}}]}, 0x184}}, 0x0) [ 269.661572][T20203] RSP: 002b:00007f1443f49fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 269.669960][T20203] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 269.677913][T20203] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 269.685915][T20203] RBP: 00007f1443f4a040 R08: 00007f1443f4a040 R09: 00000000200000c0 [ 269.694007][T20203] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 269.701964][T20203] R13: 0000000020000100 R14: 00007f1443f4a000 R15: 0000000020000180 [ 269.752346][T20211] FAULT_INJECTION: forcing a failure. [ 269.752346][T20211] name failslab, interval 1, probability 0, space 0, times 0 [ 269.764972][T20211] CPU: 1 PID: 20211 Comm: syz-executor.4 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 269.775122][T20211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.785178][T20211] Call Trace: [ 269.788456][T20211] dump_stack_lvl+0xd6/0x122 [ 269.793058][T20211] dump_stack+0x11/0x1b [ 269.797298][T20211] should_fail+0x23c/0x250 00:28:18 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:18 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1900, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 269.801716][T20211] ? __alloc_file+0x2e/0x1a0 [ 269.806394][T20211] __should_failslab+0x81/0x90 [ 269.811164][T20211] should_failslab+0x5/0x20 [ 269.815671][T20211] kmem_cache_alloc+0x4f/0x300 [ 269.820431][T20211] __alloc_file+0x2e/0x1a0 [ 269.824832][T20211] alloc_empty_file+0xcd/0x1c0 [ 269.829582][T20211] path_openat+0x6a/0x1ec0 [ 269.833999][T20211] ? ext4_remount+0x1788/0x1980 [ 269.838831][T20211] ? __dentry_kill+0x456/0x4e0 [ 269.843585][T20211] do_filp_open+0x105/0x220 [ 269.848089][T20211] do_sys_openat2+0xb5/0x2b0 [ 269.852659][T20211] ? __se_sys_mount+0x26f/0x2f0 [ 269.857496][T20211] __x64_sys_openat+0xef/0x110 [ 269.862242][T20211] do_syscall_64+0x44/0xa0 [ 269.866698][T20211] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 269.872586][T20211] RIP: 0033:0x4196e4 [ 269.876466][T20211] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 00:28:18 executing program 4 (fault-call:2 fault-nth:16): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 269.896057][T20211] RSP: 002b:00007f09f3a6af30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 269.904464][T20211] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004196e4 [ 269.912416][T20211] RDX: 0000000000010000 RSI: 0000000020000100 RDI: 00000000ffffff9c [ 269.920374][T20211] RBP: 0000000020000100 R08: 0000000000000000 R09: 00000000200000c0 [ 269.928327][T20211] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 269.936292][T20211] R13: 0000000020000100 R14: 00007f09f3a6b000 R15: 0000000020000000 00:28:18 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x280, 0x100) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000003c0)=ANY=[@ANYRES64]) execveat(r0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000240)=[&(0x7f0000000040)='/\x00', &(0x7f0000000180)='-#-)(!\'\x00', &(0x7f0000000200)='dax'], &(0x7f0000000300)=[&(0x7f0000000280)='dax', &(0x7f00000002c0)='\x00'], 0x400) 00:28:18 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:18 executing program 0 (fault-call:10 fault-nth:9): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:18 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000280)=ANY=[@ANYBLOB="576196857102ce1575bdd0496825a47bcb4242d8e29eae8341b37291c1bd081507e8e80ebec27effffffff7dece9d5fad5594e02ac907063ad090d7eaab7b4ef16a45355e3de56e60e514eacf4f4da553d33f3e439cfed97889d5e674eabd73b59e71cada41bdfa1a4402f739f56cd521714c0edfa0e1fcde40ef0cdca9f9534576266acd5dff29360c6ac9a09"]) [ 270.258832][T20227] FAULT_INJECTION: forcing a failure. [ 270.258832][T20227] name failslab, interval 1, probability 0, space 0, times 0 [ 270.271563][T20227] CPU: 1 PID: 20227 Comm: syz-executor.4 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 270.281713][T20227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.291749][T20227] Call Trace: [ 270.295009][T20227] dump_stack_lvl+0xd6/0x122 [ 270.299584][T20227] dump_stack+0x11/0x1b [ 270.303790][T20227] should_fail+0x23c/0x250 [ 270.308184][T20227] ? security_file_alloc+0x30/0x190 [ 270.313466][T20227] __should_failslab+0x81/0x90 [ 270.318245][T20227] should_failslab+0x5/0x20 [ 270.322799][T20227] kmem_cache_alloc+0x4f/0x300 [ 270.327581][T20227] security_file_alloc+0x30/0x190 [ 270.332613][T20227] __alloc_file+0x83/0x1a0 [ 270.333960][T20242] FAULT_INJECTION: forcing a failure. [ 270.333960][T20242] name failslab, interval 1, probability 0, space 0, times 0 [ 270.337025][T20227] alloc_empty_file+0xcd/0x1c0 [ 270.354353][T20227] path_openat+0x6a/0x1ec0 [ 270.358821][T20227] ? select_task_rq_fair+0x175/0xce0 [ 270.364094][T20227] ? rb_insert_color+0x2fa/0x310 [ 270.369023][T20227] ? enqueue_entity+0x45b/0x630 [ 270.373861][T20227] ? enqueue_task_fair+0xdd/0x500 [ 270.378883][T20227] do_filp_open+0x105/0x220 [ 270.383433][T20227] do_sys_openat2+0xb5/0x2b0 [ 270.388016][T20227] ? __se_sys_mount+0x26f/0x2f0 [ 270.392889][T20227] __x64_sys_openat+0xef/0x110 [ 270.397642][T20227] do_syscall_64+0x44/0xa0 [ 270.402052][T20227] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 270.407944][T20227] RIP: 0033:0x4196e4 [ 270.411833][T20227] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 270.431431][T20227] RSP: 002b:00007f09f3a6af30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 270.439836][T20227] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004196e4 [ 270.447869][T20227] RDX: 0000000000010000 RSI: 0000000020000100 RDI: 00000000ffffff9c 00:28:18 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2200, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 270.455829][T20227] RBP: 0000000020000100 R08: 0000000000000000 R09: 00000000200000c0 [ 270.463790][T20227] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 270.471749][T20227] R13: 0000000020000100 R14: 00007f09f3a6b000 R15: 0000000020000000 [ 270.479715][T20242] CPU: 0 PID: 20242 Comm: syz-executor.0 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 270.489869][T20242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.499928][T20242] Call Trace: [ 270.503267][T20242] dump_stack_lvl+0xd6/0x122 00:28:18 executing program 4 (fault-call:2 fault-nth:17): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:19 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 270.507864][T20242] dump_stack+0x11/0x1b [ 270.512022][T20242] should_fail+0x23c/0x250 [ 270.516485][T20242] __should_failslab+0x81/0x90 [ 270.521232][T20242] ? legacy_init_fs_context+0x2d/0x70 [ 270.526654][T20242] should_failslab+0x5/0x20 [ 270.531159][T20242] kmem_cache_alloc_trace+0x52/0x320 [ 270.536520][T20242] ? alloc_fs_context+0x46/0x500 [ 270.541546][T20242] legacy_init_fs_context+0x2d/0x70 [ 270.546755][T20242] alloc_fs_context+0x419/0x500 [ 270.551586][T20242] fs_context_for_reconfigure+0x42/0x50 [ 270.557114][T20242] path_mount+0x122a/0x1d20 [ 270.561599][T20242] __se_sys_mount+0x24b/0x2f0 [ 270.566255][T20242] __x64_sys_mount+0x63/0x70 [ 270.570831][T20242] do_syscall_64+0x44/0xa0 [ 270.575299][T20242] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 270.581178][T20242] RIP: 0033:0x467b1a [ 270.585084][T20242] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 00:28:19 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}, 0x0, 0x2}}]}, 0x184}}, 0x0) [ 270.604981][T20242] RSP: 002b:00007f1443f28fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 270.613372][T20242] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 270.621321][T20242] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 270.629369][T20242] RBP: 00007f1443f29040 R08: 00007f1443f29040 R09: 00000000200000c0 [ 270.637328][T20242] R10: 0000000000012020 R11: 0000000000000206 R12: 00000000200000c0 [ 270.645282][T20242] R13: 0000000020000100 R14: 00007f1443f29000 R15: 0000000020000180 [ 270.711283][T20254] FAULT_INJECTION: forcing a failure. [ 270.711283][T20254] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 270.724376][T20254] CPU: 0 PID: 20254 Comm: syz-executor.4 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 270.734528][T20254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.744578][T20254] Call Trace: [ 270.747848][T20254] dump_stack_lvl+0xd6/0x122 [ 270.752447][T20254] dump_stack+0x11/0x1b [ 270.756661][T20254] should_fail+0x23c/0x250 [ 270.761119][T20254] should_fail_usercopy+0x16/0x20 [ 270.766141][T20254] _copy_to_user+0x1c/0x90 [ 270.770601][T20254] simple_read_from_buffer+0xab/0x120 [ 270.775956][T20254] proc_fail_nth_read+0x10d/0x150 [ 270.780967][T20254] ? proc_fault_inject_write+0x230/0x230 [ 270.786611][T20254] vfs_read+0x1e6/0x750 [ 270.790773][T20254] ? putname+0xb8/0xd0 [ 270.794838][T20254] ? __fget_light+0x21b/0x260 [ 270.799495][T20254] ? __cond_resched+0x11/0x40 [ 270.804160][T20254] ksys_read+0xd9/0x190 [ 270.808311][T20254] __x64_sys_read+0x3e/0x50 [ 270.812852][T20254] do_syscall_64+0x44/0xa0 [ 270.817352][T20254] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 270.823296][T20254] RIP: 0033:0x41937c [ 270.827182][T20254] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 270.846794][T20254] RSP: 002b:00007f09f3a6b170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 270.855198][T20254] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000041937c [ 270.863167][T20254] RDX: 000000000000000f RSI: 00007f09f3a6b1e0 RDI: 0000000000000003 [ 270.871133][T20254] RBP: 00007f09f3a6b1d0 R08: 0000000000000000 R09: 00000000200000c0 [ 270.879101][T20254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 270.887068][T20254] R13: 00007ffeb1c1c3df R14: 00007f09f3a6b300 R15: 0000000000022000 00:28:19 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2e00, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:19 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:19 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:19 executing program 0 (fault-call:10 fault-nth:10): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:19 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x1a) chmod(&(0x7f0000000000)='./file0\x00', 0x1) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) 00:28:19 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:19 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:19 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:19 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) dup3(r1, r0, 0x0) r3 = epoll_create(0x5) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000600)) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000200)) move_mount(r4, &(0x7f0000000300)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x40) r5 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@tipc=@id, &(0x7f0000000180)=0x80, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r5, &(0x7f0000000200)=0x80, &(0x7f0000000240)=@vsock={0x28, 0x0, 0x0, @my}, 0x0, 0xc0800}, 0x9) r6 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r7) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000004c0)=0xfffffffffffffec7) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12000, &(0x7f0000000500)={[{@dax}], [{@subj_role={'subj_role', 0x3d, '\x00'}}, {@euid_lt={'euid<', r7}}, {@smackfshat={'smackfshat', 0x3d, '@^/\xb6'}}, {@smackfshat={'smackfshat', 0x3d, 'dax'}}, {@fowner_gt={'fowner>', r8}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@euid_gt={'euid>', r7}}, {@euid_lt={'euid<', r7}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@obj_type={'obj_type', 0x3d, '-$/'}}]}) [ 271.248367][T20293] FAULT_INJECTION: forcing a failure. [ 271.248367][T20293] name failslab, interval 1, probability 0, space 0, times 0 [ 271.261078][T20293] CPU: 1 PID: 20293 Comm: syz-executor.0 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 271.271231][T20293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.281288][T20293] Call Trace: [ 271.284561][T20293] dump_stack_lvl+0xd6/0x122 [ 271.289212][T20293] dump_stack+0x11/0x1b [ 271.293435][T20293] should_fail+0x23c/0x250 00:28:19 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x1020, 0x0) [ 271.297853][T20293] ? ext4_remount+0x67/0x1980 [ 271.302527][T20293] __should_failslab+0x81/0x90 [ 271.307293][T20293] should_failslab+0x5/0x20 [ 271.311816][T20293] __kmalloc_track_caller+0x6d/0x350 [ 271.317098][T20293] kstrdup+0x31/0x70 [ 271.320994][T20293] ext4_remount+0x67/0x1980 [ 271.325581][T20293] ? __cond_resched+0x11/0x40 [ 271.330259][T20293] ? __dentry_kill+0x456/0x4e0 [ 271.335066][T20293] ? __dput_to_list+0x153/0x250 [ 271.339898][T20293] ? shrink_dentry_list+0x30f/0x340 [ 271.345079][T20293] ? ext4_statfs+0x6b0/0x6b0 [ 271.349649][T20293] legacy_reconfigure+0x8e/0xa0 [ 271.354571][T20293] reconfigure_super+0x2d3/0x4f0 [ 271.359492][T20293] path_mount+0x145a/0x1d20 [ 271.363981][T20293] __se_sys_mount+0x24b/0x2f0 [ 271.368706][T20293] __x64_sys_mount+0x63/0x70 [ 271.373327][T20293] do_syscall_64+0x44/0xa0 [ 271.377747][T20293] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 271.383647][T20293] RIP: 0033:0x467b1a [ 271.387534][T20293] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 271.407231][T20293] RSP: 002b:00007f1443f49fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 271.415632][T20293] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 271.423597][T20293] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 271.431550][T20293] RBP: 00007f1443f4a040 R08: 00007f1443f4a040 R09: 00000000200000c0 [ 271.439524][T20293] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 00:28:19 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 271.447478][T20293] R13: 0000000020000100 R14: 00007f1443f4a000 R15: 0000000020000180 00:28:20 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}, 0x0, 0x2}}]}, 0x184}}, 0x0) 00:28:20 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:20 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:20 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x0, 0x0, 0x12020, &(0x7f0000000200)={[{@user_xattr}], [{@hash}]}) 00:28:20 executing program 0 (fault-call:10 fault-nth:11): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:20 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:20 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1c5020, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000180)="c71e3af6023b8d5e695c70ce2439c1c0802846a1ed85844b5f410d0b0369b42a621cffbf41903b866479334c23c752ca406cd23cf0fb29bef77d4aadc82eca483192be9af563743fc3f62c6c61825e42c8b4c4c6b0dd07c48736ad990aa2de7e18d247d9826a7d0d1d42b25d2bce8b3e91c1d76ab24d877cbc3ab3f369f510c9bc28440b57745b42526c7676500dc6df7c916a7b6325ca43e7531675b439d45b9cb1fd538b72b5e454f350af421773fdb2ec35f94edc3267e17acc515dd371134c45dafdb85d9a0498e217cb6b06666d492bccbbf39290d6a1a3", 0xda}, {&(0x7f0000000280)="3bcc4237999ed73e0d44facb573080c28a2630a20605ab906727f424449d53f9d8b1e68d71c9fdb4761dc101db1ee2baeb6db11a7256b22d6422536c6e2885683dbeed8322f7735407d2f6f1aab7214c632bd5bffed1cf680e3c0bfbceaea0f59b0d16ba57483c17d9ca9f3096aa3bd735992ad73500174906192083edf7376ffed8103f3a1075edb9e38d3941d7644d4cb107e3fc", 0x95}, {&(0x7f0000000040)="643672bb1cea81afd1b50c531831eba065995070bac76acc5db0913448eb8144", 0x20}, {&(0x7f0000000340)="6cf3bb9d20d1ca3af0c20daa0311d445457b300aa57a48b4901a8f0b05e4a28fd300b480f7a0569f644b62df7f995b7f9e4de19a7b6864dd083b68a08255230fa55da0e6a55be680f1a27ff09e8cf22d8ee6afba8756d7ab8a0060bfdda77355a2134812f9b66f3ba4fbe5685e69a71e1187b91c198669bdc99071fd97d79b157b9dd8acd9", 0x85}, {&(0x7f0000000400)}], 0x5}}], 0x1, 0x4) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x0, 0x0, 0x20a1, &(0x7f0000000040)=ANY=[]) 00:28:20 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:20 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:20 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:20 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:20 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 272.112780][T20360] FAULT_INJECTION: forcing a failure. [ 272.112780][T20360] name failslab, interval 1, probability 0, space 0, times 0 [ 272.125508][T20360] CPU: 1 PID: 20360 Comm: syz-executor.0 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 272.135703][T20360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.145760][T20360] Call Trace: [ 272.149035][T20360] dump_stack_lvl+0xd6/0x122 [ 272.153630][T20360] dump_stack+0x11/0x1b [ 272.157790][T20360] should_fail+0x23c/0x250 [ 272.162207][T20360] ? mempool_alloc_slab+0x16/0x20 [ 272.167233][T20360] __should_failslab+0x81/0x90 [ 272.171998][T20360] should_failslab+0x5/0x20 [ 272.176541][T20360] kmem_cache_alloc+0x4f/0x300 [ 272.181290][T20360] ? chksum_update+0x39/0x50 [ 272.185924][T20360] mempool_alloc_slab+0x16/0x20 [ 272.190764][T20360] ? mempool_free+0x130/0x130 [ 272.195432][T20360] mempool_alloc+0x9d/0x310 [ 272.199912][T20360] ? match_token+0x414/0x440 [ 272.204485][T20360] bio_alloc_bioset+0xcc/0x530 [ 272.209259][T20360] submit_bh_wbc+0x130/0x330 [ 272.213853][T20360] ? ext4_update_super+0x71c/0x740 [ 272.218946][T20360] __sync_dirty_buffer+0x136/0x1e0 [ 272.224041][T20360] ext4_commit_super+0x1f6/0x290 [ 272.228960][T20360] ext4_remount+0xff7/0x1980 [ 272.233538][T20360] ? __dentry_kill+0x456/0x4e0 [ 272.238288][T20360] ? ext4_statfs+0x6b0/0x6b0 [ 272.242859][T20360] legacy_reconfigure+0x8e/0xa0 [ 272.247736][T20360] reconfigure_super+0x2d3/0x4f0 [ 272.252655][T20360] path_mount+0x145a/0x1d20 [ 272.257234][T20360] __se_sys_mount+0x24b/0x2f0 [ 272.261899][T20360] __x64_sys_mount+0x63/0x70 [ 272.266517][T20360] do_syscall_64+0x44/0xa0 [ 272.270919][T20360] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 272.276810][T20360] RIP: 0033:0x467b1a [ 272.280695][T20360] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 272.300287][T20360] RSP: 002b:00007f1443f49fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 272.308718][T20360] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 272.316740][T20360] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 272.324706][T20360] RBP: 00007f1443f4a040 R08: 00007f1443f4a040 R09: 00000000200000c0 [ 272.332746][T20360] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 272.340721][T20360] R13: 0000000020000100 R14: 00007f1443f4a000 R15: 0000000020000180 [ 272.350364][T20360] EXT4-fs: 119 callbacks suppressed [ 272.350376][T20360] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 272.368228][T20358] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 272.378485][T20358] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. [ 272.388611][T20361] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 272.398749][T20361] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. [ 272.408664][T20365] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 272.418825][T20365] EXT4-fs (sda1): re-mounted. Opts: sysvgroups,journal_checksum,,errors=continue. Quota mode: none. [ 272.429682][T20366] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 272.439994][T20366] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. [ 272.449968][T20367] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring 00:28:20 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}, 0x0, 0x2}}]}, 0x184}}, 0x0) 00:28:20 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000001180)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000840)={0x54, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x54}}, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000001180)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000840)={0x54, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x54}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000002f40)={'vxcan1\x00', 0x0}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000001180)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r7, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000840)={0x54, r8, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}]}, 0x54}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f80)={{{@in=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000003080)=0xe8) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000003280)={&(0x7f0000002f00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000003240)={&(0x7f00000030c0)={0x170, r1, 0x1, 0x70bd28, 0x25dfdbfc, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x4}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x170}, 0x1, 0x0, 0x0, 0x4040}, 0x20044800) sendmmsg(0xffffffffffffffff, &(0x7f0000002e40)=[{{0x0, 0x0, &(0x7f00000024c0)=[{&(0x7f0000000200)="d34924c5c115496de80d42f607be81f5a49d5629e326a1b719466406c25fa4ebb5ee1e106148122c0253d765837cf3bc1c7130bf593986dbfefa720542ce464cdbce02771424e3bc9adb5beb9aebee680e48019bf578265421e6c92391cebb688f9997a5e224f2e3e1e4b888277b98601d207f1492efb488bd880bd65b7cf3143bac84f86186d8f4127683f1bfd2855ddf4f82dfe8613cb6142c", 0x9a}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="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", 0x1000}, {&(0x7f0000000000)="0475864419b26587ba22c8384ecd0405849d1e63ef156d2ec77b4fa590e289f29e3cd67e962119a541326d81d93d23f95e478202302dde185d9064fa73adb1970b43fababbaa1996efa84ce2490857072c7495ddd8263db364c95f964a04f1e7baf940b78ad57e2fad", 0x69}, {&(0x7f00000002c0)="efa8096d10b526d74150e645df1869875575327def094e51bfae5df99e4f22a3033a9a1fea7165e8198aad6db6145e00bbd094e5806f1b28664267afe8836309a91f1e77236ddae274153e5b26223f713fb16afe6da7c97ff17cda702ab8b02cf9028cd740902a23757ced8050c13e0b5ae93e91091498d8fa19c8aa96db12ce42d00af05669c09cb77d7025e8417a51970ee22dbc0162fe2a46869927b7f0b1db6f5b8dee22de8a760c2a", 0xab}, {&(0x7f00000023c0)="f7ffd2aa0709681820688c7a33e1c8a50dc00121530747a6cb7802ffbbd66a88ecd0914a1607a959e37ec0cdd79abbbeff8e829d3c96e60947cccc5d06fc6b38a5f5e64c1d915623980b37437b42065b5dafcf0565db6972fdaf75da7c29596c1dd23ee356e1dd8d4e731c00922038c25d9e7253785209af266a0909d73cc76fb6d095fd1435330627552099e445cc632af60354d12e442a6d01ec6e842e829bc164422b7e2c88c7b0466796a2b7a585846bec2a87e22304cd1ca7446637b7692c221a7258854dfe01c3e68cabc55af5a62464374fbd596af496793087f5bddf9af15fafe09ac615a9954c47add2b96df6cedd", 0xf3}], 0x6, &(0x7f0000002540)=[{0xf8, 0x110, 0x3f, "2c42de4d8c53562130fb278fb9861464f429b4c3ee183012710d52dda8a60b84aaa70615c2f156e454d5072bae9faa2b5112ac127ffcd041e405640299232d3457c906410c6c4e607f31e4c11e3471f3c2eb51a22f74868821a57142be5601ee9158f804173ff193d08e80bd5bc7eef71062ddb4295f907ea1fa19efb09cbcd04b24ea8495046ae215239fc7e41352ffd9ed0441a9c9e4007c5d4c480f2bfa75faf53b8c2784e2f7d76a9d32485d46b10d4c998ee2ae9ef1974edc81cf0e0cdae11fa776eb71568cca053e0586da0d2f5cb59142f6b2e71a4d93fa62dab9f661f4f81dcf2c75"}, {0x58, 0x105, 0x1, "107e270307a0f71daa8aa3d4f4f8df357f48b11520a0fb593ebd263c8302a00ee9b91a1fdeb676cb9e1e7c7851f7916e4d32bbbed787f02b2c3ab8e8b8bb754e54b497"}, {0x108, 0x115, 0x80000001, "413a333f6814e2fafb876a9f8bb98ad408a3b257f564eaf7c46caa9a5eb41634449ecaf5b9bb4fdd130354873ae7cb160210e4603fabe3b7f4938c65ea4648977f42276a860d0cde514c7895d4adaf2b3f6d88bbd18ddcd0373f1c1f0bff8908394bf67f5b6442d41c44f89f53a46cdac97b60d0a4ff253358d25393f79f66308594632d761c3022bbf2296e14432cac7f2d5a71b12611dc6095a24105753caaa22d71eac5491e0807b431d9c6c505aff9b6c52661fa9a767fca5d0f610b3a862c6f8eaaafcbb7e75fb34c4148597964cb60062bd51aeebca39da5f4dea5af25bb80413e671ddf795d584ae4d66df81bf6"}, {0xd8, 0x10d, 0x473, "53acd5fe344e5d732718da561097b35e62f8cff5e1ac16e47ca4ddb19934f0ffce70004b8200e348ba0c28c0943953e4c97a286d538de4d2eb624f2055322fe0f34fc0a917f9223101c70bc99ab7138af174e892ee3aea82de4ec257b17a2ef7dbe4820974cac73edc3d4f6824dd3e3f717dcb249c98aecfebcaf6c2b63a5ea9a55b6c227364e7e3f1b804e65311efbe8d5e40e8721856d6acafc3b60c191eb100fdf8a418de07b590f4f18334692519c73c838f31b2948e2e1e8565007ae8f1c07ba9eef2524ee5"}], 0x330}}, {{&(0x7f0000002880)=@xdp={0x2c, 0x0, r3, 0x3}, 0x80, &(0x7f0000000180)=[{&(0x7f0000002900)="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", 0xff}, {&(0x7f0000002a00)="e7bde16ee024dc414139a3592f3dc0814f0d804a8516cf3c0b96fe125231718bffe0d078ed4cf77c09e79018645ff12ddf8428453364657d115ecd2e8fb222415073e8c8d10b88a513fe716954341aa01f89791c93ad4e06a3a89798f1b616ee76df9060d7d65ba4e8c06b8a28d4f6edebb1d7dcdf1235e925cab16088973c36f633d13b2235d4dc55ed0ed98d4a492e95e9d2d8fec496e897db98e6650a92b18ed37730b7ee09c0c9187ea137b9a169fdf461b796f6abbc2fb3bd4b96890fc5b5af8bd5e7f0c6e6ec590a", 0xcb}], 0x2, &(0x7f0000002b00)=[{0x20, 0x10d, 0x1, "42f00e8b6dcbc875b8301d4b"}, {0x90, 0x10d, 0x10001, "e5bcaf0fdbbd8290452da0e1921c7ca2cc3261f23d584c44020d9dfc6e3a2bbeabedf14f034c640dceeb87ff560089f0658afda12aa79782eb2f6128063fd15e074c966b68fa491ad34f5b19f95fa041b94daf1bbc3d5aed475a416dc98681df74eab4b070bfeab0d9d786736946f906e36709dc206c782af6"}, {0x80, 0x10e, 0x5, "91db605d95c160ec3ee7a27f7fe6d6fd0fc12945297f4dcc1b9232bfba0aedaf38b70e849bb9ceb34a34d9cff412a9f23fa9cf462fc89ddfc3518d53ac7746feac39f343d719651065e6332b8d6e9c705d6c7dd8106c6d1f6922792ef9fa74cbe5cf73dc0b7f5117c7f01d1f477cc1"}], 0x130}}, {{&(0x7f0000002c40)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(serpent)\x00'}, 0x80, &(0x7f00000032c0)=[{&(0x7f0000002cc0)="5e02e32ff3c012a387cf291ea5dbfb08f9e26d4a7a3eb7a0195421546a240457807621623810bc6adc393967c0ffd62c058502b9ca1cec33aeb0b7758c76c9c1a89e2734ae6385562e118cdacd29de8d0b188d99afa78201d7c4ced9d09f31c65d5f0e5c6e62848fbc363afd3b6bfa45f751689d565995d54d012be97c31b5b12ac7491463b18ff3efa984c1f53a", 0x8e}, {&(0x7f0000002d80)="237c39f89e5cded2dd667c5278519dd9d05e030e1b307327a756874c7b5cceb4730f2df3b580433fb397992a38077e4f7aee7d8cc686edf7d5e9d85f35d07a687bc98c08a7d68395982b9784f03939dc21163e4678506fa266fddb1ecda8015eaf242dcbb0ee1ba44f32f88e2aa4113a", 0x70}], 0x2}}], 0x3, 0x40000) 00:28:20 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3ff7f8, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:20 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:21 executing program 0 (fault-call:10 fault-nth:12): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:21 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:21 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3ff800, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:21 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) sendto(0xffffffffffffffff, &(0x7f0000000200)="05cbd02fa3f21638ea3a480891b00167d280913624b5f76ed0ec84346e9c9651f6c0fce5761a380dc351f2e605f8800b0cdfa71aab762e43a9a7ab4850e4bd80c00d2cc4c41e99e4c46fa510d520763ccf1f86dd3a94d3965c63a94e89d5efaf4617a7d77595129e0bdf3a2f24ef77c2591bfee2b882c11f50ea4d76913418b698203e331a5d1a78166ad5edd9bba3513e3d48c9b572df74476a0fec2b49e5619e07a6b182561f0ef782eed519593dc2b835b66ce9eabc6428bfbf92c2ec66443584b15a5b1383adf440b64f87027962f1254f", 0xd3, 0x10, &(0x7f0000000000)=@llc={0x1a, 0x303, 0x6, 0x1, 0x81, 0x40, @random="c37cabcb0fda"}, 0x80) 00:28:21 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:21 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xb000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:21 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:21 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x65) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) move_mount(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x50) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) [ 273.000601][T20419] FAULT_INJECTION: forcing a failure. [ 273.000601][T20419] name failslab, interval 1, probability 0, space 0, times 0 [ 273.013238][T20419] CPU: 1 PID: 20419 Comm: syz-executor.0 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 273.023383][T20419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.033431][T20419] Call Trace: [ 273.036733][T20419] dump_stack_lvl+0xd6/0x122 [ 273.041311][T20419] dump_stack+0x11/0x1b [ 273.045462][T20419] should_fail+0x23c/0x250 [ 273.049996][T20419] __should_failslab+0x81/0x90 [ 273.054796][T20419] should_failslab+0x5/0x20 [ 273.059288][T20419] kmem_cache_alloc_node+0x61/0x2c0 [ 273.064528][T20419] ? create_task_io_context+0x36/0x210 [ 273.069968][T20419] ? __d_add+0x3bf/0x490 [ 273.074262][T20419] create_task_io_context+0x36/0x210 [ 273.079598][T20419] submit_bio_checks+0x7c3/0x850 [ 273.084517][T20419] ? mempool_alloc_slab+0x16/0x20 [ 273.089521][T20419] submit_bio_noacct+0x33/0x7d0 [ 273.094353][T20419] submit_bio+0x10c/0x190 [ 273.098669][T20419] submit_bh_wbc+0x2f3/0x330 [ 273.103372][T20419] __sync_dirty_buffer+0x136/0x1e0 [ 273.108477][T20419] ext4_commit_super+0x1f6/0x290 [ 273.113408][T20419] ext4_remount+0xff7/0x1980 [ 273.117981][T20419] ? __dentry_kill+0x456/0x4e0 [ 273.122807][T20419] ? ext4_statfs+0x6b0/0x6b0 [ 273.127402][T20419] legacy_reconfigure+0x8e/0xa0 [ 273.132264][T20419] reconfigure_super+0x2d3/0x4f0 [ 273.137314][T20419] path_mount+0x145a/0x1d20 [ 273.141800][T20419] __se_sys_mount+0x24b/0x2f0 [ 273.146538][T20419] __x64_sys_mount+0x63/0x70 [ 273.151244][T20419] do_syscall_64+0x44/0xa0 [ 273.155644][T20419] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 273.161564][T20419] RIP: 0033:0x467b1a [ 273.165479][T20419] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 273.185080][T20419] RSP: 002b:00007f1443f49fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 273.193544][T20419] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 273.201515][T20419] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000000000000 [ 273.209562][T20419] RBP: 00007f1443f4a040 R08: 00007f1443f4a040 R09: 00000000200000c0 [ 273.217513][T20419] R10: 0000000000012020 R11: 0000000000000202 R12: 00000000200000c0 [ 273.225463][T20419] R13: 0000000020000100 R14: 00007f1443f4a000 R15: 0000000020000180 00:28:21 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev, 0x0, 0x32}, @in=@multicast2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}, 0x0, 0x2}}]}, 0x184}}, 0x0) 00:28:21 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x9) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2001, &(0x7f00000001c0)={[{@dax}]}) 00:28:21 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:22 executing program 0 (fault-call:10 fault-nth:13): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:22 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x18, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:22 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf83f00, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:22 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:22 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) bind$unix(0xffffffffffffffff, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 00:28:22 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:22 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:22 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x19, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 273.876076][T20469] FAULT_INJECTION: forcing a failure. [ 273.876076][T20469] name failslab, interval 1, probability 0, space 0, times 0 [ 273.888730][T20469] CPU: 0 PID: 20469 Comm: syz-executor.0 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 273.898882][T20469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.908928][T20469] Call Trace: [ 273.912198][T20469] dump_stack_lvl+0xd6/0x122 [ 273.916796][T20469] dump_stack+0x11/0x1b [ 273.920944][T20469] should_fail+0x23c/0x250 [ 273.925352][T20469] ? getname_flags+0x84/0x3f0 [ 273.930028][T20469] __should_failslab+0x81/0x90 [ 273.934784][T20469] should_failslab+0x5/0x20 [ 273.939360][T20469] kmem_cache_alloc+0x4f/0x300 [ 273.944286][T20469] getname_flags+0x84/0x3f0 [ 273.948793][T20469] getname+0x15/0x20 [ 273.952690][T20469] do_sys_openat2+0x6d/0x2b0 [ 273.957280][T20469] ? __se_sys_mount+0x26f/0x2f0 [ 273.962137][T20469] __x64_sys_openat+0xef/0x110 [ 273.966954][T20469] do_syscall_64+0x44/0xa0 [ 273.971424][T20469] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 273.977297][T20469] RIP: 0033:0x4196e4 [ 273.981231][T20469] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 274.000812][T20469] RSP: 002b:00007f1443f49f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 274.009206][T20469] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004196e4 [ 274.017244][T20469] RDX: 0000000000010000 RSI: 0000000020000100 RDI: 00000000ffffff9c [ 274.025195][T20469] RBP: 0000000020000100 R08: 0000000000000000 R09: 00000000200000c0 [ 274.033143][T20469] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 274.041092][T20469] R13: 0000000020000100 R14: 00007f1443f4a000 R15: 0000000020000180 00:28:22 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x10000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:22 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x0, 0x0, 0x12020, &(0x7f0000000000)) 00:28:22 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:22 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev, 0x0, 0x32}, @in=@multicast2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}, 0x0, 0x2}}]}, 0x184}}, 0x0) 00:28:23 executing program 0 (fault-call:10 fault-nth:14): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:23 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x22, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:23 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:23 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) mount(&(0x7f0000000000)=@sr0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x800800, &(0x7f0000000200)='ext3\x00') syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) 00:28:23 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x11000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:23 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x7, 0x7) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) set_mempolicy(0x2, &(0x7f0000000180)=0x1, 0x1) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@loopback, @in6=@private2}, {@in=@local, 0x0, 0x33}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) 00:28:23 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 274.693748][T20509] sysfs: Unknown parameter 'ext3' [ 274.699181][T20510] sysfs: Unknown parameter 'ext3' 00:28:23 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2e, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:23 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x12000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 274.784964][T20529] FAULT_INJECTION: forcing a failure. [ 274.784964][T20529] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 274.798024][T20529] CPU: 1 PID: 20529 Comm: syz-executor.0 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 274.808179][T20529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.818294][T20529] Call Trace: [ 274.821565][T20529] dump_stack_lvl+0xd6/0x122 [ 274.826204][T20529] dump_stack+0x11/0x1b [ 274.830351][T20529] should_fail+0x23c/0x250 00:28:23 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 274.834756][T20529] should_fail_usercopy+0x16/0x20 [ 274.839866][T20529] strncpy_from_user+0x21/0x250 [ 274.844773][T20529] getname_flags+0xb8/0x3f0 [ 274.849257][T20529] getname+0x15/0x20 [ 274.853130][T20529] do_sys_openat2+0x6d/0x2b0 [ 274.857700][T20529] ? __se_sys_mount+0x26f/0x2f0 [ 274.862531][T20529] __x64_sys_openat+0xef/0x110 [ 274.867274][T20529] do_syscall_64+0x44/0xa0 [ 274.871695][T20529] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 274.877571][T20529] RIP: 0033:0x4196e4 [ 274.881443][T20529] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 274.901036][T20529] RSP: 002b:00007f1443f49f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 274.909428][T20529] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004196e4 [ 274.917378][T20529] RDX: 0000000000010000 RSI: 0000000020000100 RDI: 00000000ffffff9c [ 274.925360][T20529] RBP: 0000000020000100 R08: 0000000000000000 R09: 00000000200000c0 00:28:23 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x3400, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0xb0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) [ 274.933305][T20529] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 274.941251][T20529] R13: 0000000020000100 R14: 00007f1443f4a000 R15: 0000000020000180 00:28:23 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev, 0x0, 0x32}, @in=@multicast2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}, 0x0, 0x2}}]}, 0x184}}, 0x0) 00:28:24 executing program 0 (fault-call:10 fault-nth:15): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:24 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x18000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:24 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:24 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:24 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80, 0x438b78818ba045c3) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000040)=ANY=[@ANYBLOB="6461f80fdbbd064405ea922c00"]) 00:28:24 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:24 executing program 3: fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000240)=@filename='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='mqueue\x00', 0x2080000, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x40, 0x4) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x102010, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) 00:28:24 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x18000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:24 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x19000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 275.673274][T20584] FAULT_INJECTION: forcing a failure. [ 275.673274][T20584] name failslab, interval 1, probability 0, space 0, times 0 [ 275.685931][T20584] CPU: 1 PID: 20584 Comm: syz-executor.0 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 275.696079][T20584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.706129][T20584] Call Trace: [ 275.709399][T20584] dump_stack_lvl+0xd6/0x122 [ 275.713980][T20584] dump_stack+0x11/0x1b [ 275.718138][T20584] should_fail+0x23c/0x250 [ 275.722537][T20584] ? __alloc_file+0x2e/0x1a0 [ 275.727160][T20584] __should_failslab+0x81/0x90 [ 275.731922][T20584] should_failslab+0x5/0x20 [ 275.736400][T20584] kmem_cache_alloc+0x4f/0x300 [ 275.741141][T20584] __alloc_file+0x2e/0x1a0 [ 275.745615][T20584] alloc_empty_file+0xcd/0x1c0 [ 275.750358][T20584] path_openat+0x6a/0x1ec0 [ 275.754757][T20584] ? ext4_remount+0x1788/0x1980 [ 275.759587][T20584] ? __dentry_kill+0x456/0x4e0 [ 275.764414][T20584] do_filp_open+0x105/0x220 [ 275.768896][T20584] do_sys_openat2+0xb5/0x2b0 [ 275.773465][T20584] ? __se_sys_mount+0x26f/0x2f0 [ 275.778381][T20584] __x64_sys_openat+0xef/0x110 [ 275.783134][T20584] do_syscall_64+0x44/0xa0 [ 275.787544][T20584] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 275.793538][T20584] RIP: 0033:0x4196e4 [ 275.797410][T20584] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 00:28:24 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1800, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:24 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x22000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 275.817014][T20584] RSP: 002b:00007f1443f49f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 275.825403][T20584] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004196e4 [ 275.833364][T20584] RDX: 0000000000010000 RSI: 0000000020000100 RDI: 00000000ffffff9c [ 275.841313][T20584] RBP: 0000000020000100 R08: 0000000000000000 R09: 00000000200000c0 [ 275.849274][T20584] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 275.857236][T20584] R13: 0000000020000100 R14: 00007f1443f4a000 R15: 0000000020000180 00:28:24 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x4b0a00, 0x13e) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) mount(&(0x7f0000000040)=@sg0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='sysv\x00', 0x40020, &(0x7f0000000240)='.!\xf5&(\xe8!+\\\x00') 00:28:24 executing program 0 (fault-call:10 fault-nth:16): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:24 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x19000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:24 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1900, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:24 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x25000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:24 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 00:28:24 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8800b8, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) 00:28:24 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2200, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:25 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000180)='-\x00', 0x2, 0x3) 00:28:25 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2e000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 276.558456][T20639] FAULT_INJECTION: forcing a failure. [ 276.558456][T20639] name failslab, interval 1, probability 0, space 0, times 0 [ 276.571087][T20639] CPU: 0 PID: 20639 Comm: syz-executor.0 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 276.581242][T20639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.591283][T20639] Call Trace: [ 276.594592][T20639] dump_stack_lvl+0xd6/0x122 [ 276.599166][T20639] dump_stack+0x11/0x1b [ 276.603301][T20639] should_fail+0x23c/0x250 [ 276.607692][T20639] ? security_file_alloc+0x30/0x190 [ 276.612870][T20639] __should_failslab+0x81/0x90 [ 276.617616][T20639] should_failslab+0x5/0x20 [ 276.622106][T20639] kmem_cache_alloc+0x4f/0x300 [ 276.626881][T20639] security_file_alloc+0x30/0x190 [ 276.631883][T20639] __alloc_file+0x83/0x1a0 [ 276.636337][T20639] alloc_empty_file+0xcd/0x1c0 [ 276.641091][T20639] path_openat+0x6a/0x1ec0 [ 276.645488][T20639] ? ext4_remount+0x1788/0x1980 [ 276.650318][T20639] ? __dentry_kill+0x456/0x4e0 [ 276.655065][T20639] do_filp_open+0x105/0x220 [ 276.659559][T20639] do_sys_openat2+0xb5/0x2b0 [ 276.664164][T20639] ? __se_sys_mount+0x26f/0x2f0 [ 276.668992][T20639] __x64_sys_openat+0xef/0x110 [ 276.673760][T20639] do_syscall_64+0x44/0xa0 [ 276.678159][T20639] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 276.684103][T20639] RIP: 0033:0x4196e4 [ 276.687978][T20639] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 276.707643][T20639] RSP: 002b:00007f1443f49f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 276.716047][T20639] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004196e4 [ 276.723998][T20639] RDX: 0000000000010000 RSI: 0000000020000100 RDI: 00000000ffffff9c [ 276.731961][T20639] RBP: 0000000020000100 R08: 0000000000000000 R09: 00000000200000c0 [ 276.739907][T20639] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 276.747856][T20639] R13: 0000000020000100 R14: 00007f1443f4a000 R15: 0000000020000180 00:28:25 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x22000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:25 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2e00, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:25 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:25 executing program 0 (fault-call:10 fault-nth:17): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:25 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000200)={0x0, 0xfb, 0x70, 0x4, 0xf7, "d69326f6ddf21e444c370a450233f5af", "bdae43a0258091664095421b46e6f35f3caa44c1c2d4e0f9920033bb7d1ecd833db7b4af842577d2d1507426b805383d93a354bbec959b676e224a9b4ab9f0ac173ad2c0a76aa239823604c56c377f23dd260ad1d71afca7bb525f"}, 0x70, 0x3) 00:28:25 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:25 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2e000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:25 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 00:28:25 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 277.375893][T20670] EXT4-fs: 188 callbacks suppressed [ 277.375907][T20670] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 277.395994][T20670] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. [ 277.406074][T20672] EXT4-fs (sda1): dax option not supported [ 277.413909][T20673] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 277.424421][T20673] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. [ 277.434293][T20675] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 277.444335][T20675] EXT4-fs (sda1): re-mounted. Opts: sysvgroups,journal_checksum,,errors=continue. Quota mode: none. [ 277.455148][T20679] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 277.465416][T20679] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. 00:28:26 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 277.578060][T20682] EXT4-fs (sda1): dax option not supported 00:28:26 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x8000, 0x0, 0x4}, 0x18) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000200)=ANY=[@ANYRES64=0x0]) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0), 0x109800, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000180)='./file0\x00', 0x8, 0x3) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), 0x3101080, 0x0) mount(&(0x7f00000001c0)=@nullb, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='debugfs\x00', 0x0, &(0x7f00000002c0)=']]]^@\xe1\x19x@\x00') 00:28:26 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:26 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:26 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 277.741638][T20680] FAULT_INJECTION: forcing a failure. [ 277.741638][T20680] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 277.754771][T20680] CPU: 0 PID: 20680 Comm: syz-executor.0 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 277.764919][T20680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.774957][T20680] Call Trace: [ 277.778228][T20680] dump_stack_lvl+0xd6/0x122 [ 277.782820][T20680] dump_stack+0x11/0x1b [ 277.786979][T20680] should_fail+0x23c/0x250 00:28:26 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)=""/4096) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) [ 277.791387][T20680] should_fail_usercopy+0x16/0x20 [ 277.796391][T20680] _copy_to_user+0x1c/0x90 [ 277.800806][T20680] simple_read_from_buffer+0xab/0x120 [ 277.806157][T20680] proc_fail_nth_read+0x10d/0x150 [ 277.811183][T20680] ? proc_fault_inject_write+0x230/0x230 [ 277.816818][T20680] vfs_read+0x1e6/0x750 [ 277.820966][T20680] ? putname+0xb8/0xd0 [ 277.825013][T20680] ? __fget_light+0x21b/0x260 [ 277.829666][T20680] ? __cond_resched+0x11/0x40 [ 277.834322][T20680] ksys_read+0xd9/0x190 [ 277.838458][T20680] __x64_sys_read+0x3e/0x50 [ 277.843035][T20680] do_syscall_64+0x44/0xa0 [ 277.847431][T20680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 277.853317][T20680] RIP: 0033:0x41937c [ 277.857236][T20680] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 277.876833][T20680] RSP: 002b:00007f1443f4a170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 00:28:26 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000180)) [ 277.885252][T20680] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000041937c [ 277.893204][T20680] RDX: 000000000000000f RSI: 00007f1443f4a1e0 RDI: 0000000000000006 [ 277.901246][T20680] RBP: 00007f1443f4a1d0 R08: 0000000000000000 R09: 00000000200000c0 [ 277.909203][T20680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 277.917177][T20680] R13: 00007ffdc43acc3f R14: 00007f1443f4a300 R15: 0000000000022000 00:28:26 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:26 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:26 executing program 3: pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000004900)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r3]) lchown(&(0x7f0000000240)='./file0\x00', 0xee00, r3) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x101200, 0x80) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r4 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="550000002a007f33deba2f977333bd930a0000ce01a843089100fe803900080008000000009eb43c6a95a0fb432c00000000fb83de448daa72540d8102d269c4d4133ab82286926700"/85, 0x55}], 0x1}, 0x20000000) bind$inet6(r4, &(0x7f00000002c0)={0xa, 0x4e20, 0xffff9332, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x6}, 0x1c) syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1290840, &(0x7f0000000280)=ANY=[@ANYRES16]) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000180), 0x2, 0x2) open(&(0x7f0000000200)='./file0\x00', 0x50201, 0x1cc) 00:28:26 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) 00:28:26 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:26 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x16) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000280)=ANY=[@ANYBLOB="0000000008d4e5c2e4e9f2475d6ba6673739b90509ff83dd81fca82ff52b5e5b933b443041bd2b267a9761e58150ced8d1579f4e74a3aafc73f1bffdb2571d60ab46fa737fd0dfecba0022333a1b5e46b4032870e7e9806d75222ac471ddebc602c373cc8cf4e034a2d15500070279ec4ad12ea39c1d3a57642c218d0b7f45d67c731aa0b72e15a07fad1326a6f669b52a8d077ef3048091b671b633c7808177cbebc3eaac458a"]) close_range(r0, 0xffffffffffffffff, 0x0) 00:28:26 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf8f73f00, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:26 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:26 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) symlink(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)=ANY=[@ANYBLOB="66b600f911"]) mount$bind(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x8000, 0x0) 00:28:26 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:26 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfeffffff, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:27 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x40) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:27 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf8f73f00, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:27 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffefffff, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:27 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:27 executing program 3: mkdir(&(0x7f0000000100)='./file1\x00', 0x29) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x1000, 0x10, &(0x7f0000000200)) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000003c0)=ANY=[@ANYBLOB="4f619b351a995792877fe1e637d31fad5d39b23600e0597ccb0d6bb7a31cec49c8aea14f0307a20a68340f21182e5f1e46ee410000000000000538564e2051ebf0a899168e85a89303d6e997a741ec50dafb7e90ba1add27c01da141803eff6f75e33ae374043c84706952ef89a741deaa39d58225df388b1a5a904f08a76e561ec0ec9913b063aa33667c2bd9106248cf99e403393969efe1664afb9eee3be3aad06b2c82cadca8309364eccb5e2d4f5c5985"]) 00:28:27 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3ff7f8, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:27 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:27 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) 00:28:27 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffefff, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:27 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3ff800, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:27 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffefffff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:27 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) mount(&(0x7f0000000200)=@nullb, &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='erofs\x00', 0x100846, &(0x7f0000000340)='\x00') preadv(r0, &(0x7f0000000240), 0x0, 0x10000, 0xfbb) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x22400, 0x0) 00:28:27 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:28 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:28 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:28 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:28 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:28 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)=[&(0x7f00000001c0)='\xa5]*%\x00', &(0x7f0000000200)='ext3\x00', &(0x7f0000000240)='&:(&#)\x00', &(0x7f0000000280)='&!&@\x91{{/(^*{\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='ext3\x00'], &(0x7f0000000540)=[&(0x7f00000003c0)='/)::[:\']^(\xb5***\x00', &(0x7f0000000400)='ext3\x00', &(0x7f0000000440)='\x00', &(0x7f0000000480)='@&\x00', &(0x7f00000004c0)='(.#},-\x00', &(0x7f0000000500)='+\x00']) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x90002, 0xe8) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000040)=ANY=[@ANYBLOB="042ad398b1f805c078"]) 00:28:28 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:28 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='ext2\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) 00:28:28 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf83f00, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:28 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) truncate(&(0x7f0000000000)='./file0\x00', 0x7f) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) 00:28:28 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffffe, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:28 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:28 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x80000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:29 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:29 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) chroot(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@bsdgroups}]}) 00:28:29 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:29 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:29 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x800000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:29 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:29 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:29 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:29 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB="646188427c7abcbe9ebf87ced902acc865dd8a5d3083bda4b60883782c00"]) move_mount(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00', 0x6) 00:28:29 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x800000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:29 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:29 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x200000, 0x0) 00:28:30 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:30 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:30 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:30 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:30 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x801000, 0x0) 00:28:30 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:30 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:30 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:30 executing program 3: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_LINK_TIMEOUT, 0x3) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) open(&(0x7f0000000140)='./file0\x00', 0x10f401, 0x5) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2881090, 0x0) mount$bind(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x20000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000002c0)=ANY=[@ANYBLOB='stripe=0x00,stripe=0x0000000080000000,\x00'/53]) 00:28:30 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:30 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x800000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:30 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:31 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:31 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000025b183bec1e7c5f8cdded80f2e5f1af9ef548114f80d9d96c9ee3c702ab66a292271f99b4c069a43"]) 00:28:31 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf83f0000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:31 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf83f0000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:31 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:31 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x40) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) [ 282.583093][T21000] EXT4-fs: 197 callbacks suppressed [ 282.583106][T21000] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 282.649038][T21006] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 282.670744][T21006] EXT4-fs (sda1): re-mounted. Opts: sysvgroups,journal_checksum,,errors=continue. Quota mode: none. [ 282.681615][T21009] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 282.692094][T21009] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. [ 282.702007][T21010] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 282.712140][T21010] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. [ 282.722685][T21008] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 282.731903][T21012] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000337,,errors=continue. Quota mode: none. 00:28:31 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r5 = socket$nl_route(0x10, 0x3, 0x0) bind(r5, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) splice(r0, 0x0, r3, 0x0, 0x4ffe3, 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:28:31 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x40) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:31 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x18000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:31 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 282.742547][T21013] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring 00:28:31 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:31 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x19000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:32 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:32 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x40) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:32 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:32 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:32 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x22000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:32 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:32 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)=ANY=[@ANYBLOB='faxLr']) 00:28:32 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x40) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:32 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2e000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:32 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:32 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:32 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x40) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:32 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:32 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='./file0\x00') chmod(&(0x7f0000000000)='./file0\x00', 0x4) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) 00:28:32 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:32 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x40) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:32 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:32 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:33 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x19800, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000240)=ANY=[@ANYBLOB="06003f901c6b2c"]) r1 = openat(r0, &(0x7f0000000200)='./file0\x00', 0x8400, 0x100) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r3 = syz_open_pts(r2, 0x0) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000080)) dup3(r3, r2, 0x0) r5 = epoll_create(0x5) r6 = dup3(r5, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f0000000200)) move_mount(r1, &(0x7f00000001c0)='./file0\x00', r6, &(0x7f0000000280)='./file0\x00', 0x4) 00:28:33 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:33 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:33 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:33 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:33 executing program 2: mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:33 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x18, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:33 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:33 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1800000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:33 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:33 executing program 2: mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)={0x30, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x5, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0x30}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="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"], 0x28}, 0x1, 0x0, 0x0, 0x85}, 0xbc21234639a97e1b) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xabbfd2165acc1492}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x24, r2, 0x300, 0x70bd28, 0x25dfdbfe, {{}, {}, {0x8, 0x2, 0x7}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20008002}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) 00:28:34 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1900000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:34 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:34 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:34 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000003c0)={[{@dax}], [{@uid_lt={'uid<', 0xee01}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@pcr={'pcr', 0x3d, 0x32}}, {@appraise_type}, {@seclabel}, {@dont_measure}, {@subj_user={'subj_user', 0x3d, '\':#:'}}, {@fowner_lt={'fowner<', 0xee00}}, {@fowner_lt={'fowner<', 0xee01}}, {@subj_type}]}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x46c001, 0x0) mount_setattr(r0, &(0x7f0000000000)='./file0\x00', 0x9100, &(0x7f0000000180)={0x100007, 0x100044, 0x0, {r1}}, 0x20) 00:28:34 executing program 2: mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:34 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:34 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf8f73f00, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:34 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2200000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:34 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x38c1094, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x4, &(0x7f00000023c0)=[{&(0x7f00000003c0)="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", 0x1000, 0x7668fe94}, {&(0x7f00000002c0)="3ec27c5d5df5f47fcb312593fe96421cf6c2e5bda0e3434b8a189f19176aceabe88d26c6293573b939a49323bb536b07774dea0f7c377145c2832779de70bdcfd3d88ee12996eefb270ed49bdbbf697e3c6e6284d5108c01fb0dadba2e7f4d0fcf3fe7313492319cf4d6cd0445def0f7e4fba6ff829ee1183c49c2b29027a950894358b69d6d292ecfb8479310bafe3a58e764e53a694d1bd7", 0x99, 0x2}, {&(0x7f00000000c0)="3142c813cbd88a5b168f8aa5687e1866dfc97df12ffd51894fe57241df52606844833814f85370f5a88e7db9f860a1de7263545fe31be607960b18c316022224c85d487929f9567cb5c6491d48ee40b1ab91", 0x52, 0x5}, {&(0x7f00000013c0)="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", 0x1000, 0x10}], 0x250000, &(0x7f0000002440)={[{@data_writeback}, {@grpjquota}, {@sb={'sb', 0x3d, 0x1ff}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@barrier}, {@noload}, {@dioread_nolock}, {@bsdgroups}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r1}}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x77) 00:28:34 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:34 executing program 2: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:34 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x22, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:34 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000004900)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r3]) r4 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r5) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x0, 0x0, 0x12020, &(0x7f0000000280)={[{@nolazytime}, {@nogrpid}, {@sb={'sb', 0x3d, 0x2ba633a3}}, {@resgid={'resgid', 0x3d, r3}}, {@orlov}, {@delalloc}, {@nogrpid}, {@nomblk_io_submit}, {@auto_da_alloc}], [{@fowner_lt={'fowner<', r5}}]}) 00:28:34 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:34 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:34 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:35 executing program 2: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:35 executing program 3: mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) 00:28:35 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffefffff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:35 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x5, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) move_mount(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0x40) 00:28:35 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:35 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xb00000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:35 executing program 2: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:35 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:35 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2e, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:35 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:35 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc00000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:35 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:35 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x24) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)=ANY=[@ANYBLOB="1fccfaff47"]) 00:28:35 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:35 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:35 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) move_mount(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x40) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) 00:28:35 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:35 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd00000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:35 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:36 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881010, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2f52dc2107b0d97c5265762ff2663000"], &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='efivarfs\x00', 0x5, &(0x7f0000000240)='ext3\x00') [ 287.589675][T21322] EXT4-fs: 198 callbacks suppressed [ 287.589688][T21322] EXT4-fs (sda1): Unrecognized mount option "¶V¦žpȳþ±¯™Ó å‰Ù‰¡¯D8´báܨa•l¹NqÉùG)±zwh¦¤ˆÝÛd­_v%+üP7ƒr½†3ܨ" or missing value 00:28:36 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:36 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:36 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe00000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:36 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:36 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:36 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) [ 288.282672][T21330] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 00:28:36 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)=ANY=[@ANYBLOB='lax,\x00']) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x1000012, 0x0) [ 288.340949][T21337] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 288.369657][T21337] EXT4-fs (sda1): re-mounted. Opts: sysvgroups,journal_checksum,,errors=continue. Quota mode: none. [ 288.381765][T21340] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring 00:28:36 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) [ 288.396817][T21340] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. [ 288.406798][T21339] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 288.419504][T21339] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. [ 288.433676][T21349] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 00:28:36 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:36 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:36 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 288.442955][T21346] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring 00:28:36 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)=ANY=[@ANYBLOB='dax, ']) 00:28:37 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:37 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:37 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1100000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:37 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) 00:28:37 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x800000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:37 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:37 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000040)=ANY=[@ANYBLOB="9db4c37b0afdeb4a437bb6222ccf352c6461782c00"]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x68) 00:28:37 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:37 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1200000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:37 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:37 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:37 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000040)='ext3\x00', &(0x7f0000000180)='-\x00', &(0x7f0000000200)='dax', &(0x7f0000000240)='%(*-\x00', &(0x7f0000000280)='ext3\x00', &(0x7f00000002c0)='dax', &(0x7f0000000300)='ext3\x00', &(0x7f0000000340)='dax', &(0x7f00000003c0)='\x00'], &(0x7f0000000580)=[&(0x7f0000000480)='./%:{:$^\x00', &(0x7f00000004c0)='ext3\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='dax'], 0x1000) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) r0 = open_tree(0xffffffffffffff9c, &(0x7f00000005c0)='./file0\x00', 0x0) getdents64(r0, &(0x7f0000000600)=""/255, 0xff) 00:28:38 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:38 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:38 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1800000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:38 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffefffff00000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:38 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) mknodat$loop(r0, &(0x7f0000000000)='./file0\x00', 0x100, 0x1) 00:28:38 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:38 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:38 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:38 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1900000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:38 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:38 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0/file0\x00', 0x482080, 0x20) renameat2(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', r0, &(0x7f00000002c0)='./file0/file0\x00', 0x0) mount$bind(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x30c1099, 0x0) mount$9p_rdma(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0xaa24612b1a6717a5, &(0x7f0000000880)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532332c74696d656f75743d3078303030303030303030303030656539312c72713d0807770e223078303030303030303130303030303030312c74696d656f75743d3078303030303030303030303030303030342c72713d3078303030303030303030303030303036642c616669643d3078303030303030303038303030303030352c6163636573733d636c69656e742c736d61636b6673666c6f6f723d6578469aeaf6104206968611b8635ec57616922f695d8ec5ea936176361458a1d3ae8450f268e3063417950a8882cb"]) r1 = syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000040)=ANY=[@ANYBLOB="3c65503eaa45d592e6ff389f67142f92c7ed6a6469a2729a6e0b0f3a7c076d6a5e699fa67fa239d25af6b8fe7f7767e5c80858"]) chdir(&(0x7f0000000300)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x5f8a162e, 0x6, &(0x7f0000000740)=[{&(0x7f00000003c0)="cc53c754182b1a1e472831b4854566cbcfa06dd81457a260b615c920407129ad0a4ee198c61e4f5e0632d27e4decd465058c24355e9bdc3ccb6bf69992c41d1df053b54431682b6459ac84c62620f5a61b4cc17b9b070aeb7f651c7707f631d054e2138ca6031c8b376e4b7b5913c49da27c1c966dfed34c579aecec5fa3ddb331616b0304022550d37e3125e9876c65d88d582425f706948f3679ef9ba2ca0c82d284c225863aa479f810542299af48888bb130798e845551b1213403e2d3", 0xbf, 0x8}, {&(0x7f0000000480)="125858efa1f7aa3677", 0x9, 0x4}, {&(0x7f00000004c0)="33d1d07e8fa4dee93eec61dd7a5255d3c6885790fad27362ee2822bc431a52252c438fcb6513651ef2e44385b5ac59855e708c252a9daf48379f87e460ccacb92be17b6841c39d17ec66b3ac4e48ca5171cbb705fa032541efc0b8", 0x5b, 0xffffffffffffff7b}, {&(0x7f0000000540)="77c12d0b8845ead8b144488067ce660ce95f8cfed0bcf1958c0a9a672b1536e599e8", 0x22}, {&(0x7f0000000580)="6ea658b866775d9c4f49d7e42a082990062e186666cf6878774a36ef9b6c215f26b7361614647331dc19c5d6e4356ba49f5736f9cfd2b7d08cfeb7ff2cc6f7bc8dc769a0039b46b36ba210346aec692b41c8c00dfe6fb00fd499019511b38ba915743980ab0b397532ef4a7427b1424475ccdfa53e3a5d7241e33fd07054c486d1113d81a60ba8a4aea94423eea9b3a3e68be9547ffe945e", 0x98, 0xfffffffffffffff7}, {&(0x7f0000000640)="0896e51bab50030a967aee49bd3037130b31b44c1fd2358754446c5cd9732bab88a3a15b7d1e2baa993eb2fb94ef89f4740c07780da49bc07a263347037f98d1e3ff77ca21fd53446ce03391dc820fd730545d6d37d887cc21024cca238346aeb825b9af5346ea6adf4ec0b8544fec55f010060ecd2f979e0e79f6e1320ba1efaf568d1e99394db6654caf3b7cc0a17ffb02f401810bfe05f6f936b62999799d0dcbbc8fa65399ddf182a4d24cee4193c398b3e90620124daa9c7364177d78102f5d53f77b4aeb0a229937a4112e4af8a8e8c0901b97f8991910a27cd593b547479b1cb3236f5f47f9ae49175dc979e97dd8a5cd", 0xf4}], 0xa0000, &(0x7f0000000800)={[{@acl}, {@norecovery}], [{@smackfsdef={'smackfsdef', 0x3d, '['}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'smackfsfloor'}}, {@obj_role={'obj_role', 0x3d, 'ext3\x00'}}, {@appraise_type}, {@obj_type={'obj_type', 0x3d, '-!*(!{}'}}]}) r2 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mount(&(0x7f0000000c40)=@sg0, &(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)='ubifs\x00', 0x800070, &(0x7f0000000d00)='smackfsfloor') r6 = openat2(r1, &(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)={0x40000, 0x45, 0xc}, 0x18) bind$unix(r6, &(0x7f0000000dc0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) setreuid(0x0, r5) syz_mount_image$ext4(&(0x7f0000000980)='ext2\x00', &(0x7f00000009c0)='./file0\x00', 0x7, 0x2, &(0x7f0000000b40)=[{&(0x7f0000000a00)="3e47c4bac6e4c363545988d310338d70b0deffd5f48ec9d5b2dfe686b14138559e7d95ec86da3fec45b0ad75dd558507b1e779a968fed465e657ac20b35f9eaca1e92d2fd3fd9f2850f973727e303edd06bb0d98430742b7f636de8eec7e07718bfcc3c74799330bc3fd9cfabc6061e879453e1b7d83b171b3d8fb19bc8cb2", 0x7f, 0x40}, {&(0x7f0000000a80)="27648233ed1d3aa281dc2cee569990a73351a783a74ea53b9a11dbe4bdc8e9ca7a81b57a46da30d8960a3f84524340a4c734c74a64ee970cc2aed9e963af88ade312453e2f4116577cafa221d97b001def1703b178352ca23a26eaa09bee5a165fdebfee76ee6edea9f1254a18b0f7cdd094938ad7d2e177c0402a1e49f802cbdb8d63b3a90d30bdd5cc655ef4139a28af04950593b2b28972a4df80e1f394c0cfe9950f202b", 0xa6, 0x8}], 0x300000, &(0x7f0000000b80)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}, {@quota}, {@discard}, {@block_validity}, {@stripe={'stripe', 0x3d, 0x1000}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4}}], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@uid_eq={'uid', 0x3d, r3}}, {@uid_eq={'uid', 0x3d, r5}}]}) 00:28:38 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf83f0000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 290.335681][T21467] loop3: detected capacity change from 0 to 264192 00:28:39 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x1800, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:39 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2200000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:39 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:39 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:39 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:39 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000140)=ANY=[@ANYBLOB="6ba782c39072264352989c990d576b7e57ffbb7f89e8bde82c0012236c8b9e169a67419f1c2acef9ceff01000000000000e7ab9b3497281bda7055d2c684f9aa57d416ded79b375794dc96dac6a03c5ad38a4bfde361cb64a3337f07df2978e1e3ce6d9dd12c5e4a"]) 00:28:39 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2500000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:39 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:39 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:39 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x20) getuid() syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x9a020, &(0x7f0000000180)={[{@nodelalloc}], [{@permit_directio}, {@smackfsroot={'smackfsroot', 0x3d, 'permit_directio'}}, {@smackfsroot={'smackfsroot', 0x3d, ').'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 00:28:39 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:39 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 291.174909][T21507] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 291.202573][T21516] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 00:28:40 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2200, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:40 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:40 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:40 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2e00000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:40 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000003c0)=ANY=[@ANYBLOB="2c0601951b6b520e80eb3e45ad1f847f4db94c1a18321979cc21e8679e499ca76d9196189d96d8a331b81e4b21540c6e93cbbdc8770fb7aac946fe6c2dc5ae962b080234e0c9bf5085caad12957a8cc381227f9d3cc5dbfa399f625ffbcf6a3cff735aad446f5f487978cf1fdd39c8abb8890076d22eb1e8946213f82fcb52e9490b4dcb973289ddc961eeee6ee423f76d014b79699e187f3f53b627e043286388356feac53a7cb71d21d0d257a36fe15b7809bcc49d68cb5153ddd00ab3e55e59ce56f8accb8667f4a84e15e453f0"]) 00:28:40 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:40 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:40 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:40 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:40 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:40 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@nobarrier}]}) 00:28:40 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x10, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:41 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2e00, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:41 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:41 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:41 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB="64404d304d995a60fadefd9046de671d693f5952dd15174525456cc51524afe5012906afabf8649444b26a1a9b5b06257b1b4f82e28d59db7f03aed8f7149a735e99c9e2ff3f884d345f3d4d0d7e70a2572a43"]) 00:28:41 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:41 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x18, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 292.926462][T21588] EXT4-fs: 143 callbacks suppressed [ 292.926473][T21588] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 292.957403][T21591] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring 00:28:41 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) [ 292.983510][T21591] EXT4-fs (sda1): re-mounted. Opts: sysvgroups,journal_checksum,,errors=continue. Quota mode: none. [ 292.994625][T21595] EXT4-fs (sda1): Unrecognized mount option "d@M0M™Z`úÞýFÞgi?YRÝE%ElÅ$¯å)¯«ød”D²j›[%{O‚âYÛ®Ø÷šs^™Éâÿ?ˆM4_=M~p¢W*C" or missing value [ 293.012675][T21597] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring 00:28:41 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:41 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x19, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:41 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 293.026150][T21597] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. [ 293.036429][T21599] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 293.048321][T21599] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. [ 293.058454][T21601] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 293.070503][T21601] EXT4-fs (sda1): re-mounted. Opts: sysvgroups,journal_checksum,,errors=continue. Quota mode: none. 00:28:41 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:41 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x22, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:42 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:42 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2e, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:42 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1800000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:42 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:42 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:42 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) r4 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000180)='./file0\x00', 0x8, 0xa, &(0x7f0000002800)=[{&(0x7f0000000200)="e262885a5d2b089379daf3f867cbcab1f8a3d143c134681ca1c5d56257413a4fd6d42f4c01a6e364be5cc0bbe8a99c3f1cc15550d937cce8c23f47765a96c9c71641c943f9dfbb830efddc35f4c691b74a0087112878fda7e1be8eec7e692166c7ce20053e744e6a7d5119ab6cebda5c36c6f70c439786f4a31bbfd6674702c7", 0x80, 0x101}, {&(0x7f0000000280)="182da70875f2b70bbdac9717bd2658298dd83095ca143f3dd478ece2f4f53f5fd8ebb427eae0c3e39a4bf5f07256020c83238de7e01e8bd1a709051fd5b34c57e3d8dc130166803b8810365e", 0x4c}, {&(0x7f0000000300)="88a310f406de71738ded0564878308e3337a45032327f4d74882b29366506e11ac0571", 0x23, 0x7}, {&(0x7f00000003c0)="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", 0x1000, 0x3}, {&(0x7f00000013c0)="8affcd63d0ed0e3141ad34e73c8d531f762aaca6976e1f77f510136ff45a4ec4e0db09236b5801a0b5df29d64b458bc856ca4830409f075a45fe1cdd5c96b24c7fd1b96b7fc9f438b15383530c940c11314cc3add5f8407b94afdd1124e9af42656e86638c9add472735fdb449c03dd691d21c6d79c3ab6a5c1d579455102ce18166f94870f546f1fa4ce3468e0401f11947342434091f015ee9a491fe561520e3adb6b8eecf15ad14ed32ab2b6af1b3f58d73cc6574c504816cb9edc676ccf11ba628dfe053d8630c788c5f3392cfae32dba1456272aaee980f790701", 0xdd, 0x8}, {&(0x7f00000014c0)="69d2b4b60208c1c6629a75ff5795369b5111c3cae1bdaefbc067e80c7d82e21d556bc4265d1d07d310562dbb126fbc7293d1238295e73c6b383b9387cbc013aef44bf3116ed42adce4be798d4036173c7993c789f1b3c97513ec72278e3eec7ff25a19d1e462ff798a0102f90956df3cb93d38e948ee7af36bfdd94861e23116809e", 0x82, 0x2}, {&(0x7f0000001580)="cd523f50c51f4a2bc2a532d53ba996da2b68f91cc7bdf60c1e1dccf9ef06770165733b578ce706b368bf792a61bc27eea1eca27c2dbcd875fc2f05d70380943e96d802ffc495d288546cf50bf1179d", 0x4f, 0x1ff}, {&(0x7f0000001600)="c75d37d49cd1675e869fd26a64eb01781102eafb8bcf9433be8afef3b17e8b30cbee4ec3556964cd70ea453186dc35b61902ba8c559822b20a5c01971b839ed2e0d1032d356052c956ccf9c32f0c83674429313bc0baaf61d89739f9be1839329a2738616817662f142559b8ea5f4ce632e221e504132256ec345c0df9e4856f9e1a0ca812674f20dbd640fefe7f38af32f5046171ea84e713df8cf9d7b9af29c76e79967dd5b780be1d50720e89c8849f16adc21fa6b6569e91331b5ae98aa32d635b11ff12f5db66f3bec364f8fe95137963cb15cd620db4b1f30d11f766d0a7a170ccae", 0xe5, 0x4374}, {&(0x7f0000001700)="b578c4b4b514a57deed93e708627216d669c942a08a5615e02fae034143f120d9032ba552c3126788a67203964ad5bf6bf02fc36ded15e9934afa44528d6b3954fcc4c3767e767bbe390cdf2e83eca04ccc617a7be00c48da4bd518e0be7e91298e4536fe62227c89648e89fec0eedd740a736aac71fed423187c9149a037aacdd89bf47da7019334ee6eb1cc86dc81f9be8e429a6ca75bcccec8cf1439435963269fcca560e27b608e754c3e01bd5a3745952216945fada15cff1fcb54a4c804d4a0361d2e80df21445e81086bc7d1378", 0xd1, 0x100}, {&(0x7f0000001800)="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", 0x1000, 0x4}], 0x102000, &(0x7f000000a200)={[{@mpol={'mpol', 0x3d, {'default', '=relative', @void}}}, {@mpol={'mpol', 0x3d, {'local', '', @void}}}, {@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x36, 0x37]}}, {@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@huge_within_size}, {@uid={'uid', 0x3d, 0xee00}}, {@nr_inodes={'nr_inodes', 0x3d, [0x39, 0x36, 0x38, 0x33, 0x25, 0x70, 0x74]}}, {@mode={'mode', 0x3d, 0x8}}], [{@euid_gt={'euid>', r2}}, {@smackfshat}, {@subj_user={'subj_user', 0x3d, '\xa6\xd9\x95\t\xa8\xf3mH\xf9^&\x94\xec\xa4\xd9\xac\xbe\xba\xdaF\xe63^c\xd16\x8d\xc0C#U\xce\xb0\xad\xa0\xdf\xba)\n.D![Q\xfaI95S\xb0\xf7\x1a\xa3\x14\x18\xf2\xe2\x15n\xe5\x18\xce\xfdH\x8c\x04\xe1P_{\xba$9~z)R\xef\x92\x98\"\xf2\x05\'\xf3K:nR8\a\r\x1c!\b\x01\f\xe4[hk\xd6\x18\xe7\x80\x7f\xed\x15\xd7\x9ew\"\xf78Igz9\xc6\x0fn\xd7q\xd81\xa1|\xda\x98c\x8eKI\x91MLvt\xfa\xbc\x1d\xd9\xbe\x9a\xd4\x99{\x80[\xd3\xebY\xcf(/\xbag\xae\xa99\xd7.X\x1e\xecW\x92\xb6\xc6\x9b\x1d!_c\xc3\xe7\x95\xc5\xafa=q\xa2|Q\xb3w\xe8\xbcE\xff\xbbK\xd62\xc6|\xdc\xad\x1fL]\x97O\xcd\x7fJn'}}, {@dont_appraise}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@context={'context', 0x3d, 'user_u'}}]}) r5 = syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) r6 = openat(r5, &(0x7f0000000000)='./file0\x00', 0x10200, 0x92) r7 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="550000002a007f33deba2f977333bd930a0000ce01a843089100fe803900080008000000009eb43c6a95a0fb432c00000000fb83de448daa72540d8102d269c4d4133ab82286926700"/85, 0x55}], 0x1}, 0x0) r8 = ioctl$TIOCGPTPEER(r6, 0x5441, 0x8000) socketpair(0x8, 0x6, 0x3, &(0x7f0000009d00)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = accept$inet(r6, &(0x7f0000009d40)={0x2, 0x0, @broadcast}, &(0x7f0000009d80)=0x10) getresuid(&(0x7f0000009dc0)=0x0, &(0x7f0000009e00), &(0x7f0000009e40)=0x0) pipe2$9p(&(0x7f0000007cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) r15 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$9p_fd(0x0, &(0x7f0000002900)='./file0/../file0\x00', &(0x7f0000002940), 0x2, &(0x7f0000008480)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@cache_mmap}, {@cache_mmap}, {@msize={'msize', 0x3d, 0x6}}, {@noextend}, {@version_L}], [{@smackfsfloor}, {@uid_lt}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@permit_directio}, {@dont_measure}, {@euid_gt={'euid>', r2}}, {@euid_gt={'euid>', r11}}]}}) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f000000a400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r13, @ANYBLOB="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", @ANYRESHEX=r14, @ANYBLOB=',dfltuid=', @ANYRESHEX=r16]) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000009f40)=[{{&(0x7f0000002a00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000007bc0)=[{&(0x7f0000002a80)="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", 0x1000}, {&(0x7f0000003a80)="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", 0x1000}, {&(0x7f0000004a80)="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", 0x1000}, {&(0x7f0000005a80)="567bf19816c0cd7da4277dec1299ad73a5e161afa6b650f732fb3f77c5f7b2ba257288fb213beede7678326143afacc787ac58514c76bed3d57678cfec7b1ff3beecb7f4f9d37ba58fbf6d9ae5eea554f6e99199745fbdb43501d88264389091218ce3b75fa5cf103e01e088224f57cf189fff493f4fd07622f02591648d93da7db3e6d245a22376063ac7168439a8504986ed66b70e21b5886ed8ed96b27acd3c588d021e691d01c7c8c6476b610aaf96bb760d2d29bf70ccfe1c1f8ab5b5872572586462a934c5ae51ec7433866800d96a015d582f135417ed6313e85f8943689f467d5ce5e5fd5c8464a1d4d2e55d52cef4a1f48bdbbb209fedbc7d64d80fb34f1672e037568e1493415460cdfcae7a0e42c7fa8afb2452b2246b5c48235660631757b84ba19efeaaa619e708c7e259ac765be53d63e5541e40c0bc396446c1107b1513127f5326175586aa70aff0be07b689cd32d778c5a611a9f74425432f1c1f0390a5f35cfb3ef516b32f3e19bd09a47a4ba9602d9235c0e5897bb38b941fc335f9a00c0a20c536ecbe79daddff4bd8f179059c450a7cd9aa7e876f3c116c767a78a9dd8c01dd858a1b82a883f8be4ef5b97c25439fef407f426f42c59decca16a2022074dbfdbafe7008b9f6548a75a90a44dc7a065c26cfbeb38e9ef9cf2db6e267fb6e1828c94a7d274721b60c5933753749d3495140bc963242b6dad3bf03f005cd628ba67185312d2ab900f051843a1ee928443a49fa4fecb5991aceda36d4824f9913da102c830c51d1cb322f3ee7187634ba1c2a3718a7f4cfb1e2386490e4b604ed0802e119f591003e5684ac9e34574b6ffa8689429994066bb09fcd499ab07b9f43922443a5b7ca2591cbc6bae19d25583bb5bb0d65ea648c4605c5b63a87d6a5c496039535423a38ec700facb773e18199942267de6d98cab63fd2c5f4aa2b057817be9923db6525a205ead9365d138ed95fe9c3ab14ca0fdb75ad9a888c63447f7763ce993f5a659d360a6672794365008f1f8c03e337a93a5cbb4b2ebbe2b4cd72ab096603d724e735e5c5041c84dcf1165ffdf7f5837a430f779c9239119b1098ac1ea0e1d97151e1ec2caf769a61a7c5fc3be6b4502c5854b42e6fe3977930af7c81b7ec8e031b2c3265e8d7678776eef88c0c50b97012b08b23cd16d2b81ebdfe09fd05479ea6842cef6ca0d7a4dbc48045f104455054c865e4f4c26bdeb04ee6573f470e15ae77995845bf032dc4afef6c66fc182d3ce883125c809bcfff549dc4d547431003a2eb031a1fdbf4e585533df97c034bb30284222b0a9af9d6203e9316ce2b9f813f0d049c6d70d217210f03be670b8144a69690cc92585184ef131902c5d2d4b356c056fab51f99056400de8225d37929d32faa727d9a099bec4e9867e0e382812cd6c1e773c65f8d78f03278a215449b61ae8ea2911e61627c31e2a67aed41c838c8f4c2d5d800dc8fda1b60667fc53c6884ef4d2451971ba63505f5dc08daa2025ef80ae9e9f49f006d2f0f56e65d31d10e9a6156f08f51c16b20d32d06c6ca4525c36da05f23f9db54314bb3e01b5daa7532bdce2b7d1661f5ad70ab0535a1d90383cd1c07a627ab9ed30cd861dcefe54c1ca8ded2dd3ef132fbbd38c84b5c7ad09c88903ab8fa366d44b9a5f926486832cfba1e0de3f7c79e48cefaba59d05fa0b979777a947f6063d8271c39dc3f4e89a8b4170db3643b64b4ba898c9c4d0a60772df2eb940740fd7903665118d9790cfbded15be33008f93621bd5dc0ea387fe61d53fe339ebe532c05ffaa9ac253f1cb6b13783e764c12140edec7b849863ae4ebb51ff7c14c3fddf7718ac9b676d25081251a57773f5e745abbcc1dfb46cef668908951263a3338e92d8643375e4e8cb4ed9eb7664b09d433e77acd93169712b7e633e1a6b1bf621556a849d542e2b8fc7e3c6fbca6faf513242531fc4ad625a95830d343129cdb61c0d85e8a5607726665953755a42d56bf9adc7d08224a34f40f6649cc367d3e4b77a8dafce89e9eb25b495976f83f6a4a0043a0ab75589e6f91c2e8a8770d8f4d144a0f223543957ce5552be366b8a2203531e854d9a7ce67b745d16353a7cbb1d3b7c885d11dbcf7c8c1eae8a404d3c1467655bac57c261abac641698345f3b3240810c36e5aabf1b74dd554dd516afa319f2bdacf588d38dce58f60854fd17b1a600c5edf1607774407a4e7d56541a2ca453e2077cdcd06a1bf20bc781de0992e35f5f02bf140730299253e75d29a19ccaf076f0d1f36007a4c2c30577d8176482c162f42a439a4d548955dd89466dd039870819d37a48ed47f18ff96c15a5b93e9619980392349faf04b7a791791b86a9b7a60e84e115b50593537c3d43daca5f80d4f17bdac8be49fb70b3857516c523d732022ab0c3f127e4234ca2a8b1e2a1ba14a20a7156d9b0fd94a9d257e3b524aece825b811b1838b7dd68139c47b821221cda0f650ad3a9583c3954f6503791e1443566da54d3280bb2056e9be78bb6dbebded943644289ebd0907cc14ee6d7ed9706427d4226b4ccc36b7b57987340ddf7a63780da545904acac53a0a5a07b6ad17be5744f962d80fe4e44f68a7f4e21fb72c72ab9e6185ef29b6af3e9df6ef1f2d70120e94723638e392a1d89ac366725b61d88b4978b9c378426b8c603e00759c692790efc3cc09e19db58bd767cd4ee654eeb9caa92cf7575d0a1c1627b0e5a86777a2b4d34c1786aeb100be3eaed2d8af7503fef907c0804097072427738c23e62a7493bfc54668ca9b6da8149b13b602daa78a7b813be82ebf3daf435b18eb2145506e9d6f53ebe679873f13b1d442f0971f7747bae12203d7f95f57ff1b4418d5ea60138362ba41d39bdcac541bfce1f41f00968cf6b460c033bebc5c1833158b04c80711463516971929387da10eb3f9a3ba78963033ee5ad5aeb91c62b92132dfc5eb17f39e7290ecdd12cf3c7f347b4f0cba4cc1b4e9b810af1d499de434528d6565a2ee726faa6263a606b28d881b03c6e1488b1535fc9b093aee4042b4ef10672f081949c813e7a6c04a5f55b3709ed4f668b4df46de58551da5edc5b321f45a89c9e96f753ea44b4b1da01099a8eba54ef88b8c5848cbcd6e461edff8e5757e4b253717fec20d4f503da2cec81fce49db54231efc31787040841cb1eda6687c0a9481d2aa891bd199a5f49925458e4b5ee8eacc037732f1da8d11bd9102f36fd07cf1a5f641849e58654e3201c461ce00ca8e9a119240ed1a1f743da7ed33317fd9c0c1dfebde5dda5da639db2bf9a0d8e15be45a95d26b732565c6c7c4ab2646f66db26cb3d658c1dbe903af71e0195b6fda88eed79366fc261392ecd9c8828d766d179da730cc1cdc068a796b97b50322abf63e8498d0e27f7716b55d3d6f13ae7e43caaf84d0171a68a4bac19456f77ad3df84d36dee5d6e621eadf76a01ad054d982eaf864c383d5d19385ec055df78f2a01fb4db9a3a6a4b1022a83c5ddc86dc1d2d31e38e34e0a17fb8832fee370f9e79838a234c50c6d90cf5580f9216e436c0d38709e03e8e6b709fa67011a801ecdeddc79f43817e4d5c11c8f96298756e987e043670a0ad66c1329501ed7791fd323cfd65ab12e488345c76572094463359357f3a54892ed576174f78afb3bac2ef801c9a21b9f349c77f2c9996102bcc415de1d4e61c4868565ee63bf2e12718718a65132d57dc1f01d999d2f39cbd2a1b5c8ab33fba1722f4870cda5f0e842bcdd8d166ec2835101c167e349fc74a58c28d57add14d838e2a105817b60644e16d9da05e3dec79d38ad79987806dea19456f70b180be99ed9699fc03254e6eb936503f5ea495d622916cc5c425f8ceeb614a821782a1ecf8d32c266f1da5679b1219c93a1e7c7422566ec9ea5ff65158678d6a31e397b01c8d7d942d06facac37d9f2cdd26852b541e929301f9db9271611c8112eb60228fe704fc6d475a2301c7e149d2a4b6be8c5ea6a8134c13afa8fbf54a4db6e8b4b251542abf3275b7642f8aaeef7bd9a5dfc31c80cb8343348c6c799ced34c7ae8d6f0c0e77f87ffaf7d0b990d3af742e05fa5852560c6fd2cd0eb20e046b92a60f21c63a68d2be2b573cae9c77ce5f2e54cae2bb3e5938cf450ab8b62f404acf6feb48101e0c80222eb25760c321f7b34a55efbb7f5dac73f64e2074f81f18d67c82fcb7b3e2ef4873071c03d6ada6d12cda70627f919bbc8657de810b7b809c619cfd037bc848a4c42ae5e352f9021803ad316a9583cb24aa66c19d995238e519dc18031fe2d9c930dd3afb598f52f9cec984e796db0c4763f22c25781564e2458c7d53e9e072cd329115f81b4c55ab32b290415a49ce37402ef8c5d70684583e44e2d5964a5bb2282c8618969e7dc2c0a8aa64bcd617ac7838b7938e2d0945167e6a8d9274853013693419df6fb3140a9e3706700f6dee9375d5ef00735cdbef388f593fcd9d6c05090c18b9164f1bdb6b971e5bfc18f2848dbbe9f100fc35a56c195b6af114fabfc62753d8e9349397ee17e1a72e374d638c932c47e0695f09a93c2bad6085c4e580b334a250fc38d8561bceab50a01964cf91d04391c5c9c6b3e64bc28d15c7895e29456e34b091b9781a31a34212a066528292b4a07d9142140549209bc7ad9248061fdb86cb0b70f1769f838dcdf30ea04dec7b1828409068c6880ce44ac67eb4318bca0eec8674b1524278e2ae5d2e7d132d7bbc394d7f5fd8ff5e00b069495af733e3547ba7afad0dcc348d9cb419b697b7fc2e4e994f3d3cd76ab7a1db2a186495ba13595e63a9126b866d06f79130ea4604409143fc0f9ba54eca336fb674bea793b732e83995e1a2a5527c4667fa545acfa2cb026d30965751d1b47d210e3baa64cba6dbf8c2ede5dfae26a167386315889f97c103a4fc8fda27292e1d1d1c67dbbb0e6e5962fb93371c3352d3988fb89f35f70b599f9083a06a7bf755126c099ea2c01a93a96f25a5fb5c5bd142155986b903207c0188393d23654052beb245b4ab54c8e632cf85a7cc0fbdfbb3bcff3ff35d488d6ca8298273d540fb2ba3249a21ea551b01cb4519a8a1d01e5d363d064bab4d2271b5ce0ac1867388146066267ed53dfab0c96e822a245bcf0bf891851b3a9483c7b02daf0e57cc9154b1f0464e271d63d325d2b276fe04ce573eddab1ef69eeae1fcfc4cf93a3988a62906935aecc4f58c50f5ee1c02739daf3a96ad1810712d1b6b78ed0105a573ed12ebf94d658caa1794532d697e2db5d9a2c9d86e10bd5a624f7f5a64de3a0a9b5242843bb4a2603aaa6c9f4716bca4f30c1cdb3796fea7e8bb3a61d588385ce0b048cfef50d277f1beec80b95cff8510fc5d0a9ad76587ad05d916b9f61b21f996ee42ba4c9b0e94e32f677570c9cce6ebf9261d0b5d71235d7de52c91f43dafe75e503b2c369ea93b547a228c3a108dfbe6b55feab109024c8dd22e6f2a2f47a2a471b7dc64c53da358111c61edc50aa71506a40f185100f9ea0a49d8b7a3d62ad3175126aa86fa6733ba7c01666cdf402c096f8fb885295b31b7fc3c7db9ffe208eb97a56b503d2375defb5769b69cd3a5c3cca76b23ce8caff69f854bcd95e21deb29bfbf1e3be8a00589b51e5c0aa50e1948e7b5c9e6eefe0ace45a845196e5cdd32cc73666cced6ec605b6f6af5e25783157eb0b1fcdff837d2b6cc30639a9fd40e20d094888a618dde1cf032b03a80eb9bf1bd020d4810be34367e0ec0bb6028b176d0277493e4873d5a5d54840e1e8ed97c4f", 0x1000}, {&(0x7f0000000340)="bd5690a38ee6e94ec6b5358c64c06cb6959a187f658ccc688693474685d52f2ddbbef51a", 0x24}, {&(0x7f0000006a80)="969a89767a7e5b7827f1882f8a416d44a1285d75d759654d76e17c765db4ab77505bc15a6cf64a2185a0b71907d36a60d569c7759ab4172e24e9a690bcfc911003da4df3c5aab9506e75da58cd5adaef3de85496e4c8dd060c2d36646edf7d1602fa23980aa21ced3d0eda1bfb5556c527683925be4387ce6997ae5c", 0x7c}, {&(0x7f0000006b00)="0dfbec5d40654a88eeb9a17408d313ff83f61a7bd4d1b75563681acf279ae41693fb75b16fd9743d02f2ce153946547c6bfa48b8e47f4eecff00776292848fde459c34cd50279bd4976076793c62eb57b08a94ce386ed03377f3ed48667765f9a7c7925a427cdd8aea78c3046c4d4881f20529", 0x73}, {&(0x7f0000006b80)="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", 0x1000}, {&(0x7f0000007b80)="0a03963c4be948d9b019b8fda88d0f67f647081e25069e3d99860707777cd2e2c281", 0x22}], 0x9, &(0x7f0000007d00)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6, 0xffffffffffffffff, r0, r5, 0xffffffffffffffff]}}], 0x30, 0x80}}, {{&(0x7f0000007d40)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f00000083c0)=[{&(0x7f0000007dc0)="996faa290fffacdf854e2e2059fe08a75fac15242ef0b68ec5d75299881e0f3e696df8c061dc73f18111122a59c47b21a62fd6e0b6e2b5d990369201b4e4683eb161e871cc33864a5cec75065c439c0516021538227649b982dde2f6a5c31aa735879b2f86e48c5fcafeb70ed89c6cac2777d0cf03bca6fad2e49c61d74baf35800279b755d38ca32c8c056105378230b45bbf724c6fa89283eb27909c34a287999dd35312d7f0d8427115083cd84681baa92eb9bc46da75a599463464d85fed7156a6a73b1272979d12ea868487ea589650136a953db612811ee845", 0xdc}, {&(0x7f0000007ec0)="945b058cdd90b018b24fef9a5574513d", 0x10}, {&(0x7f0000007f00)="0a6582bdf30064d000cb602b808ee5be0bac69565fefdd8f025e94ee94dd7746e777361990dd4d018242d5274763b750cc20237c14f5908978b5eb1b7ec724ea6edb35fc9f72ae3f4ea0a1ab15efa052ee16a02566a1563efc6cbd64fc544859004c1d6b460447b4d2786d9dc9ce8d91ec822059c11464e1fd62995c9d9fe4143bca2c8829366bb0ecfe31d2bd03ff3dcaccc73762ea765a242ee9f7e316a0bb6cf73271735865d927588f09bb15d013", 0xb0}, {&(0x7f0000007fc0)="41f888769e6d5955d893fd5494d135e2ffbe04d6095559dd45884d3e84e554975212566c75bc4df0598be9894a4c71da1f15adff98a578a41f7abec15763b94ff97349d859d080def1e2ea07d18e83aa4403641b7790ee18e2586172bf074ffc17745b650a422a0d5f547516b5be3b11669ce44ac92f6d449a00f4ea532995062548286beb7a0da42f82d37c1dba22dc1fe35ccbf0137ff3196a697a7fac537cb7bb9c0ce3d4eb2059745b86beac265bb8b191", 0xb3}, {&(0x7f0000008080)="9cddd74096c4f283104cca4bcb5276d52c767544287ba3b51a72d7e886ebb67b8580a89b060cdcd49ca69f7aab477eda45c2adf46432d51e81ae7c10f220085bd81352369578892c392bb8bccf44dbdf839c2b0fd117e54c8284fdfb7a665994131c6f80c884f0c358196e5f88028e172ef549f2afc40e53e8103d4de43a08d79499a08e0beb0302a24467c2423905f9aaaf264f2f1981caaf29f78cf63500ea6db580797c87da24a05a9a1c45", 0xad}, {&(0x7f0000008140)="cdc75e63120aa079c496d68c1af4ac3ea6026d4cc5ccbd5cfa4d84fe3af63550b4f42ff29745fdbebed3bd37c9475331ceefb5c3ded909fb4bd3f5d2334b664588d1300fb81a84e42f116fb8206d0daf3416a1e75a19916b167dbaa88e21de98418a72b4b8ddac69b92adca898cdd5b8ab54bdd8fc7948c4d89687cc781064", 0x7f}, {&(0x7f00000081c0)="fe70bff17ab80a98461128eb951f7cf1d89c95b721ebbea6141d67301d75183d10a77eee79d54aa471bc048417534d2165fa9c6204686cdb4511605b63bb2d6fba0e64ddbfbaefe043a4cb38ee8c4901b24cf1ed8fda1a207227c33e5f36c18c7db72fc757fa3414b8bf281b615d89b46a3c2042798e7df121800295a2593f45497dce11591006a0199ff34f2b895c134faba197eff51017a92df890b1f92e00", 0xa0}, {&(0x7f0000008280)="0f192e36196332fdd29badf4d36fedb4efa8b70db84606102318d40fc0d2a0cbaf678ca590d759edaadc555d6a2992817722d4e14685ca1e2aaf37bc936b16fe0fd8cd7c7c1a9ff358514bdcdc8b679f0c064170df7205138447e25ddbd7915519346aa0f879e3986823e35f7f0b68ea3f9ece34c254e31e0cbf803fd5653422546348467758a6f8a1ddba53f07da66b7171892115f03c0f7a5a44c9c3668e7540181edb43c3ccfd16d6e83bd60ac11b41b25b618e5befec4913344ff6f6177fc60b108896306548cc9a374a13c2122fb8f49026ed", 0xd5}, {&(0x7f0000008380)="03fbe4fa", 0x4}], 0x9, &(0x7f0000008600)=ANY=[@ANYBLOB="1800000000000000010000bb1f000000", @ANYRES32=r5, @ANYRES32=r4, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=r3, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00'], 0xb8, 0x48001}}, {{&(0x7f00000086c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000009b40)=[{&(0x7f0000008740)="21e2974b0e45f5cee6843127ad48eba7c13acd7bf59db63c4355b82d55b5ed9e62a40ce1877e7e2273cf349f13b18b0d285fbd5a101a977ac647a12b0b2dee5c69828762923924d3c5a344efe6362eb954e35be642f61e3e93f7a672b1d4fb781eb73793e972906a7cef7a1c695d8816f16faac56027a34a5b56281b50d118c241fb7980f952ec7628b3fd0a1a9b10afe623015588bef800138b3386b85978d6f6e89391af141a261d0ff1861f542d43233b4f544b8516ab7d383b437d278ceec7892ff5bf4e794c7af6c3ba4cce3e8e4b5db62a08569c860110b4408324e38ef62199dfda04590dfb5aa2bd50b4cf283a36", 0xf2}, {&(0x7f0000008840)="509a0505d589de198c28266b284623cfd3d5f7ab4a0a6590b9c66c431a2ba6045e7f5399b21fee22049b01e02415c01cca6e63042e9fc6d803dc256354783f0f8639eff472416431a4a050427ea361020955b8fc9b4f3017348fd39ab2d68134baef9b860ee2508e0b78c01e0bd70987ed9de2315434f909b5bf62b93c363afa42d6eb82c84196167c6fc3b795d415c99e79010fa57bf9b6c4d769d81bee7f258510fc115d00d74c2485d5a3f1ccc13e341c8db694b6c2c8b4761ee3ac48ca9c861acbd67c913e872b7983cf011d9a73844c2294dc2d9fbefd7f48b80d8c8df9026f9667aaa912a93865034a32fd06512183", 0xf2}, {&(0x7f0000008940)="edb6c61010d1f12b884f9c7e938e6bbed1a17ce8b44a714d4435e397d69b1b2ebc61bb3aeab4a438353f7d6be8976d24b1b2765afa9c38cd8283b06ac3ada877791523ef0b309c96aaa1b50ed887231cc5f5a027eabeff2e77a3d76631e0c928e84e3424cec34ad33741ae865e2f", 0x6e}, {&(0x7f00000089c0)="d7144227b1b532fde4c62988d520b8358f9879b239faeb87cd", 0x19}, {&(0x7f0000008a00)="e038e9818aaef7542107c61dbdb8786549bab6675448a189982275f0e53060183f48b1d18727a42040eb", 0x2a}, {&(0x7f0000008a40)="b94a59d69f564de60d7aded9b8fed80fb85d72af845c076797c42c94d51b40323c2cf197bb5198fa9c10426af279c77dc116cea879bcf77e70d7c0c044318e86e0e578984a64b5c3aeb9e84b264c8886c449219784c4f5a60f3fe606ba84bc3864b6a5b19e5d45f1f6aa2cd785c1a18fbbfa4253d4577239884829b13ed42ef48e", 0x81}, {&(0x7f0000008b00)="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", 0x1000}, {&(0x7f0000009b00)="75fbec35c121efab82fb86dd167119fc92c2e0fa98e8c5fa37b4452d9c80", 0x1e}], 0x8, &(0x7f0000009e80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r7, @ANYRES32=r4, @ANYRES32, @ANYRES32=r8, @ANYRES32, @ANYRES32=r5, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=r12, @ANYRES32=r16, @ANYBLOB="000000004f000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=0xee00, @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00'], 0xb0, 0x4000800}}], 0x3, 0x40448c1) 00:28:42 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf8f73f0000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:42 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1900000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:42 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='ntfs\x00', 0x3080, &(0x7f0000000200)='7\x00') syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) open(&(0x7f0000000240)='./file0\x00', 0x80000, 0x2) 00:28:42 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x300, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:42 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:42 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfeffffff00000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:43 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:43 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x244000, 0x4) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)=ANY=[@ANYBLOB="938dc64700"]) 00:28:43 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2200000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:43 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x700, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:43 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffefffff00000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:43 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x337}}]}) 00:28:43 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:43 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000004900)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',dfltuid=', @ANYRESHEX=r5]) lchown(&(0x7f0000000280)='./file0\x00', r1, r5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) mount(&(0x7f0000000000)=@sr0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='ceph\x00', 0x40001, &(0x7f0000000200)='\x00') 00:28:43 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, 0x0) 00:28:43 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:43 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1800, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:43 executing program 3: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000200)={{0x49, 0x5}, 'port1\x00', 0x8f, 0x14, 0x5, 0xffffffff, 0x0, 0x2a24, 0x5, 0x0, 0x6, 0x7}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) acct(0x0) acct(0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800000, 0x105) 00:28:44 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:44 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:44 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1200e, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:44 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1900, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:44 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, 0x0) 00:28:44 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) chdir(&(0x7f0000000000)='./file0\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) 00:28:44 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups, 0x22}, {@journal_checksum}]}) 00:28:44 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, 0x0) 00:28:44 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2200, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:44 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)=ANY=[@ANYBLOB="646178a3"]) 00:28:44 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:44 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum, 0x22}]}) 00:28:45 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:45 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2e00, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:45 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)) 00:28:45 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:45 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x4000, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x1010, r0, 0xe9265000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='cgroup\x00', 0x800000, &(0x7f0000000200)='\\\x00') syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) 00:28:45 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:45 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}], [], 0x2}) 00:28:45 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3f00, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:45 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)) [ 296.728784][T21804] cgroup: Unknown subsys name '\' [ 296.737500][T21812] cgroup: Unknown subsys name '\' 00:28:45 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB="6461830978dde70ecab63dfabd3265881824cd5ac1a68ae77f5e37716ccfa713601948262c15dd"]) 00:28:45 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:45 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:46 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3ff7f8, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:46 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}], [], 0x3}) 00:28:46 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) dup3(r1, r0, 0x0) r3 = epoll_create(0x5) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000200)) r5 = accept$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000180)=0x6e) r6 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x8001, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@fscache}, {@msize={'msize', 0x3d, 0x4}}, {@version_L}, {@fscache}, {@version_u}, {@fscache}], [{@subj_type={'subj_type', 0x3d, '&\xb8'}}, {@pcr={'pcr', 0x3d, 0x13}}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@appraise}, {@dont_hash}, {@euid_lt={'euid<', r7}}, {@appraise_type}]}}) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) 00:28:46 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:46 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:46 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)) 00:28:46 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x17a6, 0x9, &(0x7f0000002600)=[{&(0x7f0000000200)="32c38f8e904be71c366dd7b549a081963b1be57b47ab3c769e0ec556846dc88494ef4b4ae7c8753b3ed0553fdf7e88d611d5eb8d90d8f6f49d71cb542c67d014e37cc89f78d92eead73c3d00f91a0612f4ed56eaf3ad840260d145f6e88822e40fad98a1a56a08b942", 0x69, 0x9}, {&(0x7f00000003c0)="83768837be27350a03421f8c7e0adc687e551f458baf064523b7ea84fae4ce97563b3bac08fcc89f59f798d98594967fbf86b79403f7471663ba9c923f61b0f09ee4c0d7ab623c8edf7e0d514c5c710d3e45ae97a46fbea326c42485b0c39379887545daa3b8303a884c5b3abaffe6a9078ba8e078acdbc6e12fb1957a3f2b81390046aaa8c3345360eacea3128a0355627c40a8990ae58caab60f2d918110aa163aba4412f8c03fccbda87b5b89831aef50f4cfc7fb5ed9679e19156794aac90aef9680c932a36a9b1f208fb27491dbe00a24dc2ab2964816e3078a5478d2bdc92ea7022a3d79cb7ffb3d210186aa59991210682a58696f9522b6211a144b21b88d239f32723c9204ed3f4eeacd515e34337ff7629f79bcc2d1282e245126aba583dff72017f3dc994112388ce804dbfd5ccf4b78d12aa30ae16647f8f773728009a9ff2a113ea7a3a16aef903305c67c0a524b5ed879dff0766459cd77e259d936140f97c56bd694a7bcdb550b2383f7f25153a3094e5b247843fc30e29c90423b23128cf10da87a3c82c9c8eb0e60e16b6301f6e42dba7a121c52a29d3012cc4db01c80d6bb8ffab25725d0b68b42ee6591d5dc37c765a7ff9cf68f79a3ea22ad32be5142fa8a9d65c37dadb930a96509a2a4699a4cf8c2ec92b3e8ffee9450b8400b60e7a4a214c67484e340e1048158bc374d1259af3957b086c2821de6747f8d571367cf087d5b783b8ee398df1004d80a67a7ae7a625a2c1ecc72a3623320c00fd05993172d8d265496f5650a276d2357d04e02ca19d7410b5392faf8c95447c2f8fdd48b7450d84fd01bdc832019ab4f6932ca804fbd8d7358bc8c893c0541117393e27d211002e263a9e061aff97ba0bf9e0b8f8d7f2cb7c024a279bf329e594f6ba9a753bc51c991c6615b17f9cf2609d408716317cec12a78dbac44a1420e6333730c39886368ae13aa6f587be5548b3f7ae1531f3708e8642f13b83340348d0d724fb2023956f67523aa75cb8dab6b2d09dbba4efb3dbcd83a6aa9acb44b679eedace3918fa43eeb5451109061da1645744f5823f30606f3eaf83f3c9ccf2f0d51266ce1d20c0f459c0c37694e5552724036a69771e0cf39ada3cfa685a23c0a114a9983e9df935e4e836d58fcebc166a1aafa35177acc68b22e38ce704e954a1a82c656f84391fdec940ad9bd711b626d6aad2b71f2631b3c951043b8ddc2a5c5cf6d8f0c7740aa1ac1bcbbfca4b1ec4fa44f493f27348a5585e48ff09cb8b27ba4d09fb7b89fc4ffa0d58e7d172b7a0fb389ba044ac00539e265c1f8fa38487bab12cd065ff52f3e58b697eda0e6dd1263839de130df916c84a56c8b7d1af7150f890ffb8d140be726060986e33edb6896c8f6ff6a38930665e698de1a9d79d584183c17c328cb391bd50caeaa30945868bfffe331426ffe209fc1ace1b1d1d46e01b049c4bc9136d85dd0117907f673f82609d86286b32fbfb96a28a0974dfcdd9c6a141e9900e212ac724bee3c8903d4362c37d1de81f29f3cad645cd36608b6706fb9fabaae6c3487f506bd60eff953da77ddbbc5afe460149830d1d9ea6aebc62666ffd6fcfb4c9ae94d2085701f28299aaed9eae40c4ee17dcbccfd44047d32759ed51c99957df308e7c1ebbb7c947b12ab0a4b9abcc9f41c507615ff0684046109d4659d885afb1110612d03c8cb69a0415f1c82b97b5df8a96033c85b3473868045dac0f21c7e210d4a1b2686a28eb5c7bbb1b685a659a463d64fe783bc5319bf90309aef1d5fb6bfe8eea6ea399be6fe423c04777ebd171b12dea3a191f122679244edde569c841638202cb3288e39b83128eba5ee0c9d059e86794626fb605fced7a95ea58b471694cda128b72c98a7d1f7d36a8bbf60bdb28c2a36e666c5d076bd32d303309e887aa147b560d96475bfeea5a6ac7023c535cbb2156635ad83ed0162bb1cca63ed83431a21118237063639839fcbf31f8b8a2a97bab9ac1379413738687aa7de688c339fefffb24aef6b3dcfc8cd4c63567c0b063d43eb74553d08372ec7a2b18e6bd9826ab4af75546cf0a133989db4eed207f2d2365a76178109374375375a9c5a4d836dab7eb2adb5cf2f45d7ab6fbec5fc96ca5742466e6680b1565b35d6bc8e515e9b0d76576380956a7d55de58b0f7306952fd07a146f3727b5d2e16aab801eff007242fd2524724b07184c32701302f363b3c3889c6cc3d1012abf89381437aef0f0e1cfaca9862de0f443e6a61b30da32541f3445cd09c31ef3f986d0bed47e593f5e54af613e5bb5372c4dc7f394c76b6b71123293151247e047c819dcc2c3fab3b6f0d0f09a031217586f30385d040f7be7b9756a0361b964b3d3e0ec8132d6bf1e5e3e457c32ad8a5280b3b3bf23b555f6e6c45aa19aa034fc35221b76b055918bac82f1aeced984260d3826856436d30da16752b68eceecd81ebd47343261bfcd009500266168525f202279a9f51019f201c87ca4f65ac38df9230aa80792a4669ed50ba003c7a4b78864dd28e58e29f6e7f2cc81d1dc47966efb9ddfbf935bc9d480162752bf7bb26bf0becca4b257baab0182d0716cdf0a5d0711d57b6d9caf2ff447883c3b76c505c6ad02afeac6328db8afb3252fc6efafe524f59f7dcc127f18798d414afad57b47fe991e87784174ddd3a00c312eff7da15a065ff9e44f0c954521df6128aa1822024467266a69bcfdce7b3fed6adbd9c87d027f9f7245722684e73a0a755acfbf19af24914d2b6b659a289972d0843b085dd82a89c2fc3e32b334fc05673738987ec6a816b8fc53db6307da80963a54e56c6827855f068e14caeae08b8e2ec0d76ff0bfde0c70f4a4a873bce902d045a8f5a3a8e50b4e91087c5991733f99c350e3bb0bebc16bbbf2a59f22f041cfd07f22654f80c9214c3ec1d6a51b6622d54c1c1d0cd2f8f32b5ca0a99b9a12f15c319586f38f6a32e5765e85d4dee785f64966eb3210d1b106065c529da1eed420deabc2ec60b22ba8c5b1f65afa7dbc6abf683b9acf4e4626ee5f9143242c5570fb56fda990ca7566a9501eb7247d516f90b45d7a13bd6cdb696926230a10b1e22c59b14568082a066673fc6c24315171f5094734c3aeb69b3f3057f63df40c3b7e83880863efa1cadc93e5edd09f2e5c3ead253385fad52ec147d57cdc4d3f51156b32c15bddb9cd54757629f1d8f56a9d326077a36d187bf8182c94554f520fbd5892d77efc5abf4a10eb21373b8383f96829590edbf202ebaa06f9c67f64bbded7a400ad676dfebd916468a7264f0806f486ac229e6a889ee550a581e384e02c804e8ecca009982b730201fdf93323c5eb8aa70d717bfb622b44d0986cd0a8f0e16e7de687609601b6602a32697738fdf791411657aa2e754793d2a280dca8089f17cee68922c64d05b240bed698463fb80bbff14b7576e979c18b862eda5881662fbb06b2ed5122e1a561a9cf26788f3f099c0b9a85e2b619991c2313d136a6faa8c500d62ddf04bc7192f1036f443a17a20f70a5647fae8ca0270cc01ccfa6350d1f17c4f77a73f31736a57655515359c2692bc58aa79bcfa55394cdb2cdd79fa20ff9e8df4ef0df522719b00f01195c8d34149a57b04962ba5df1bb769be1c192a32bfb1a24c610a60c510db7fd3aa57fbac999cb4951c56bf4fee18b24646f1c1c0b291c8f5389d5dc23a0b45c401d402c8b3da4ae40af2ffb14ce3eec1969846fb24c128477bbbcc8002220319cbbed5a4f4233534ba0d9506c0239e65b6347120a37a3e8e05bfcaf38d56628b4159bfac7e9a47f66e6915c53a022d9ebc6bb9b1a3430fbd57f4ea0631c2513cf6c98408cb7b8e3bd758f47507deff524422b6a5e37434ba4ac649389df8e80aed2856813470d0c2e960fa5cf46846aab27b132d9f61c0ddfbd43c4946e3fad83f3af10dc84a060d3aa161157575881bb049f3a6155dbe11b883bd984e64fa7c71ed475aea0741e7f58d5802b15eb7d94a164e123b66524543f508afd2007a53906f518adf119eb6c9b9d7259905ecd586d66db8873671fcec7ef6dcdf44c1866d4e6bf8913950497802e2b1b85b061b4e2e4bf18e5eceecf2bd06726a852384432c2834ba45f0e3e8eb5834764ee0f0930cc9ac1ad30f0f4b0098076bb0a30dae20f69a074c042ce30f18e82bdb582b902a458aac171dff278f89f4596c3f8b5666db90c962f93172a4fe71d33b516052dda8ed7fd5dcaaa1d9fb1a0c7a6edecb58331c20855c893387f17246677971fb6917be1361d4a11d0e6be7c579cc412b6e7b28e4f7d05879138d9f37ec6b103b3aeb5d3b9d5c342790bcfd07ddfe7b0b4a0aac4f738820ab4a45efd662ce6926fd3d55bdc7f78caf0ebc6939a5a159546a0e586883603a0f4566d5b09efbdea36161ced956b9dde83c232f8aee1b2272ac68291131b02ef642b742b80b213a818d4d0a8685295e3e9b737db1a86d9ce32270949609636517989d2229d3433f9d6e5ee7e55c9152ed49b1690ff6218a488fb86348cf682b660a50861f1ef7eafe6fe0a82ccf423cc941d253f471a059ff92f2f964f6fb28f22641d5d8482ed5239d610052f1a975ec3e240193d7541d1f28819c11b40996b737e0bc3eabdf25133d78d7965e146149fd7b7ec8a9f3bbcbbb1596595b58430b32d4a6e9f31888ace41f1e6bf3b4274c641abe61882861dabf43b7d9cad9338c1c05c3dc0730429ec2f0ed21842dd2e6f482e2e7be6dbc927c7f72c68d8ae1eca96bb1d27f5054d46898adb928605c0f4b8facb8aa773b19946e2a19df64f37f4a5299a4130acc6c65537e86d04369b1b4db06a6b3889327c9e83711c76d1eeb979d25db6982b7b23234abfbe94fa65b20486f22a427d3afeff83ef984135a0bc46e4a6ffccca760b5483f99bacb55a95ce730cae0a465386a6772e27c18ba3eacf28aaefa8cee884a83805733e3eee5f899ab5afbcc72024cd21c4642d4916045729b4f73c8e829e8d59c7020c454974f3f4b6de2b88e4509d880239a8bf77161e6a75920d483e51145c2ae775a7fd394272d13287e6fee8875e881652426cb4bd5eef9b3e87b3e82adc28cb5747b0d8836113d4be6fc9bd1df10727d0e605ad766c94a60306826aa3b92d39b2ea8ef5890312b9ec07bc250907ca48a80da709ceac79823bbb27604f2aac775148b833b475a77a28f16167612a3f10ef0eeb3f7a3b268751cae91651ea5ff09541c2da801d6cb7dc2d622c08a9c2f5b245eecc1f5f80d1e82ca3511bed294b361fb972ef3f8398a1e3e54c9de5a714ae9c298609f9f3ceb1b25f38674edf70bdb5755b229a4331c967010f8df1a8aba98fa87821ac37f9e3a6ae06134b778d795c2db11ae829170fd1077e14b1d6cd94b2b5fe7d55f6965ccb7fd26b2044f65d7553844b4db19fa7ad415d70aa9b9aa9f4ca5146aff7541fea20c5089c7da2bda1165f04c69c54ed007a3c01fbe77964c2cb2ed4575bc1d70f93913a8756e86df585ed6562e723d1bfb233b4194ee2bde39dbc4fe7a2443266d5fe26efc7058b1cd3e8a5a4c4fc1849672b9bbcb74a1a9a1a889fe2461a7e52dd8076333281ee1d7e335da8b71d631af2b10d7e4338aeb41c69859d3551bd2973eba6d44c490b733aa7c6dada385599b5fa43bd8b2f8a6e045eac8980c43568ba4a847652ab5b39a7674664652c47f43eedbbe86b4652ac6eef2d7050db6d349a244a4da04d961f31bcff23d67a671ea5ad99f2e3b8c32a086495b1d7e5e185ec5bf21e5d8372ef4884618a0400d", 0x1000}, {&(0x7f00000013c0)="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", 0x1000, 0x7}, {&(0x7f0000000280)="f4e9f887b8118fcb6ab55329d108699784a6259df039578708e2b6cde3ac5905e477d0fdf6cb2d710d8b96b4e0e6253f581c1a958fb54314fc75145568d49d2762ea32860e2fd38aaff81505e0d1d386a9b1d12af9be7450bbd18991cce55fa73dcc62c944dfba250e7929a2adb002b71e6c1255c9dfa05de18dd056abe2791e2c5cd26e00892d316f9f41447bd6b84f054fb932706fa1bab31bc807d8a537faa82ff8194f29f7d5965c6f9e98ed6fc869c844a0e9760079c227b41611d155f7ab8b3abe9b361e3a5f610bbef52a48d493a58e8209b7a0588d91bb1cfb92", 0xde, 0x7}, {&(0x7f0000000180), 0x0, 0xffff}, {&(0x7f00000023c0)="3f639eece6dc53b69f", 0x9, 0x200}, {&(0x7f0000002400)="aa3c6e0d88c917ce2a95b066af4c826ebf19d52d6b7ec981abfbb84188025d8e9d6040f01af467018f51c27e6024b7", 0x2f, 0xfff}, {&(0x7f0000002440)="196b91c28905876cd6a2a2e5b4a3593b903ad17405c88e643908fc17b782f9d3959365d3aaa60e5e108d26af933def2062a7d4bc4f007742fe4f478bdac2ecd154ed1bd89ee3d0dc61cf1d99869224517538068351481b43a42cff088c8539e8c8776e1eab1aa0d0e86d8033bad2ebdd6528985b69775e391f36e9d6a00090b59c876a79651b78b9ef26454e5b4ee5753a36009baf019f4b5b1dedfc37b5abe3a4116ef3ec65772e24e055304a8704eea70ba265108c155f5cd3f9395160f98c148371337957e9809a3cace9a140420a24d46c09adf71e8a9ef5dcd1c313922feafaf0d94784f00099d8ce7b84c2e2ba4feee71b", 0xf4, 0x9}, {&(0x7f0000002540)="81952a32df0dbc52f1b0df69f26eafc9095e2eafa32e1781db56b53c09a8d7bd6f1256ff928e9714b87101a7834d3190b528464d6488e8bc37dc133d9305362b16e9ebc4f7031974b868a9055cb9cf4c3d570733f95deaa2fcbfc42329f97b64ad4fc9a621c7898e6f58ee707e2ed7b30e375f0fe8e0de7d4ef07fa14a82ba9879f12f22a7afefb96441c81e9c0582ff2eb65a259e2fc529172a67d29725027c0e2dfbacc7020b8cab7e291fcca72e8cee8664e71a83", 0xb6, 0x4}], 0x1b0084, &(0x7f0000002700)={[{@rodir}, {@shortname_lower}, {@uni_xlate}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@smackfshat}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) 00:28:46 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:46 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x80000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:46 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}], [], 0x4}) 00:28:46 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:46 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffefffff00000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 297.758552][T21874] loop3: detected capacity change from 0 to 255 [ 297.828325][T21895] loop3: detected capacity change from 0 to 255 00:28:47 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3ff800, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:47 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3ff7f8, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:47 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:47 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:47 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x80, 0x18, 0x3f, 0x9, 0x1f, 0x0, 0x6, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000000), 0xf}, 0x440, 0x5, 0x6, 0x9, 0x7f, 0x5, 0x2, 0x0, 0xe64, 0x0, 0x4}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xd332da1ce4be6dad) 00:28:47 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}], [], 0x5}) [ 298.558071][T21908] EXT4-fs: 170 callbacks suppressed [ 298.558083][T21908] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 298.622916][T21914] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 298.645362][T21916] EXT4-fs (sda1): dax option not supported [ 298.651305][T21919] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 298.661428][T21919] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. 00:28:47 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:47 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}], [], 0x6}) 00:28:47 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 298.672012][T21920] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000,,errors=continue. Quota mode: none. [ 298.682653][T21917] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 298.693130][T21917] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. [ 298.703119][T21921] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 298.711043][T21922] EXT4-fs (sda1): dax option not supported 00:28:47 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3ff800, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:47 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x10000000000, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x1, &(0x7f0000000180)=[{&(0x7f0000000200)="c85687573053a9c7bc703c30fb0f9bb748b4461130e661cf0d8fb7592b64e6ca03e13e4fd9d1880b736e4f3a93ce70506f95de69a1db17e017b1de95bb8d387e8e3b3292e3e802bf53187ad9539ec33c14b36b15c3ed378b65e1249d", 0x5c, 0xddd3}], 0x824010, &(0x7f0000000280)={[{@bsdgroups}, {@min_batch_time={'min_batch_time', 0x3d, 0x10001}}, {@noquota}, {@data_journal}, {@noinit_itable}, {@discard}, {@abort}, {@barrier}], [{@mask={'mask', 0x3d, '^MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'dax'}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise_type}]}) 00:28:47 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}], [], 0x7}) [ 298.832149][T21945] loop3: detected capacity change from 0 to 221 00:28:48 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xf83f00, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:48 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:48 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}], [], 0x8}) 00:28:48 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x800000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:48 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000280), 0x2, 0x3) r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1302c, &(0x7f00000002c0)=ANY=[@ANYBLOB='grpid,fscontext=staff_u,obj_role=ext3\x00,uid<', @ANYRESDEC=r1, @ANYBLOB="2c6e746782a4ff0f00"/20]) unlinkat(r2, &(0x7f0000000180)='./file0\x00', 0x200) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/12, 0xc) 00:28:48 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:48 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:48 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x817021, &(0x7f0000000000)=ANY=[@ANYBLOB="c93bda21148db392f7832e2552ef"]) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x109, 0x1, 0xfe, "b2501807cc343f26d68570e928077b51", "c18c64bb383c76834e8fe4c145b15d6542fd86aea75e3bf9df41e55eed4f00747509107c8aa7d14f65b41dc939bdc90b8b07cf91ee81139cf015b4c20044c8da9b5361c67b356005c350fd696e117875a55397baeea9e388cbf7a6f9ad4b18e1036d5c4c805f3682cf076b5f9e7fddb59e7ffbcef25d514a72788d0b981747038da0cc933db0842f24e08171265d3a6f4d880856351f1b72edd07873fc89a3e7cd8207e13efdce7e847c4297ed1c7d93af111f23fdff0df4021dad37fc1efa8674b76cb7e8c1a58421c5b532c7cff586110e8b65999f76733a6abae5ef49c1764e7d28195a12073ad373f40b2c654c021f089ca6"}, 0x109, 0x2) 00:28:48 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}], [], 0x9}) 00:28:48 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf83f00, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:48 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:48 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:48 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:48 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}], [], 0xa}) 00:28:48 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x11a) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x240002c4) inotify_add_watch(r0, &(0x7f0000000180)='./file0\x00', 0x1000040) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) 00:28:48 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:48 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:48 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:49 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}], [], 0xb}) 00:28:49 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:49 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) 00:28:49 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:49 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}], [], 0xc}) 00:28:49 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:49 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:49 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x10, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:49 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x200041, 0x70) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) renameat2(r0, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000180)='./file0\x00', 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@dax}]}) 00:28:49 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}], [], 0xd}) 00:28:49 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:49 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}], [], 0xe}) 00:28:49 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x817021, &(0x7f0000000000)=ANY=[@ANYBLOB="c93bda21148db392f7832e2552ef"]) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x109, 0x1, 0xfe, "b2501807cc343f26d68570e928077b51", "c18c64bb383c76834e8fe4c145b15d6542fd86aea75e3bf9df41e55eed4f00747509107c8aa7d14f65b41dc939bdc90b8b07cf91ee81139cf015b4c20044c8da9b5361c67b356005c350fd696e117875a55397baeea9e388cbf7a6f9ad4b18e1036d5c4c805f3682cf076b5f9e7fddb59e7ffbcef25d514a72788d0b981747038da0cc933db0842f24e08171265d3a6f4d880856351f1b72edd07873fc89a3e7cd8207e13efdce7e847c4297ed1c7d93af111f23fdff0df4021dad37fc1efa8674b76cb7e8c1a58421c5b532c7cff586110e8b65999f76733a6abae5ef49c1764e7d28195a12073ad373f40b2c654c021f089ca6"}, 0x109, 0x2) 00:28:49 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:50 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x18, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:50 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}], [], 0x10}) 00:28:50 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:50 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:50 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r5 = socket$nl_route(0x10, 0x3, 0x0) bind(r5, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) splice(r0, 0x0, r3, 0x0, 0x4ffe3, 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:28:50 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:50 executing program 2: mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:50 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x19, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:50 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}], [], 0x11}) 00:28:50 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x10000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:50 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}], [], 0x12}) 00:28:50 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x22, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:50 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}], [], 0x18}) 00:28:51 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x18000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:51 executing program 2: mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:51 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:51 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2e, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:51 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}], [], 0x19}) 00:28:51 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x19000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:51 executing program 2: mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:51 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r5 = socket$nl_route(0x10, 0x3, 0x0) bind(r5, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) splice(r0, 0x0, r3, 0x0, 0x4ffe3, 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:28:51 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}], [], 0x22}) 00:28:51 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x22000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:51 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x300, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:51 executing program 2: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:51 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}], [], 0x25}) 00:28:51 executing program 2: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:52 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:52 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x700, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:52 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2e000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:52 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}], [], 0x2e}) 00:28:52 executing program 2: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:52 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r5 = socket$nl_route(0x10, 0x3, 0x0) bind(r5, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) splice(r0, 0x0, r3, 0x0, 0x4ffe3, 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) [ 304.272793][T22223] EXT4-fs: 156 callbacks suppressed [ 304.272811][T22223] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 00:28:52 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) [ 304.332880][T22229] EXT4-fs (sda1): Unrecognized mount option "." or missing value [ 304.344648][T22230] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 304.359222][T22230] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. [ 304.369217][T22233] EXT4-fs (sda1): Unrecognized mount option "." or missing value 00:28:52 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB="7379737667726f7570732c6a6f75726e616c5f9a75adcf965285686563"]) [ 304.379922][T22234] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 304.392649][T22234] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. [ 304.404502][T22237] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 304.414650][T22237] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. 00:28:52 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:52 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1800, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:52 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 304.425446][T22241] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 00:28:52 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x14000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x12020, &(0x7f0000000100)=ANY=[@ANYBLOB='nou`d32,debug_want_extra_isize=0x0000000080000000,\x00']) 00:28:53 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:53 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r5 = socket$nl_route(0x10, 0x3, 0x0) bind(r5, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) splice(r0, 0x0, r3, 0x0, 0x4ffe3, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:28:53 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1900, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:53 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:53 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:53 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x840, 0x1) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000140)={0x9, 0x4, 0x6}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:53 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:53 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2200, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:53 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:53 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x40, 0x4) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='user.incfs.metadata\x00', &(0x7f0000000400)=""/4096, 0x1000) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x40441, 0x120) 00:28:53 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:53 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:54 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r2 = syz_open_pts(0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000080)) dup3(r2, 0xffffffffffffffff, 0x0) r4 = epoll_create(0x4) r5 = dup3(r4, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r3, &(0x7f0000000200)) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000340)={'syztnl0\x00', &(0x7f00000002c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x79, 0x43102e46, 0x50, @ipv4={'\x00', '\xff\xff', @loopback}, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, 0x80, 0x700, 0x2, 0xe5}}) recvfrom$packet(r5, &(0x7f0000000200)=""/167, 0xa7, 0x140, &(0x7f0000000400)={0x11, 0x16, r6, 0x1, 0x80, 0x6, @local}, 0x14) setreuid(0x0, r1) r7 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r8) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x1260040, &(0x7f0000000180)={[{@nr_blocks={'nr_blocks', 0x3d, [0x6b]}}, {@huge_always}, {@huge_within_size}], [{@fowner_gt={'fowner>', r1}}, {@context={'context', 0x3d, 'system_u'}}, {@uid_eq={'uid', 0x3d, r8}}, {@audit}]}) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB="7379737667726f7570732c6a6f75726e6106c71fe465636b73756d2c00"]) 00:28:54 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x10000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:54 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:54 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf8f73f00, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:54 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r5 = socket$nl_route(0x10, 0x3, 0x0) bind(r5, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) splice(r0, 0x0, r3, 0x0, 0x4ffe3, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:28:54 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2e00, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:54 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfeffffff, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:54 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000140)=@nullb, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='hfs\x00', 0x1000008, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',dfltuid=', @ANYRESHEX=r1]) lchown(&(0x7f0000000700)='./file1\x00', 0x0, r1) r2 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) r3 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) mount$9p_virtio(&(0x7f0000000600), &(0x7f0000000640)='./file0\x00', &(0x7f0000000680), 0x1, &(0x7f00000006c0)={'trans=virtio,', {[{@access_uid={'access', 0x3d, r4}}], [{@seclabel}]}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@private0}}, &(0x7f0000000400)=0xe8) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000004900)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB=',wfdno=', @ANYRESHEX=r7, @ANYBLOB=',dfltuid=', @ANYRESHEX=r9]) statx(r2, &(0x7f0000000440)='./file0\x00', 0x400, 0x10, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000580)={{}, {}, [{0x2, 0x1, r5}], {0x4, 0x6}, [{0x8, 0x1, r9}, {0x8, 0x3, r10}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xffffffffffffffff}, {0x8, 0x1, 0xee01}, {0x8, 0x6, 0xee00}], {0x10, 0x5}}, 0x64, 0x5) 00:28:54 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3f00, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:54 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:54 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:54 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffefffff, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:54 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x40040, 0x10) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB="e2c0c47379777667726f75d5e536091d2917726e616c5f636865630000"]) [ 306.320461][T22352] 9pnet: Insufficient options for proto=fd [ 306.328356][T22357] 9pnet: Insufficient options for proto=fd [ 306.343854][T22357] 9pnet_virtio: no channels available for device syz 00:28:55 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x18000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:55 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:55 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffefff, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:55 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:55 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r5 = socket$nl_route(0x10, 0x3, 0x0) bind(r5, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) splice(r0, 0x0, r3, 0x0, 0x4ffe3, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:28:55 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) openat(r0, &(0x7f0000000040)='./file0\x00', 0x100000, 0x90) 00:28:55 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x80000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:55 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:55 executing program 1: newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000004900)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',dfltuid=', @ANYRESHEX=r4]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000200)={{0x1, r0, r4, 0xee00, 0x0, 0x16c, 0x1}, 0x0, 0x0, 0x9, 0x2, 0x1, 0x1, 0xff, 0x3ac, 0x5, 0x8}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x400040, 0x142) 00:28:55 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:55 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:55 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3ff7f8, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:56 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x22000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:56 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:56 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3ff800, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:56 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffffe, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:56 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) syz_mount_image$nfs(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x1, 0x4, &(0x7f0000000400)=[{&(0x7f0000000180)="552aa94e77942f4b61de1496de56b688d1e75b67cde8532251d7329c6ecdec7b7c06963128e0c42961538294a7e9bb477a980c818621fa2164e79456094dc1f656b28b4ae7a2e69aa6c869c1d684f1d77e22a140803b5ca415adb68414c8ef33c57aaa7b410a8de4263bd5c7195cb0b7363a0a3fdccacbc6f9887d8285e1d900875b5b8338c681d6fcbdb15c77fb385b911c7ee6e0e5085102b1d38aa9ef7c124d5be471881a2d8a9a7a1111f943500805ba5da1cbb4e3a0588dd7f25a99a0", 0xbf, 0x9}, {&(0x7f0000000240)="b3f7fb1dd68a5a168c2ced2b34678aef0ff190b124b799342f03357a", 0x1c, 0x5}, {&(0x7f0000000280)="a5f3", 0x2, 0x100}, {&(0x7f00000002c0)="63bcc04e892a9abf96833bb9f3a8ae8d5e6693ec3a2138cbd60abdae0e9ab74c371421ad8934bef8c99f7aff7fe51177a6d1cde3d256c04f4a8ac19a7eeaac821146f258bee8bdbab13968bcebc7c3c4f0220cfeb1430aabe814694907b61292352934de7332daeea3ef8ab2aea4e20c87a03c6599270e22a07923570f3e310ce6e6c4288d6edd", 0x87, 0x8}], 0x1003024, &(0x7f0000000480)={[{'ext3\x00'}, {}], [{@subj_type={'subj_type', 0x3d, 'ext3\x00'}}, {@measure}, {@euid_gt={'euid>', r1}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, '#$'}}]}) mkdir(&(0x7f0000000500)='./file0\x00', 0x44) mount(&(0x7f0000000000)=@md0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='coda\x00', 0x400, 0x0) 00:28:56 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = socket$nl_route(0x10, 0x3, 0x0) bind(r4, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:28:56 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:56 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x80000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:56 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x800000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:56 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x801000, 0x0) mount$bind(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file2\x00', &(0x7f0000000240), 0x2000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:56 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x800000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:56 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf83f00, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:57 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2e000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:57 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:57 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:57 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)={0x30, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x5, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0x30}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[], 0x6e2226) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="835bc555f1ff", @ANYRES32, @ANYBLOB="1f"], 0x3c}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x80}]}, 0x2c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000140)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r4, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x54, r3, 0x200, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r6}, @val={0xc, 0x99, {0x10000, 0x28}}}}, [@NL80211_ATTR_DONT_WAIT_FOR_ACK={0x4}, @NL80211_ATTR_CSA_C_OFFSETS_TX={0x12, 0xcd, [0x103, 0x6, 0x4, 0x0, 0x7, 0x3, 0x8]}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @NL80211_ATTR_CSA_C_OFFSETS_TX={0x8, 0xcd, [0x8, 0x59]}, @NL80211_ATTR_DURATION={0x8, 0x57, 0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x8000}, 0xc845) sendmsg$NL80211_CMD_SET_PMKSA(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x54, 0x0, 0x0, 0x70bd25, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_PMK={0x14, 0xfe, "4adee20c397909b4e9086410b710a6f9"}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x20}, @NL80211_ATTR_PMKID={0x14, 0x55, "64eb7f8292052f64ca82535199be7949"}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x53}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x20, 0x15f) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:28:57 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) socket$nl_route(0x10, 0x3, 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:28:57 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:57 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:57 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:57 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@nomblk_io_submit}]}) 00:28:57 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:57 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:58 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:58 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) 00:28:58 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x420000, 0x41) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x6, 0x8010, r0, 0x7a95b000) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x1000, 0x0) r1 = epoll_create(0x9) preadv(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/22, 0x16}, {&(0x7f0000000180)=""/143, 0x8f}, {&(0x7f0000000240)=""/182, 0xb6}], 0x3, 0x7, 0x800) write$binfmt_script(r1, &(0x7f0000000340)={'#! ', './file1', [{0x20, 'ext4\x00'}, {0x20, '-'}]}, 0x13) openat$dir(0xffffffffffffff9c, &(0x7f0000000400)='./file0/../file0\x00', 0x226200, 0x2) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000040)=ANY=[@ANYRESDEC]) mount$bind(&(0x7f0000000440)='./file1\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0), 0x90000, 0x0) 00:28:58 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:58 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf83f0000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:58 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) socket$nl_route(0x10, 0x3, 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) [ 309.977484][T22550] EXT4-fs: 171 callbacks suppressed [ 309.977496][T22550] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 00:28:58 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) r0 = io_uring_setup(0x45db, &(0x7f00000009c0)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x389, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0a85320, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 310.036043][T22557] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 310.062697][T22557] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. [ 310.072805][T22560] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring 00:28:58 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)={[{@commit}]}) [ 310.093100][T22560] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. [ 310.102997][T22564] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 310.113439][T22564] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. [ 310.124326][T22565] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 310.133625][T22569] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 00:28:58 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:58 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:58 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@commit}]}) [ 310.142192][T22566] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring 00:28:58 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x10000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:59 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:28:59 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:59 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@commit}]}) 00:28:59 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x18000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:59 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) socket$nl_route(0x10, 0x3, 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:28:59 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x19000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:59 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:59 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@commit}]}) 00:28:59 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x22000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:59 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:59 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2e000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:28:59 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:00 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:00 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, 0x0) 00:29:00 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:00 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:00 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) bind(0xffffffffffffffff, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:00 executing program 1: ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000140)=""/111) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) dup3(r1, r0, 0x0) r3 = epoll_create(0x5) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000200)) ioctl$EVIOCSCLOCKID(r4, 0x400445a0, &(0x7f0000000000)=0x400) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) r8 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r8, 0xd000943d, &(0x7f0000000640)={0xfffffffffffffffe, [{0x0, r11}, {0x0, r11}, {r10}, {r10}, {r10, r11}, {}, {}, {0x0, r11}, {}, {r10, r11}, {0x0, r11}, {}, {0x0, r11}, {0x0, r11}, {}, {r10, r11}, {0x0, r11}, {}, {}, {}, {0x0, r11}, {r10}, {0x0, r11}, {0x0, r11}, {r10}, {0x0, r11}, {r9}, {}, {r9}, {}, {}, {}, {r9, r11}, {r10}, {}, {0x0, r11}, {r10, r11}, {0x0, r11}, {r9, r11}, {}, {0x0, r11}, {r10}, {}, {0x0, r11}, {r10, r7}, {0x0, r11}, {r10}, {0x0, r11}, {}, {r9, r11}, {}, {r9}, {}, {r10}, {r9}, {}, {r10, r11}, {}, {0x0, r11}, {0x0, r11}, {}, {0x0, r11}, {r5, r11}, {}, {0x0, r11}, {r10, r11}, {r10}, {r9, r11}, {}, {r9}, {}, {}, {0x0, r11}, {}, {r10}, {r9}, {}, {}, {}, {0x0, r11}, {r10}, {}, {}, {r5, r11}, {r9}, {0x0, r11}, {0x0, r11}, {0x0, r11}, {r9, r11}, {}, {}, {0x0, r11}, {}, {r9}, {0x0, r11}, {}, {r10}, {r9, r11}, {0x0, r11}, {r9}, {r10, r11}, {0x0, r11}, {0x0, r11}, {0x0, r11}, {}, {0x0, r11}, {}, {r9, r11}, {0x0, r11}, {0x0, r11}, {r9, r11}, {0x0, r11}, {r10, r11}, {r9, r11}, {r10}, {}, {r9}, {r9}, {r10, r11}, {}, {r9}, {r9, r11}, {}, {0x0, r11}, {0x0, r11}, {0x0, r11}, {0x0, r11}, {r10, r11}, {}, {}, {r9, r11}, {}, {r10, r11}, {r9, r11}, {r10, r11}, {0x0, r11}, {}, {r10, r11}, {r10}, {}, {r6, r11}, {r9}, {0x0, r11}, {r10}, {r9}, {0x0, r11}, {r10, r11}, {0x0, r11}, {0x0, r11}, {}, {0x0, r11}, {r10}, {0x0, r11}, {r10}, {r9}, {}, {}, {}, {0x0, r11}, {r9, r11}, {r10, r11}, {}, {0x0, r11}, {}, {r10}, {0x0, r11}, {}, {0x0}, {r9}, {r9}, {0x0, r11}, {r9, r11}, {r10, r11}, {0x0, r11}, {r9}, {r6}, {r9}, {0x0, r11}, {r10}, {0x0, r11}, {r9, r11}, {}, {0x0, r11}, {}, {}, {0x0, r11}, {r10}, {r9}, {}, {r9}, {r9}, {0x0, r11}, {r10, r11}, {0x0, r11}, {r10, r11}, {}, {}, {r10}, {r9, r11}, {r10}, {0x0, r11}, {}, {}, {r9}, {}, {r9}, {r10}, {}, {r9, r11}, {}, {}, {}, {r10}, {0x0, r11}, {r9}, {}, {r10}, {}, {}, {r10}, {0x0, r11}, {}, {r9, r11}, {}, {}, {}, {0x0, r11}, {}, {r10, r11}, {}, {0x0, r11}, {r9}, {r10, r11}, {r10, r11}, {r10}, {r10, r11}, {r9, r11}, {}, {}, {}, {r9, r11}, {0x0, r11}, {r9, r11}, {}, {r10}, {r10}, {r9}, {}, {r10}, {r10}, {}, {}, {}, {r10, r11}, {0x0, r11}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005a840)={0x1fc8bd25, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0xb0, "1fb10ca72b14da"}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000040)=ANY=[@ANYBLOB='sysvgroups,journal_checksu\x00']) 00:29:00 executing program 1: shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x3000)=nil, 0x8000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:00 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:00 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, 0x0) 00:29:00 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1800000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:00 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, 0x0) 00:29:00 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:00 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) dup3(r1, r0, 0x0) r3 = epoll_create(0x5) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@access_client}, {@cache_none}, {@version_u}], [{@fowner_lt={'fowner<', r5}}, {@subj_user={'subj_user', 0x3d, 'journal_checksum'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@subj_user={'subj_user', 0x3d, 'ext4\x00'}}, {@subj_role={'subj_role', 0x3d, 'ext4\x00'}}, {@permit_directio}]}}) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:00 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1900000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:00 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:00 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2200000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:01 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)) 00:29:01 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB='sys@\x00\x00\x00\x00\x00\x00\x00jo\x00\x00\x00']) 00:29:01 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2e00000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:01 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf8f73f00, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:01 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:01 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) bind(0xffffffffffffffff, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:01 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfeffffff, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:01 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000140)=ANY=[@ANYBLOB="7379737667726f757073246a6f75726e616c5f637000636b73756d2c004e99be5a09b1bac0525c28043a6fd210101a24dc8b44ddc5644ba88e2356a2c4e4d54afcd2ffc473bbe3125bda3067ea8f793f12c2161c6931033089431f495545010f05aaa85d34085d28eafaa4211b9efffbedf92b9c8731183f5f577ed1a5ecb2c2d17f1043455da624764b40020000008424de7e8a1ea0b87d4dac1a2a9a8489a6a720a2ac83302e867dc5deeceafd0a619a84e73952054600"/199]) 00:29:01 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:01 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)) 00:29:01 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffefffff, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:01 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="550000002a007f33deba2f977333bd930a0000ce01a843089100fe803900080008000000009eb43c6a95a0fb432c00000000fb83de448daa72540d8102d269c4d4133ab82286926700"/85, 0x55}], 0x1}, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(r0, 0x4004f506, &(0x7f0000000040)) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:01 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:01 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffefff, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:01 executing program 1: ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000040)={'dummy0\x00', 0x1e}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:01 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9207c, &(0x7f00000000c0)) 00:29:02 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xf8f73f00, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:02 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:02 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB='sys@\x00\x00\x00\x00\x00\x00\x00jo\x00\x00\x00']) 00:29:02 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1024, 0x0) r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x5) r2 = dup3(r1, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000200)) utimensat(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB="7379737667726f7570732c6a6f75726e616c5f5c0500000073756d2c82"]) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r4 = syz_open_pts(r3, 0x0) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f0000000080)) dup3(r4, r3, 0x0) r6 = epoll_create(0x5) r7 = dup3(r6, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r5, &(0x7f0000000200)) statx(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x100, 0x0, &(0x7f0000000140)) 00:29:02 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) bind(0xffffffffffffffff, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:02 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:02 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB='sysvgroupr,journal_checksum,\x00']) 00:29:02 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:02 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:02 executing program 1: setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000000), 0x4) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000040)=ANY=[@ANYBLOB="7379737667726f7570732c6a6f75726e616ca1bfc9e2245da3ef5c46ee178cc35f636865636b73756d2c00"]) 00:29:02 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) dup3(r1, r0, 0x0) r3 = epoll_create(0x5) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@access_client}, {@cache_none}, {@version_u}], [{@fowner_lt={'fowner<', r5}}, {@subj_user={'subj_user', 0x3d, 'journal_checksum'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@subj_user={'subj_user', 0x3d, 'ext4\x00'}}, {@subj_role={'subj_role', 0x3d, 'ext4\x00'}}, {@permit_directio}]}}) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:02 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffffe, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:03 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:03 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) socket$nl_route(0x10, 0x3, 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:03 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf8f73f0000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:03 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x18d) mount(&(0x7f0000000140)=@md0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='nfs\x00', 0x2, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1000000) 00:29:03 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x80000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:03 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket(0x10, 0x3, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) bind(r3, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:03 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:03 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x800000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:03 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket(0x10, 0x3, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) bind(r3, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:03 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfeffffff00000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:03 executing program 1: r0 = fsmount(0xffffffffffffffff, 0x1, 0x71) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240), &(0x7f0000000280), 0x2, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040), &(0x7f0000000200)={0x0, 0xfb, 0x3d, 0x5, 0x5, "9768fe361b9b154c71ac65428e7d08f9", "5c186c835770533da741508297ada13e7e3353c9afb803d53b2429c613f7247c43dcd8402dedab82"}, 0x3d, 0x3) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x82003, &(0x7f0000000140)=ANY=[@ANYBLOB="a3b6beb1bead02441e3ae9e1da43da866d50277e5f9ecf6cfec68045334a5094ed9c1672cfe539d00cd2bd0b92c15422db0943e975a73835c210a382a70e91df5a3bd29a2d04fbc7279d8c9266bd0832a4a53388c5fd3ad578ab596223984cf90480363e43a500000000000000000000f900000250b87a11ad69a1756222cac74c85586705419260fc657ae4a8e9afc49d840efd68b71114c8163cb8210ddafa167891d239bab61112ede2b3b4538f6a16a59a"]) 00:29:03 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 314.995428][T22894] EXT4-fs: 192 callbacks suppressed [ 314.995457][T22894] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 315.010743][T22894] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. [ 315.021715][T22895] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 315.031969][T22895] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. 00:29:04 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xffefffff, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:04 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket(0x10, 0x3, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) bind(r3, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:04 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffefffff00000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:04 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000001c0)={0x1b4, r1, 0x400, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8, 0x1, 0x73}, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0x400}, @NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0xfffffffb}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x2}, @NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0x7ff}, @NL80211_ATTR_VENDOR_DATA={0xfe, 0xc5, "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"}, @NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0x40}, @NL80211_ATTR_VENDOR_DATA={0x56, 0xc5, "17782c4e12c810cc6e62d8a9ceb11545339cbb618ce4ae38c337641b34d3f0377e1cf59e91dcc3c37ec2337db2c770074df1636419e2147f34340f8048e382dc7c4018144c758d1fe84d9e10b601e4e93b2a"}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x4}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x48000}, 0x4) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000040)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:04 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:04 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 315.711931][T22901] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 315.785527][T22910] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 315.797049][T22910] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. [ 315.806933][T22911] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 315.817643][T22911] EXT4-fs (sda1): re-mounted. Opts: sysvgroups,journal_checksum,,errors=continue. Quota mode: none. 00:29:04 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$nl_route(0x10, 0x3, 0x0) bind(r3, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:04 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:04 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:04 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) r0 = io_uring_setup(0x45db, &(0x7f00000009c0)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x389, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0a85320, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 315.829216][T22912] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 00:29:04 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:xconsole_device_t:s0\x00', 0x27, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@private}, 0x0, @in=@initdev}}, &(0x7f0000000540)=0xe8) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000004900)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',dfltuid=', @ANYRESHEX=r4]) lsetxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='system.posix_acl_default\x00', &(0x7f0000000580)={{}, {0x1, 0x1}, [{0x2, 0x1, 0xee00}, {0x2, 0x2, 0xffffffffffffffff}, {0x2, 0x6, 0xee01}, {0x2, 0x4, r0}, {0x2, 0x5}], {0x4, 0x9}, [{0x8, 0x1, r4}, {0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x2}, {0x20, 0x1}}, 0x5c, 0x1) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="2f6465762f73673000a361ef06a039f121e3117b27a6f7e4fe788c26024d2ba070b0de71a969fdec4f942e88edf689f07ab799f0256fbbc3410b82501eed2a4ad2197ff67c7f4a90da697b7867c1cf89e5de519c9ba66ef6342bebc60fe04a5a219d10dfb81137ed053ad1e8fac698f8ac8ec52675ae2cacd6d46415a5e357f897bc3683cb61c814a720be67f9ae33"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='exofs\x00', 0x2200051, &(0x7f0000000280)='\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:04 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12016, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:05 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:05 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf83f0000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:05 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum, 0x22}]}) 00:29:05 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB="79737667726f7570732c6a6f75726e616c5f630300000073756d2c0000"]) 00:29:05 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) r0 = io_uring_setup(0x45db, &(0x7f00000009c0)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x389, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0a85320, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:05 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:05 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:05 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) getresuid(&(0x7f0000000000)=0x0, &(0x7f0000000200), &(0x7f0000000240)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@private, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000400)=0xe8) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000540)={[], [{@obj_user={'obj_user', 0x3d, 'adfs\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x81}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@dont_appraise}, {@uid_eq={'uid', 0x3d, r0}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@appraise_type}, {@dont_appraise}, {@smackfstransmute}, {@fsname={'fsname', 0x3d, 'adfs\x00'}}]}) mount(&(0x7f0000000040)=@nullb, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='adfs\x00', 0x1080442, 0x0) 00:29:05 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$nl_route(0x10, 0x3, 0x0) bind(r3, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:05 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}], [], 0x2}) 00:29:05 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:05 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) getdents(r0, &(0x7f0000000140)=""/95, 0x5f) r1 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="550000002a007f33deba2f977333bd930a0000ce01a843089100fe803900080008000000009eb43c6a95a0fb432c00000000fb83de448daa72540d8102d269c4d4133ab82286926700"/85, 0x55}], 0x1}, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x30) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) fcntl$setown(r1, 0x8, r2) quotactl(0x4, &(0x7f00000001c0)='./file0\x00', 0x0, &(0x7f0000000200)="29b234b8aa857ed4f0c85fe5") 00:29:06 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:06 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}], [], 0x3}) 00:29:06 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:06 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xe8) mount$9p_xen(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x10000, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=xen,cachetag=journal_checksum,smackfsroot=uid,uid<', @ANYRESDEC=r0, @ANYBLOB="2c6fff030000000000002c61751722766164"]) 00:29:06 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) r0 = io_uring_setup(0x45db, &(0x7f00000009c0)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x389, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0a85320, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:06 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$nl_route(0x10, 0x3, 0x0) bind(r3, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:06 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:06 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}], [], 0x4}) [ 317.688358][T23025] 9pnet: Could not find request transport: xen 00:29:06 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:06 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) open(&(0x7f0000000040)='./file1\x00', 0x240800, 0x104) 00:29:06 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}], [], 0x7}) [ 317.732360][T23036] 9pnet: Could not find request transport: xen 00:29:06 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:07 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:07 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="550000002a007f33deba2f977333bd930a0000ce01a843089100fe803900080008000000009eb43c6a95a0fb432c00000000fb83de448daa72540d8102d269c4d4133ab82286926700"/85, 0x55}], 0x1}, 0x0) write(r0, &(0x7f0000000040)="41e9b5f437c1da9452d8c98a06a50488e5689e81a6f30146", 0x18) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:07 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}], [], 0x10}) 00:29:07 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1800000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:07 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) r0 = io_uring_setup(0x45db, &(0x7f00000009c0)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x389, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0a85320, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:07 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$nl_route(0x10, 0x3, 0x0) bind(r3, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:07 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}], [], 0x18}) 00:29:07 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x97b, 0x3, &(0x7f0000000480)=[{&(0x7f0000000180)="83f87b6ac771c3b6b64ded6af5e708128a4102c3ace185ac883c5437c6582c7edadec442505b487f6a82e90e03e7e7a52a94f018b16591a2234f716ca55258cd4ade3a0d4d1ad1bb01e17214dce70a901a4453089f92b2af4d5cf505ae339fc43fd1762c3c224df5401cac5211c6458532d6cd3bb30a2299560b5ce1403e664982c40f68b4b43995ea20dc910b3baa4148d5ac975cf742b2a8713572b1c4911bb3a82c09216d178ccb5acf560aa8d4ebc3600a31fa9751bb06250d71d57994501fbd9c6d343ea5aec94c325a5e2e93ef7bb76d69553f3007c609a2c9bc1675ec90e195c91bf5de201fb0dbf9ed57eb", 0xef, 0x3}, {&(0x7f0000000280)="f26ecc5f757f60abfd52f3b2fdcf53deca8850df64097beaea190ac8740ff9572a814cd583832d11244b0781736e9ca43e86d8c0fbb22fc99d803a16bb47e4b656325a67099bbfbf2ebd7cb070b786c7ad38ff921bc22c001d76987392b74ff7eac960241d9d09ec1f43320a06ec71559e0b9af1ee80ec7adfaed5080f7aba156d3026d82a553a385941c614", 0x8c, 0x10000}, {&(0x7f0000000400)="52a0fda7451098f6f84bb0ba7a5a6237d44365c3b4813e208fa038f66faa7df01182c4e0eab095ccf59bcd57aeaa0c746e1d98da8aa16d90c22c11124945908342c41908aa57efbae0d84d069208f5aa0ea81119a4848d", 0x57, 0xf1}], 0x2303020, &(0x7f0000000500)={[{@nonumtail}], [{@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@hash}, {@audit}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'journal_checksum'}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}]}) ioctl$BTRFS_IOC_SEND(r0, 0x40489426, &(0x7f0000000640)={{}, 0xa, &(0x7f00000005c0)=[0x8, 0x2, 0x7, 0x200, 0x9, 0x3e39, 0xbbd3, 0x0, 0x2, 0x678], 0x10000, 0x0, [0xb, 0x352, 0x100, 0xffff]}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) open(&(0x7f0000000340)='./file0\x00', 0x2000, 0x168) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:07 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1900000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:07 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}], [], 0x19}) 00:29:07 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) dup3(r1, r0, 0x0) r3 = epoll_create(0x5) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000200)) mknodat$null(r4, &(0x7f0000000040)='./file0\x00', 0x2000, 0x103) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@dax}, {@journal_checksum}]}) 00:29:07 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2200000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:07 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:07 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000003c0)=ANY=[@ANYBLOB="222f0e0400d4e1000000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='coda\x00', 0x80, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)='./file1\x00', 0x0, 0x201040, 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000480)='./file0\x00') mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='autofs\x00', 0x840406, &(0x7f0000000400)='/dev/sr0\x00') syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000002c0)=ANY=[@ANYRES64]) mount$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x20, &(0x7f0000000240)={[{@nr_blocks={'nr_blocks', 0x3d, [0x38]}}], [{@fsuuid={'fsuuid', 0x3d, {[0x32, 0x64, 0x64, 0x39, 0x34, 0x35, 0x37, 0x61], 0x2d, [0x33, 0x61, 0x33, 0x34], 0x2d, [0x63, 0x39, 0x64, 0x35], 0x2d, [0x13, 0x63, 0x39, 0x52], 0x2d, [0x33, 0x30, 0x32, 0x32, 0x61, 0x34, 0x37, 0x35]}}}, {@euid_lt}, {@euid_lt}]}) 00:29:07 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2e00000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:07 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) r0 = io_uring_setup(0x45db, &(0x7f00000009c0)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x389, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0a85320, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:07 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}], [], 0x22}) 00:29:07 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$nl_route(0x10, 0x3, 0x0) bind(r3, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:08 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:08 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}], [], 0x2e}) 00:29:08 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0x40000, 0x38) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:08 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0xa03080, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0xa, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:08 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:08 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000140)=ANY=[@ANYBLOB="7379737667726f821c6a6816577a1b8be07570732c6a6f75726e61165f636865636b73756d2c0018699880651dadbe556534525d465c9361a1b091d30bae80178f6f425c76eff27c89985698488b00acad580cb1c3fcda29a4998865e4db5ff2b8e1e3da7f3cabf77db027b513d530da0b9438e02b016c1e0176f58202d7bc9a9b44d4f3d821ee10d7d96607d99e7d558659e71d259aeba2b7015797d7edfda34c5caea5c393a4ed71b7cd4fbdbfe5856d17b26ad3aa157a9ad6429881c075c893c3a016f5fcebc330d340137f739e5a7a25a64df7c993f1c81e4e42cb5ce745e2f3f7b7086b7752"]) 00:29:08 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:08 executing program 5: r0 = shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x3000)=nil, 0x1000) shmdt(r0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:08 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:08 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$nl_route(0x10, 0x3, 0x0) bind(r3, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:08 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="65762f737230000c399ff0548da06c8622624d3f4fc099355731b9db7de7"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='coda\x00', 0x20d28d0, &(0x7f00000001c0)='journal_checksum') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB="73ff7f0000726f7570732c6a6f75726e616c5f636865636b73a16d2c00"]) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r2 = syz_open_pts(r1, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000080)) dup3(r2, r1, 0x0) r4 = openat$cgroup_int(r0, &(0x7f0000000280)='cpuset.sched_load_balance\x00', 0x2, 0x0) r5 = syz_io_uring_setup(0x782e, &(0x7f0000000140), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001000/0x1000)=nil, &(0x7f0000000000), &(0x7f00000001c0)) mmap$IORING_OFF_SQES(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0x12, r5, 0x10000000) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) read(r4, &(0x7f0000000400)=""/248, 0xf8) r6 = epoll_create(0x5) r7 = dup3(r6, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r3, &(0x7f0000000200)) move_mount(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', r7, &(0x7f0000000240)='./file0\x00', 0x20) 00:29:08 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) r0 = io_uring_setup(0x45db, &(0x7f00000009c0)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x389, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0a85320, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) [ 320.438937][T23191] EXT4-fs: 146 callbacks suppressed [ 320.438948][T23191] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 320.466419][T23195] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 320.479797][T23195] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. [ 320.490537][T23202] EXT4-fs (sda1): Unrecognized mount option "sÿ" or missing value [ 320.498607][T23204] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 320.508896][T23204] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. [ 320.518999][T23205] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 320.529332][T23205] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. 00:29:09 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000040)=0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x12020, &(0x7f0000000140)={[{@noquota}, {@journal_checksum}], [{@euid_lt={'euid<', r0}}]}) 00:29:09 executing program 5: ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000400)={0x0, "89cc2eb6d4479ec595a1703855c0c5e4"}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB='m,\x00']) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) dup3(r1, r0, 0x0) r3 = epoll_create(0x5) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000200)) openat(r4, &(0x7f0000000040)='./file0/file0\x00', 0x40800, 0x38) 00:29:09 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:09 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@i_version}, {@journal_checksum}], [{@permit_directio}]}) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.upper\x00') [ 320.540209][T23209] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 320.548881][T23207] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring 00:29:09 executing program 5: prctl$PR_SVE_GET_VL(0x33, 0x126f7) prctl$PR_SVE_GET_VL(0x33, 0x1f2de) prctl$PR_SVE_GET_VL(0x33, 0xfeac) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000140)=ANY=[@ANYRESHEX]) 00:29:09 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf8f73f0000000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:09 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x4, &(0x7f0000000400)=[{&(0x7f0000000180)="181807bcd688ddffbf2659d32c29083be85e8822bd6e8a19148777baec8b1d3a47fba7f8ed3c93a9abdf2ad7bb874806729c1f03f1a039773d897b274631580f", 0x40, 0x24}, {&(0x7f00000001c0), 0x0, 0x2f}, {&(0x7f0000000200)="94ddf86501a0baece8ec0746dc83f43e9d1b3b7915767150204e17967c3cebac3643c14d37402bc43685e5c89363cd04606148a16aa8e2ff37160b4b9ba20e105075302d9e54f7171462127900ce3404190670c390a3ed046e4ef23129f5400076f0c01bbf91d23d7f5f97a3eeef94cee5b1882d35ba3f9046e9d8ac25b68b8277aeb38f8f93cb86b82b412cf6463aca10e2ab8a1f3c7f55393ecbe3bab17a705ec5ca5bec3b13c23e0a83e8d16f42688f3775d080a7cc9b025210dd91b55133b5049b2a8d9e7aa3e410b8c2f62a7582eefed19aa42ffe0ec7dd2f02c014bfbf360052aad77791733f4e8abb3e3d1306", 0xf0, 0x7fff}, {&(0x7f0000000300)="49a7e915f1ba7ba68db92f0cde68cf9a7fbda611151eba3d01dd2bbafd8f082d405c3a179dadd107de02632cabbd005cd33c7e49a0940125e49755f03c8f0b6c178d43f69483763cbcfba26cb79ab75d8b97711cc0a7d07b40c2bb9266520153df73df1b0067aabef1a7", 0x6a, 0x2}], 0x2002, &(0x7f0000000480)={[{@lazytime}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@data_journal}], [{@uid_gt={'uid>', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@euid_gt={'euid>', 0xee01}}, {@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@uid_gt={'uid>', r1}}]}) 00:29:09 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x812c20, &(0x7f0000000140)=ANY=[@ANYBLOB='nolazytime,journhecksum,\x00']) chdir(&(0x7f0000000040)='./file0\x00') 00:29:09 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfeffffff00000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 320.672829][T23248] loop5: detected capacity change from 0 to 127 00:29:09 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:09 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) setxattr$incfs_id(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={'0000000000000000000000000000000', 0x33}, 0x20, 0x2) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x0, 0x0, 0x12020, &(0x7f0000000200)={[{@sysvgroups}, {@journal_checksum}, {@debug}, {@nobh}, {@jqfmt_vfsv1}]}) chroot(&(0x7f0000000000)='./file0\x00') 00:29:09 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffefffff00000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:09 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:09 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x45db, &(0x7f00000009c0)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x389, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0a85320, &(0x7f0000000280)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:09 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$nl_route(0x10, 0x3, 0x0) bind(r3, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:09 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x13c3020, &(0x7f0000000140)=ANY=[]) mount$bind(&(0x7f0000000000)='./file1/file0\x00', &(0x7f0000000140)='./file1/file0\x00', &(0x7f0000000180), 0x800000, 0x0) mount$bind(&(0x7f00000001c0)='./file1/file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x40000, 0x0) 00:29:09 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) mount$9p_virtio(&(0x7f0000000200), &(0x7f0000000240)='./file1\x00', &(0x7f0000000280), 0x2084, &(0x7f00000002c0)={'trans=virtio,', {[{@cache_mmap}], [{@dont_hash}]}}) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) mount$bind(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x2002090, 0x0) 00:29:09 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:09 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000140)=ANY=[@ANYBLOB="6a6f75726e616cff636865636b73756d2c00a26ba92d78d282db8a36ea0dcb567897113f2cc0bb44104b1950a3318f751d3a91361aa5842b96358513d4ee25cef14a7adac32fe35552e92b8135c5ea9a5457f9c4f13c43e513d1404e0c9feb563362075b8f23037474b4715700ab45ab3ba60e98ba0fcb3b409917faa5bf740f3a3756176e00a6da24322178f19f41d9bb1e97cec6ad351ac0d69ee3e33b028149f3206ff1c32e1cb61b500dfb"]) 00:29:09 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:09 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x4000, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x32) mount(&(0x7f0000000240)=@filename='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='xfs\x00', 0x1210008, 0x0) chdir(&(0x7f0000000140)='./file0\x00') 00:29:10 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:10 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x12000, 0x70) 00:29:10 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12011, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:10 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="550000002a007f33deba2f977333bd930a0000ce01a843089100fe803900080008000000009eb43c6a95a0fb432c00000000fb83de448daa72540d8102d269c4d4133ab82286926700"/85, 0x55}], 0x1}, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0xc0400, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@posixacl}, {@nodevmap}, {@cache_loose}, {@access_any}, {@version_L}, {@access_uid={'access', 0x3d, 0xee00}}], [{@uid_eq={'uid', 0x3d, r2}}]}}) 00:29:10 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$nl_route(0x10, 0x3, 0x0) bind(r3, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:10 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x45db, &(0x7f00000009c0)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x389, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0a85320, &(0x7f0000000280)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:10 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum, 0x22}]}) 00:29:10 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x81, 0x30) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80800, 0x108) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB="73798f7667726f757073f96a6f75726e616c5f636865636b73756d2c00"]) 00:29:10 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:10 executing program 1: open_tree(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000140)=ANY=[@ANYBLOB="7379737667726f7570732c6a6f75726e616c5f636865636b73856d2c002b3732138b889d69fde43d08ece2a04f01a7a6b10d7b806fd7e5181c6f4c98bdbc0600000000000000b6958e96b4f82b1eccdae3c01976185049eab2e14f"]) 00:29:10 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$9p_tcp(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x842080, &(0x7f0000000200)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@privport}], [{@euid_lt={'euid<', r0}}, {@smackfsfloor={'smackfsfloor', 0x3d, ')\xc5'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}}) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000c00)=ANY=[@ANYRESHEX], 0x64, 0x0) msgsnd(r1, &(0x7f0000000840)={0x3, "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"}, 0x39d, 0x0) msgrcv(r1, 0x0, 0x70, 0x0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000004900)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',dfltuid=', @ANYRESHEX=r5]) r6 = getuid() newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)=0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000400)={{0x0, r0, r5, r6, r7, 0x8, 0x401}, 0x0, 0x0, 0xfffffffffffffffd, 0x100000000, 0x4, 0x9, 0x7f, 0x4fb9, 0x8001, 0x3, r8}) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x100d400, 0x0) 00:29:10 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}], [], 0x2}) 00:29:11 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x8000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:11 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB='sysvgroups,journAl_checksum,\x00']) open$dir(&(0x7f0000000040)='./file0\x00', 0x101000, 0x43) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000580)={'syztnl0\x00', &(0x7f0000000500)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x81, 0x5, 0x30, @mcast2, @remote, 0x10, 0x20, 0x7f, 0x7fff}}) sendmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f00000005c0)=@can={0x1d, r0}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000640)="ec33124023a1e10e5f1153cb9640773c71025727b36277ac23179d015bf8a5ca0a304ee0f037a435fd5a316e51feee38b7f3f152ef11ccb1c3f427f3a7457b5c106d33e01090caf421096f57a0309e837c543b922913e4bd9e687d02909f03c1be72008949f9e638d482f822b8046b04b46329d0c2d6a080f4ce52aed061f0857eefa50101f0c24d82da8f2b1d48be9478856e51e977c110b7a3b3fb4f8e48a5374986a6045283cc250f1803e1", 0xad}, {&(0x7f0000000700)="0c80573dd18d67a115a4275929d94cbedcac0347f7a0cbc4b6d4bb7a8f303a8efb347611dced53adb55ba26cd421d15848afced3ab739010d9aeab85bea5e0487c01ece03df0c69e1ec4a8df541b28204128f3cf897a760719447f57aef4928137a880b7378bf687b4eaaf76995bd2d9b3359751a65a60b4d2ee50784dbb6b69ed5fab2c02e5e67cc21956d8d40572844d4be133316e5275846d19d53f535f5d0545ac36fabf48f7e338d76f186f160bcb14ccb1081ffd5eafb8bd3e846ebc8b21dd9e38bc5d846fd53e80dd60c1f14ea50465d17674e41c0163a5", 0xdb}, {&(0x7f0000000800)="d03c1e3bac9a8ef93a642caa3b45c0acdf728ca3a33a2ccc38db87d0f4fce60270976d6ca35f5ad1d5f668d753ca815020f598cc4920fc705bafeed5e94f4fea922f6856d7aae5f7fdbbec1b053bd17d29f21f67d239900bfa3859431254000d6ceb8700a6233baed14333123fc8bd73035094ea3bbf2cfc2d66725cd61ff47b702a190e0061b6be9fbd3add7eb57748dfbe6d37a38409dfcbf1b3b5e749632c7a03848a468378a24c0f5f72d586d352fce6baf0bd86d885e04af7c14c724c1a7778a7f7d239da32c56c73704e09d90f004b911785d0d7dccda70936046eaf8fac870d233c7f1380cc20764d", 0xec}, {&(0x7f0000000900)="2939c6bb6fbd8e6f619281ca07acd1db4ef9a841965754e24225a71029574c7d4248e1a9521cbd2b58ed5b6e9b02dc765f305bc7c836cc", 0x37}], 0x4, &(0x7f0000000980)=[{0x108, 0x10a, 0x1f, "ed594109aa7960fa0ccfed55d558c29c0cf79cf14f7e4083bab13f6f101f0d57d99ba8447f967c4623838f12a1778eb9bbb0521cb1db0c3e61e348b3a3350da6ab75bf7bf6534b16203c8a4f10d1eb280c4d949e430b99b6fff841394cd71d56f70181825692f6580ee6b1d7daf2e34980715d8d804d5521bc6b3484c3b3535df1f609b226bd0af7942cb39b79e7a6d1fa769f24ff0fa0a1a18e743ab9a09ac75cb3503adeb0f3c8fcfe6b9137f411cfbc5ccd638192b8ad9eca82685fbda474e3da74359e0fc6c507d4a2932625679cbf7456dd559b21df81d74ed347f423c988c335b7aa142afe96a0dca04d265688167c7350d0"}, {0xa8, 0x84, 0x7, "793eec4c70398f024356f35875e40ca8a6b24bdeb1dfe9f93e5acdc03bfadabe931281dbb8f2b324784aa6817b8e4ccca8e6d2d50d7129d2c207d062019e451bc8e588e82ea481cf08246453df200fd86c017c4bb5e3cea61597705c7fe7dc1a0c247da8438c18f5e905ea8a70a1a3aec73cefff3c6f719831298c10a3f642c51dda8b6b95e6c35faa21c9d8200cc35a7699a0"}], 0x1b0}, 0x20000000) 00:29:11 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}], [], 0x3}) 00:29:11 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:11 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$nl_route(0x10, 0x3, 0x0) bind(r2, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:11 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x45db, &(0x7f00000009c0)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x389, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0a85320, &(0x7f0000000280)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:11 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}], [], 0x4}) 00:29:11 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x10000, 0xb1) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:11 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) chroot(&(0x7f0000000000)='./file0\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='efs\x00', 0x10088, &(0x7f0000000200)='{:\xe6\"($]$--#\x00') syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000140)=ANY=[@ANYRESDEC=0x0]) 00:29:11 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}], [], 0x7}) 00:29:11 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x10001, 0x0) write$cgroup_pid(r0, &(0x7f0000000140)=0xffffffffffffffff, 0x12) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:11 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1000, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000140)={[{@journal_checksum}], [{@smackfsfloor={'smackfsfloor', 0x3d, '*{'}}]}) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)='*{', &(0x7f00000001c0)=',^.-}%:j*]f\x86(+\\:\x00', &(0x7f0000000200)='@--&-^\x00', &(0x7f0000000240)=')', &(0x7f0000000280)='\x00'], &(0x7f0000000340)=[&(0x7f0000000300)='ext4\x00'], 0x800) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000049c0)=[{{&(0x7f00000005c0), 0x6e, &(0x7f0000001b40)=[{&(0x7f0000000640)=""/76, 0x4c}, {&(0x7f00000006c0)=""/86, 0x56}, {&(0x7f0000000740)=""/111, 0x6f}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/81, 0x51}, {&(0x7f0000001840)=""/44, 0x2c}, {&(0x7f0000001880)=""/232, 0xe8}, {&(0x7f0000001980)=""/150, 0x96}, {&(0x7f0000001a40)=""/123, 0x7b}, {&(0x7f0000001ac0)=""/111, 0x6f}], 0xa, &(0x7f0000001c00)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x40}}, {{0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f0000001c40)=""/154, 0x9a}], 0x1, &(0x7f0000001d40)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}, {{&(0x7f0000001d80), 0x6e, &(0x7f0000002e00)=[{&(0x7f0000001e00)=""/4096, 0x1000}], 0x1, &(0x7f0000002e40)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xe8}}, {{&(0x7f0000002f40)=@abs, 0x6e, &(0x7f0000003fc0)=[{&(0x7f0000002fc0)=""/4096, 0x1000}], 0x1, &(0x7f0000004000)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}}, {{&(0x7f0000004080)=@abs, 0x6e, &(0x7f0000004200)=[{&(0x7f0000004100)=""/8, 0x8}, {&(0x7f0000004140)=""/175, 0xaf}], 0x2}}, {{&(0x7f0000004240), 0x6e, &(0x7f0000004380)=[{&(0x7f00000042c0)=""/80, 0x50}, {&(0x7f0000004340)=""/14, 0xe}], 0x2, &(0x7f00000043c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xf8}}, {{&(0x7f00000044c0)=@abs, 0x6e, &(0x7f0000004800)=[{&(0x7f0000004540)=""/248, 0xf8}, {&(0x7f0000004640)=""/43, 0x2b}, {&(0x7f0000004680)=""/33, 0x21}, {&(0x7f00000046c0)=""/34, 0x22}, {&(0x7f0000004700)=""/220, 0xdc}], 0x5, &(0x7f0000004880)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x118}}], 0x7, 0x2001, 0x0) r2 = getuid() syz_mount_image$ext4(&(0x7f00000003c0)='ext2\x00', &(0x7f0000000400)='./file1\x00', 0x9, 0x4, &(0x7f0000000540)=[{&(0x7f0000000440)="0dcdd98f0c6cd407c08ae882ccab9c372aec64362f117b519a73e4a50cf3716e6ba315c74760c50c3a5743bbc325ed54fa682a60f4", 0x35, 0x7}, {&(0x7f0000000480)="e1f6d6", 0x3, 0x2}, {&(0x7f00000004c0)="4dd6b5509b2043b8b3dd77063b6581ea05843a24e0f2b89601d5f53c80f3cd0320", 0x21, 0x4}, {&(0x7f0000000500)="096e4dca91ac7304128c800c7b6d66e0119c390c9195aa393c8e7ac27a6a66ac07debf467c8a88c6881ae20ab77b", 0x2e, 0x5}], 0x2080004, &(0x7f0000004b80)={[{@noacl}, {@resgid={'resgid', 0x3d, r1}}, {@errors_continue}], [{@uid_lt}, {@fsname={'fsname', 0x3d, 'smackfsfloor'}}, {@appraise}, {@obj_user}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x39, 0x32, 0x62, 0x63, 0x54, 0x39, 0x65], 0x2d, [0x4, 0x38, 0x66, 0x33], 0x2d, [0x39, 0x30, 0x30, 0x37], 0x2d, [0x33, 0x39, 0xc06a4eccc8e736fd, 0x35], 0x2d, [0x38, 0x32, 0x63, 0x38, 0x66, 0x61, 0x55, 0x30]}}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@fowner_gt={'fowner>', r2}}, {@subj_user={'subj_user', 0x3d, 'S:'}}, {@fsname={'fsname', 0x3d, ',^.-}%:j*]f\x86(+\\:\x00'}}]}) 00:29:12 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xf83f0000000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:12 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:12 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = dup(0xffffffffffffffff) connect$unix(r0, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e24}, 0x6e) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r2 = syz_open_pts(r1, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000080)) dup3(r2, r1, 0x0) r4 = epoll_create(0x5) r5 = dup3(r4, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r3, &(0x7f0000000200)) recvmmsg$unix(r5, &(0x7f0000000340)=[{{&(0x7f0000000000), 0x6e, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/11, 0xb}, {&(0x7f0000000400)=""/161, 0xa1}], 0x2, &(0x7f00000004c0)=[@cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}}], 0x1, 0x100, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)=ANY=[@ANYBLOB="7379737667726f7570732c6a6f75726e616c5f636a65636b73756d2c005ff3491b590798b5baaaf714781ead138dbeb86de686491b7a802c1e3054c9371613de607be795cb1aa9c7697c9031127555a682c91b0a71f58dee6325e06889d43fc0317c0d2bae386700bec9677be717f612bf72a95354a40e2782ea8e05c6c64386f52e44c8b2e484c631d8a9792704c16ef8c2cd9caf9a445a9b90affa8763ff030000ebb8bbb4b89eb11b85fb80cd2ca71d71f202c18d6a7d7c55196a06ec581bbea0314e1d0e3f5740d51b8c2fb49195e8123011"]) 00:29:12 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$nl_route(0x10, 0x3, 0x0) bind(r2, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:12 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}], [], 0x10}) 00:29:12 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x45db, &(0x7f00000009c0)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x389, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0a85320, &(0x7f0000000280)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:12 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000040)=ANY=[@ANYBLOB="6a6f75726e616c5f63ba78a73b6f2ab0d7e35dcf151d726ab620abe5735003194f6c8ee8625e6170c7a705923c352292a9789d7612c88dc794c630db"]) 00:29:12 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}], [], 0x18}) 00:29:12 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) lstat(&(0x7f0000000340)='./file1\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffa, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="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", 0xfd, 0x6}, {&(0x7f0000000280)="31ba7c4c9da11382c03dd104a1dcc424095efd35c1a70c81dd122b4aa0b0c7cec917ce2a25afbc53ee", 0x29, 0x54}, {&(0x7f0000000400)="df4c7c5b9706b3c0949888537565d9034d9718eac3227046118e596ed66555d9f179c6a1446f57b85cc9e390180fe4db17a03e5e81e10f6ba9c970159ea0041942ccdc1f4022771a2a4cc4dfb5b851881cde58879cc646946372df323578fe7e6195eaea59a39c8b4a25f09dedf08bb3a97220f10cfa7257b5901c3bdceac82c3abdb9ffab1450ea47bc66fe4eadafa9e52de5e39740308ad2434e36d1361384c307ba4151d09cdf95fb511a2c5898bf84712f2cb3714b87cf0600a1b947971f598541346f10306fe1c091a9eb9aaa6b376b7f31a03bfdb6456e02184ed6872558fb048da9fc0ae146e1258f3aafbb880535116e19", 0xf5, 0x1}, {&(0x7f00000002c0)="820409234918dccde448679652cc20217cefec9f28b9a752afd54f39ec978fca6e9619d5b127cd9fe781336d36d0c1a2fce10f9220b1571335f747822cf3dd9b51af80416d142eb202943e0306d654254584", 0x52}], 0x2000, &(0x7f0000000600)={[{@block}, {@nocompress}, {@gid={'gid', 0x3d, r0}}], [{@subj_user}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_role={'obj_role', 0x3d, '[,{*+'}}]}) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:12 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) dup3(r1, r0, 0x0) r3 = epoll_create(0x5) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000200)) fchmodat(r4, &(0x7f0000000040)='./file0\x00', 0x100) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[]) 00:29:12 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}], [], 0x19}) 00:29:12 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) mount(&(0x7f0000000040)=@filename='./file1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x8, &(0x7f00000001c0)='],\x00') 00:29:13 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:13 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}], [], 0x22}) 00:29:13 executing program 5: utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={0x7, 0x3}) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:13 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r1 = socket(0x11, 0x800000003, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = syz_genetlink_get_family_id$gtp(&(0x7f0000000280), r1) sendmsg$GTP_CMD_GETPDP(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="60231ebbe78d0dd0c111caa08613ef348f968871e3bf6bff4118503e5a6e71ed733102dc16eb9958ff85731b32c0cc99a129570241ede85603168902a6158698ece37df0a2b11612f8d4e05dbfa4885a315d3e35242092cb9682356299122731055ed8345fc6cbe10e85a2a310b8f91e0e2c338e739adc740137c9c45899232f154f4af1370b04a75398f6d471e71a1fde313e8a38732d2d230dbc9d", @ANYRES16=r3, @ANYBLOB="000826bd7200ffdbdf250200000008000500e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x20000800}, 0x48080) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000040)={0x30, r3, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x2a}}, @GTPA_O_TEI={0x8, 0x9, 0x1}, @GTPA_TID={0xc, 0x3, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x801}, 0x800) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000140)=ANY=[@ANYBLOB="7379737667726f7570726e616c5f636865636b7375742c0044e07983246e106755b9d0833516820b268cb19aec2fd022c95d655abca31de1634d80fc6f1755aa3684478861366bff3fbfcd7253a4a49488db68e86e69d29662daafaae78c401a61bd3ac35b8968cd135c8c0aac27c66739d9e22552370e1394e6ac5bdf4553c7bed9f047229223ddbaab64687eaa671cd181a0ae6a22f6c30367a8867976ad30b533d088adcd70a511b34e23001be1b8c14a414a5a935a10d16309c8006f63b799428247737de11efca6595552dfb86509d6cb45134b2f4488135457141f6639dcc24a73cb06d3e50ed080dbe9071f21f65b1a"]) 00:29:13 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$nl_route(0x10, 0x3, 0x0) bind(r2, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:13 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x45db, &(0x7f00000009c0)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x389, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0a85320, &(0x7f0000000280)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:13 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100e021, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 00:29:13 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="550000002a007f33deba2f977333bd930a0000ce01a843089100fe803900080008000000009eb43c6a95a0fb432c00000000fb83de448daa72540d8102d269c4d4133ab82286926700"/85, 0x55}], 0x1}, 0x0) accept4(r0, &(0x7f0000000140)=@can, &(0x7f00000001c0)=0x80, 0x80800) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="550000002a007f33deba2f977333bd930a0000ce01a843089100fe803900080008000000009eb43c6a95a0fb432c00000000fb83de448daa72540d8102d269c4d4133ab82286926700"/85, 0x55}], 0x1}, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x10000, 0x0, 0x0, 0x1002000, &(0x7f00000000c0)=ANY=[@ANYRESOCT=r1]) 00:29:13 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}], [], 0x2e}) 00:29:13 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x80, 0x7ff) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000040)={[{@stripe={'stripe', 0x3d, 0x1f}}]}) 00:29:13 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) utimes(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={{0x77359400}}) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:13 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}], [], 0xff}) 00:29:14 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)={0x30, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_MPP(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x74, 0x0, 0x20, 0x70bd26, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x800, 0x54}}}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x74}, 0x1, 0x0, 0x0, 0x4004004}, 0x84) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00ef2bbd7000ffdbdf25300000000c009900020000000d0000000600360040000000f9a6de793c3cbb3cc7f7923bf6fe2481f2080796e4ef27e4c40eaa75fbb2d034fd57ecd6525a718b5cbc7bd80baaad686dea5992e3a1ba5ac2bbdcc35dd7b6ce8b9bc6fbc43828022598fc5263708acb67bdf8049f86a8924e8d6e274ec7fed1fd4ad95481ab6f69b1337d9332f98360e7fefa1c17ad99adcd46b23f37fadb58c0dc45890231"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x50000, 0x130) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xb2030, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:14 executing program 1: ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f00000002c0)={'ip6gre0\x00', &(0x7f0000000240)={'ip6gre0\x00', 0x0, 0x29, 0x4, 0x8, 0x7a5, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback, 0x8, 0x10, 0x9, 0x1}}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) mount(&(0x7f0000000180)=@sg0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='pvfs2\x00', 0x28000, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000040)=':/\x00', &(0x7f0000000140)='./file0\x00', r0) 00:29:14 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8, 0x1) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) utime(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x8001, 0x8}) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000040)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000}}]}) 00:29:14 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$nl_route(0x10, 0x3, 0x0) bind(r2, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:14 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x45db, &(0x7f00000009c0)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x389, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0a85320, &(0x7f0000000280)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) [ 325.966574][T23559] EXT4-fs: 150 callbacks suppressed [ 325.966583][T23559] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 00:29:14 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x1, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 326.022088][T23569] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000001000,,errors=continue. Quota mode: none. [ 326.034057][T23571] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 326.044707][T23571] EXT4-fs (sda1): re-mounted. Opts: sysvgroups,journal_checksum,,errors=continue. Quota mode: none. [ 326.056970][T23574] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000001000,,errors=continue. Quota mode: none. 00:29:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) dup3(r1, r0, 0x0) r3 = epoll_create(0x5) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000200)) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r4, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x78, 0x2, 0x7, 0x301, 0x0, 0x0, {0x0, 0x0, 0x5}, [@NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FILTER={0x2c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x2}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x40}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xfff}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x8}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x8}]}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x2}]}, 0x78}, 0x1, 0x0, 0x0, 0x40000}, 0x4004800) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000040)=ANY=[@ANYRESDEC]) [ 326.069327][T23571] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 326.087400][T23571] EXT4-fs (sda1): re-mounted. Opts: sysvgroups,journal_checksum,,errors=continue. Quota mode: none. [ 326.099030][T23576] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 326.108437][T23580] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 00:29:14 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x81000) openat2(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x101400, 0x1}, 0x18) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:14 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) dup3(r1, r0, 0x0) r3 = epoll_create(0x5) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000200)) openat(r4, &(0x7f0000000200)='./file0\x00', 0x80400, 0x146) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f6423f7dc54723000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='ufs\x00', 0x800, &(0x7f00000001c0)='journal_checksum') syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:14 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000200)=ANY=[@ANYBLOB="7379737667726f7570732c6a6f75726e616c5f636865636b73756d2c00a206b05e07467f0adc513c70d85186b53dca1735d2573795527bc0fd70378238cca54b272365e74f2605b9cc4d301c509baf2361d30970caba987fd8a22f87b77eb7032b8779d6edd4fb4db3fd84ae76e5dc18512d9ed614ee7652343f24d6ce40f6498e8152fb5ae6e5097668a54ab5671ca03a2a40531936dd", @ANYRES32]) [ 326.117884][T23581] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring 00:29:14 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000040)={[{@errors_remount}]}) 00:29:15 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:15 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000140)=ANY=[@ANYBLOB="6a7a75722c00000000000000000000000000dcbab551ff1c719ed5ab59bf26e6e3bbd331c9002f94b068ed50e6b3d6279f3f261cdc6f5c6ac86b4524424a4216339ac0e20e6176321b210a20bc0c048f57066f479ae24ee844bdf1fdc3750db3bfeeb553794bac0b29b8"]) 00:29:15 executing program 1: io_setup(0x2, &(0x7f00000000c0)=0x0) r1 = eventfd2(0x0, 0x0) r2 = socket$nl_sock_diag(0x10, 0x3, 0x4) io_submit(r0, 0x2000000000000057, &(0x7f0000000780)=[&(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, r2, 0x0}]) io_getevents(r0, 0x4, 0x4, &(0x7f00000002c0)=[{}, {}, {}, {}], 0x0) io_submit(r0, 0x1, &(0x7f0000002040)=[&(0x7f0000001e40)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x5, r1}]) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(r0, 0x3, &(0x7f0000000340)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x6, r3, &(0x7f0000000140)="bc931fc552440d1faa7fa0eb58ac38aa02", 0x11, 0xce}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f00000001c0)="3d17d9cc9d535a9615f35ce6d73287243a6e8b890f79461d70bff26add775421905115c8778d4554193af7188c5201c385331bf27496a5115edb6eb0e417e6d0134e183431c5ddb846033017c63850d578d9eb4444c1c7e35d154fdd1254d7ea497a6c324545cdf149c5c4d055fc8b5acf563545e778b8b7bbeba246e6d98e8cd3c4b8ffcbec88279827b09cba63a77de45c0a4bdd781ea1cd81836e6b210135453f47327140aa1b29f912650aeb6c6be345395d8319e6de2b69dd7654e38e31fbb8a36f26fb34e455af1024ada26dfb4e5d25df19485d2ffe652ce2e62f74c9417324", 0xe3, 0xfffffffffffff800, 0x0, 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x6, 0x3, 0xffffffffffffffff, &(0x7f0000000400)="22525bc4815cd9c372031ef7f1008f7aa8960144d89c4d9df1bffc975a48eabe3c883fdba5a7ca18d6845a0961add4577509895555f10caacf58aa4ebc526c3ff80a4dc9568a3ab088a3da6b2c89136ca3b52ebbc847e5fc0ed2596e79ffc963518d02f27bd9df8af2f753e6e8b4088bbe6fa3a82cbb0e282ff7286003d1b7d29fb465d709835e02dce474e5b7c53a73095d6c0ab6996ed12f8c461d2618a88249c1c1e13a7777a11db81adaa8b1fc7675af160e06add9470fcad76cce", 0xbd, 0x8, 0x0, 0x2}]) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000004c0)=ANY=[@ANYBLOB="73616c5f63f6e8c3ac73756d2c00a76343fecf58270f1d7cf9cdbc54cb76dffeaef15762c85d2ae733bd413c82c0211c2dd6dd2dcf98bc60efb0a2c200c54775c3508513858ad5432b12e13efdc45911642fd0f91c5ea0f7ebd7378103fbf4b95a0d0277"]) 00:29:15 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000280)=ANY=[@ANYBLOB="9179edfaeb82f387434a074c8a991f36066a6f75f707d3844e7862c460675ef285bdb6e24bc0726e616cf4c569c0811706833fcac213007804b4e306b7c00b3e4b2a05557c81978b017b495b3248a95f89a3fc79e86b11000000000000000000c6fa7bb1c675c8c4b2ca39bb8d1b077894cb298440f5a64858b166176eefa4e1348725753fed7c9318fa3f815f3741a73b"]) move_mount(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00', 0x14) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0xa2883, 0x20) openat(r0, &(0x7f00000001c0)='./file0\x00', 0x107500, 0x17) rmdir(&(0x7f0000000040)='./file0\x00') 00:29:15 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$nl_route(0x10, 0x3, 0x0) bind(r2, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:15 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x45db, &(0x7f00000009c0)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x389, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0a85320, &(0x7f0000000280)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:15 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000200)={[{@journal_checksum}], [{@measure}, {@subj_user={'subj_user', 0x3d, '-'}}, {@obj_role}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@permit_directio}, {@subj_role={'subj_role', 0x3d, 'journal_checksum'}}, {@hash}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) mount(&(0x7f0000000040)=@sr0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='cifs\x00', 0x1011c00, &(0x7f00000001c0)='\x00') 00:29:15 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000004900)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRES32=0x0, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2]) open(&(0x7f0000000580)='./file0\x00', 0x2, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@empty, @in6=@private0}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000400)=0xe8) r3 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x7, 0x55, &(0x7f0000000240)=[{&(0x7f0000000180)="451d3b304a893b75c5f516cc8b6dfabc0d0b117b504219f8afaff73829e3fb5b82a4c8d35a5614f2b8f887f71c559ee5c17b12b14b2f61a6514a4e37cae3c32fa07047b49fb981a4bb5afc04c8f384283ef194ea489f454520f9a6015ca5f7acb082ab528d58245e2b7780fe86df4d3e532834a2a0d6c4b4fc5a1ae1bbb7c6f10f", 0x81, 0x9}], 0x44840, &(0x7f00000005c0)=ANY=[@ANYBLOB="73686ff51711ee6c4a8d9a643d", @ANYRESHEX=r2, @ANYBLOB=',utf8=1,shortname=mixed,iocharset=koi8-ru,rodir,shortname=winnt,shortname=mixed,func=PATH_CHECK,smackfsdef=$[@[,fscontext=sysadm_u,smackfsdef=ext4\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,obj_user=,uid>', @ANYRESDEC=0x0, @ANYBLOB=',appraise,\x00']) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) openat(r3, &(0x7f0000000440)='./file0\x00', 0x80402, 0x13d) [ 327.000068][T23645] SELinux: duplicate or incompatible mount options [ 327.007612][T23649] SELinux: duplicate or incompatible mount options 00:29:15 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240), &(0x7f0000000540)=ANY=[@ANYBLOB="021f4d73fb0d38198f798cbc3a9fadef29dc60afffcab26d504a34c4c9f32d6313fd26f3d021090400000000b4"], 0x11, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) r3 = dup3(r1, r0, 0x0) r4 = epoll_create(0x5) r5 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="550000002a007f33deba2f977333bd930a0000ce01a843089100fe803900080008000000009eb43c6a95a0fb432c00000000fb83de448daa72540d8102d269c4d4133ab82286926700"/85, 0x55}], 0x1}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000500)={0x4000000b}) lsetxattr$security_ima(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300), &(0x7f0000000340)=@v1={0x2, "8c2093a117c76f2bba414a85ff3c771478de21"}, 0x14, 0x3) r6 = dup3(r4, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r2, &(0x7f0000000200)) move_mount(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', r6, &(0x7f0000000140)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000400)=ANY=[@ANYBLOB="6a7e3900000065636b73756d2c00e15df33b744bcd765a608cd739d1505e159850188339a8c243d12ae0e3160111c0a4edb1e81bc36852ed4abfd40600000063eb423c11f9cce4afa04dec8a5bc85afe4f1d42237a4808016c02e6a0be756918658b0ecfcbf29a78b16038db2bc5c6f70f0e357326a7b32e6299c6d6239b7482ac424cee50b5c55111ef1e24ea17acc13d53b7e44e8bd3ce96cec5344e01fe32a8d5af30184695af7a0f5301a37de3cf3c0184d457b3510d7664f7bca160610c0fe3ab47480e93"]) [ 327.042187][T23653] 9pnet: Insufficient options for proto=fd [ 327.049084][T23653] loop5: detected capacity change from 0 to 264192 [ 327.062926][T23653] 9pnet: Insufficient options for proto=fd 00:29:15 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400000000, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB='jour\x00\x00\x00\x00\x00\x00\x00\x00ksum,\x00']) 00:29:15 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@md0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x8000, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 327.300184][T23676] configfs: Unknown parameter 'journal_checksum' [ 327.316651][T23676] configfs: Unknown parameter 'journal_checksum' 00:29:15 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000100)=@ethtool_per_queue_op={0x4b, 0x21}}) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:16 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:16 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x80, &(0x7f0000000140)) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000040)={[{@errors_remount}]}) 00:29:16 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000140)='./file1\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:16 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x45db, &(0x7f00000009c0)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x389, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0a85320, &(0x7f0000000280)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:16 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x44000, &(0x7f0000000040)={[{@nodelalloc}, {@user_xattr}], [{@dont_measure}]}) 00:29:16 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$nl_route(0x10, 0x3, 0x0) bind(r2, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:16 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000180), r0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wpan1\x00'}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wpan1\x00', 0x0}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000440)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_SET_LBT_MODE(r3, &(0x7f0000000500)={&(0x7f0000000400), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x2c, 0x0, 0x400, 0x70bd27, 0x25dfdbff, {}, [@NL802154_ATTR_LBT_MODE={0x5}, @NL802154_ATTR_LBT_MODE={0x5, 0x13, 0x1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x400c840) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000680)={0x264, 0x0, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_DEVKEY={0xdc, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEVKEY_ATTR_ID={0x84, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x3}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x3c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0x5550}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x1}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa1}]}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x30, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0002}}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa0}, @NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0x555f}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x1}]}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x9}]}, @NL802154_DEVKEY_ATTR_ID={0x2c, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0xb72f}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}]}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0302}}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0xff}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x101}]}, @NL802154_ATTR_SEC_DEVKEY={0x13c, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_ID={0x70, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x1}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0xe00}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x14, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0x555d}]}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x84}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0xffffffff}, @NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x2}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x14, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa1}]}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x2}]}, @NL802154_DEVKEY_ATTR_ID={0x48, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x2}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0xb3}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x20, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x2}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0302}}]}, @NL802154_KEY_ID_ATTR_INDEX={0x5}]}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0xf}, @NL802154_DEVKEY_ATTR_ID={0x78, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0xfffffffffffffff9}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x332}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x5c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0102}}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0302}}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xffff}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xffff}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xfffc}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}]}]}]}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x264}}, 0x24040844) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000900)={0x3a8, 0x0, 0x8, 0x70bd29, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0xc0, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7adf}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x329734c5}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6859}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x521bb1a3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd586}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x59934715}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe3c9}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5b4a}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7582eef0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaad5}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf1bb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x33cb0ab9}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x43f4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x77e3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xe41e50a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x170b6d94}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x76c51e0f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1aa1}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8ad8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1de20500}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7fbf0fd4}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}, {0x5, 0x3, 0x2}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x110, 0x8, 0x0, 0x1, [{0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x94}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x44}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4b619128}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xb04d462}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xed}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6a84dc86}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x593e3375}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xde}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcf}]}, {0x54, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x84}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5920530a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x67924cdd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x22}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xdc2d447}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3cc2f614}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4910deab}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x465b12c9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x672aa9eb}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xba}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x61c0ee41}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x75}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4e543fc8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1f49b23d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x624d932}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xa650dcb}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xc9056a5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x160, 0x8, 0x0, 0x1, [{0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x209c9cd1}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4438a938}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x23aece88}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1bc7a609}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x68483912}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x228f36ef}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe4}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x68}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xff}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x50}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbf}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa0}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x91}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x43}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x77}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3118f669}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4e6cfa64}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7ccb8369}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xdebf930}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1796b15}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x275b3635}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3365191b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa0}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2495905f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x121126cb}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x50}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x47}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x50355b4c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x540300c2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x71}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d3f2c18}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2a}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x50, 0xc, 0x0, 0x1, [{0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x219a73a0}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x11c62949}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2df7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x63116d6c}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1850}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x131ed20c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xbd862d7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc973}]}]}]}, 0x3a8}, 0x1, 0x0, 0x0, 0x40}, 0x24044045) 00:29:16 executing program 5: mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) chroot(&(0x7f0000000000)='./file0\x00') statfs(&(0x7f0000000100)='./file0/file0\x00', &(0x7f00000001c0)=""/16) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x400a, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000200)='./file0/file0\x00', 0x0, 0x40, 0x0, 0x81007, &(0x7f0000000140)={[{@nogrpid}], [{@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffffc}}, {@permit_directio}]}) 00:29:16 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x480400, 0x44) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2130029, &(0x7f0000000140)=ANY=[@ANYRESHEX=r0]) 00:29:16 executing program 4: ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:16 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:16 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000140)=ANY=[@ANYBLOB="0000737667726f7d7073b55efb9b726e0255dcd07a7c73aade00000000000000000000000000bc024420c97fff61a4227fbdd116f5a5ce7cead74d64219f0d79a29437c4ca347e71eb0751ad493be3c74cd50068b41c464b4844f6e5e6e8c61e5fe91df6e5acb49b4e304fbdf7709fbbbdce33c57034fb9e0b4a551e8a270118fc09c2612d848acb614a0f5cf83d73b34f31516723b54270"]) 00:29:17 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:17 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000180), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000180), r1) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000480), r2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010625270cd4ddeeef"], 0x38}}, 0x0) sendmsg$IEEE802154_START_REQ(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0001a7c86827bd7000fddbdf000005001b0004000000050018000600000006000a000000000005001d0012000000b385fd8b7f00"/65], 0x44}, 0x1, 0x0, 0x0, 0x20002881}, 0x8000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, 0x0, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048801) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000180), r6) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x1) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:29:17 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x200a02, 0x8e) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="210000001e00010a"], 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000003680)=ANY=[@ANYBLOB="02db5e6f62115b0950571226322b3a5e31d3a2414621f42ea1c3dd2c94a368e2367f5e4f002be5fabc42229779b169de57e1800ecd8f380be66d8582090373f5c56cbd6c4af13e9e4da442cb6755a8ffae4cb6867fb4c89b3956ceec97b1f9afd5b0ff0e"], 0xfffffc7b) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000000)={0x4001}, 0x10) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/159, 0x9f) mmap(&(0x7f0000ff8000/0x5000)=nil, 0x5000, 0x4, 0x4000010, 0xffffffffffffffff, 0x40532000) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000180)='./file0\x00', 0x92, 0x7, &(0x7f0000003500)=[{&(0x7f00000001c0)="49f2682ca3bd447a9384b571f9126049c7ccebdd917722f6f30411eea427118eeafb76174f2c781e6eaaeccf20d43660679513ba5ede6ae953385135fe515c96b19aaf7a0dd15b1e7f3099f3836740a8e485660755aeb4e9849f4762dbb3d8821a7b06fcecc573d8773365dc50eadb70ef2e5be6988bd3fb9aeb5e362c5d42acc788ee95465e8490", 0x88, 0x8}, {&(0x7f0000000400)="96c0e2ac092a26b7c15b74c26fabadff8f489f3536aef2a0939f71d12ad8782d8b47bcff0b2b66201a1d3ffee8269606b5c89767e31cf64472a2b313d3d1cb13b4461dc9cf0a476b199f82be5f0ab9eb7e30cda9a723d8713271f61669220766a81b49d4ebe6a911d5fd8071af0b5db5d40450bd761deac8738c01e92211922b3b0db4c1b05f56fcfc5879cd38ac7ff386e843f8edbd0fd74b7366aeef1ae0d30168ee6bcd6629fdcdfa3f2514acab261169575b71a769e4e67a1c352f48dbf2f2b9c98220073afa3fe7b8e9a2ca7a51d251de31d849b9ed4aa587e3682c5bb33a273cfac4cd02ba19a6f31d3d29b40b7a7e68d1ef275c56077a0bd66587daa77d8f8fd5c496af13a0d6ad528dcbd1742f5cde419526210c6475f7c2f2bf682feecfc65bedb8c278a78fd206c6224817e84915f0c47b5f62bf2668951c724d981eb2d25ac811a0810fd3edc370cc0f3fc703786f31f3bf89db6d815123e7d125ecb4fe43bdf1b6bcc4bebb6cf689c9c8fead8dac0e621322e97d5a4c1122136127fe82672f6a5dcc7b6e2dc5f48b22e116f9a698fc548858ae2487e52a4171db17d89b9f63ed62e649d91fa952e9a5bd77dc19295c28b0f7887de4121714b8220f00ae3529cf94170988aadb1bf3c1643be421f526dd4bb48dc49d29e2b42ac3199e3dbbc3506cb0e04eb675888f3dea9d359d534af1462029c492c33d116015731091232fcd9246a93fcc40d5b7e37058183e09e395f2ce93d16fa0d6f50c7a58b5c3e59743da0a9104bd5a9ea697eb4a69d6c347b22c9aefdaf5ae57b1fdb90617a4fc88504e5bfcaa859ec17ab4f95fa7a168a1279530e31a1cc1aefd13a5ffa9af819a57aa80e5502ff1fcd1e7606e8be934f2af92495c3590e6456fb7550fbaad99d875832d40297b4273a828c929bf65658425aecf6e2f810096c09fd62834c375a243c0a1f831e2e7f0e42def0ce58142c33b5f955840f088cc5a4f4dd8c0b00510063986f508ef931d75ca8c2660be2553139807a40b71cdedae1ffc71f0a6d2547cda480d0792d6d662a7b1ac5c972a79d228b82446fda59069633e528ca06bba73ef131b68e9a76fe837727fca6b03ca99b278c0c675fc89b1aad52a219a5e111d9032b54bbb126a5046decb36e69c2f503125af18e72586fa59d11287639a904a6c4641e3f732d70cbc78376fe89424e5a655d50780ea259b213288ee7d65fe503a3607906daa8d7f714302deeb45a8bb640ff5dd1322b06501d53035e6d6edb42839d92e3c57088d86a09e25ab711437d84254a8be97b5c040477cfb192e7724a7bea25bf2f1cda6ff66daa0a3f46961cd9c0e798206cec10919a40a293f3479f8235313ace61295234efb656dbf68232823034f5501b531d6f18aa9c8ed8fb0df1375d1d066580f9035f51788a227dcd4896c95ecbd17473ebf8947fbfa17dbb8719143f0508e3626da1b6cb6fc936a6b7791ff7a01bb270a47732e0094d25eb1bb006aa191f04a15e5ba4b16c03c5dd21ef653759ec79513607d08f1a9ec9b011174658d70b5c4e4f707b0dbae8cd76b950ad4a6344338223089c8921861b62b5095a24856a2090c794ac7f860fbf11ece087731439f99f9c9f8c5c4828982c5f513b337b2c848504b3f06f82e891a4f1714cedc930806478db7432233c16392d4ecd94780126abaa0ee1e63bb560d558ad8bf1da0efe14bff108a213d4c14e2b3ed3e6b7fd7b62178a58d3f1befc6c35558e4faf155caeb3209a8fe4535eb51684c7f92c8a9defa00b1f00f4c133e804e42f6d26726f8e6b869b88d2ae6e77ecdba4f7ddca145374aa50b8abf36767010b181ccbcaade83fe9acb71c603cdf160808092977685b431a7315353a86a6555c672388e3f0f4686d6601e6b3d17a5e02589294b006f46c0bd14336a7b15532558710b1ed918023683a71b95217beb86fef37b151d7baaa1faf4cb5db1142feb160b9ed1074cdf369ae526097d8b23d419c3899c93e678c5ffdf62f3d3baa8750dfbd8bdac221a62d2a3a18978f66091fb0c01b4a0c57f7efca0d7461968b968db6dc46d1c339c438e6b83620b90445c1a466aaa2060244dddfbcfcaf9b023d89000601ce5d88c52ad8b642cd017009d84943b027fdc6a8a58b41a137c0e2ea5110b164789e92577fbca1e8671bafc23a935e89f0e265ec1590dadf78cb3838c473d554c9eab5edb54ce4bbe382e99c4245e68df52cd2c7f64088bdae92bf0f4b0d68148c84d773fda6f1fe304887eda2797d8919ecf443c9e5e02454812a01276124641923f2fd007b90f4a463486e56949c19a5400f31da33aa4af008df37c8578f5363d28c21ed0fa899dbb63cf3056b89c8e1c1c329982b0a563674fa919278e615131a746f5cef1884f8fd4cc1cdb9b6b8e8190192112ad512e60e38b6a66a14044edc2f508468fb839fc44b84f0a24c3667628ace60b87cc7f542a5f4dd44b8909431a291d13a17d594dbea5378bc7b329643524cb58a5b9ed46202f156c61284309c66922cd7ae8dc770fe21a7f588b29b2438914955f857593c744d5e2c6d6d78159256e4b7b4bf90b6e6771cbb2bd2d02c023046894ea3a85fc84f2a81e4fbea93d003527634dc1c53b943c73439f2a27c34d282feabc322184d6c0d1f9ffff898588aef52c89e92dc6df5a61f3efe886ca89d4dc917845c1b745376735066c78d8fe8de91500a77cf1ed74fc180f6bbcf15a6950244e310821b996a28e46db9d63a308f9a01ce37a0c30cfa250d962c07867040a015c0464e2fa248ee6b945a784c79dc92e4372a94b698a5ee1b75ebf9864effd12ec6a4d2c30cf5aa9f5cab2555f47cc3291490b77fe78105ee71df0bbe029fc75955113f534b23264855f4b7f98f66ef92f32e3a7b12a216d16c909894566c2a5c001443078be8843c5a75c4e87188019c29106d8245f1b4d70f638a5a7036a1b4544aa2f46f7712ccea2058e12d18fcdc0bb5286990887e321cf9a14c759ea4176cacff3e0a5488a8b28144d3a49f34e702ded1ea780f6ba990d25e846e1bca323159db1532697b73f8d94e5a5dea32750b1735a7b6a95cf14583aa557639675efead36ce69d4a7e61d8b8333034d96f0753ba86fce02e7b20e5abe29f4166fce664f51a1fa6e1e9916ca1ef486fbd194ca339eac8636e50800e459aa26ad86edd43ff9dc8ef025318f48682b634ea86b0a8ce1d5c8687f73811e7e5efe1f77295f899b591260772af19c437b1ae1b84c42426e0120f4e9ef207f065a1aba4bf278f156f1117cc61b2038bfe918cf57bdebd46fd8083e24caa3ccf0935929f4c9916bb6525f8aaa556b41162c3baa4e87592034f66d1bf255533d8295a6a7649ba07db829b0569af272b96043695d3d21deedab20e5ffed3b33d6c9e62d0a879c304f432f48a46cc921b674b57925c079c2e8404221fd954e4414db7e90e728e62d5adf84c2489e58ebe963bdb7fc6e337b52568a95ae1e9a9889b065b601e96a229d79046cdda2e7ba96a3391956df0e5132bd5758099d0d118362bc42500355e0d5a7f222f9874bcf9e743288c80d8155934ed11c40811bed4e6e0ec065839b8b8c987b3ff15ced3d5748aede98214550f05c9843377e1d56f912c3bbcb0778929072005a0f607e39a8bb7036bd9e732d1db7ff96ff983c0729bf0ee8e9ee2e52ce977ccdb2cd8165d922f5001c43096a48dbadd365692c24770f18bbf3039398887370298354484a1b27120c864a67c9eae8dacbc737f7930b4db6bf93a94d4621e527097a3c47a108bf3b7e2e96b0ac9dc18910fd7b7c3cac00e4ec1aea14b465dcafc944ba7f7ead0608879db3349b45c4700d408aab529d25d94c5c13dae06a9060df1e46c11bed6d64f4eae8fc38f477f103c88743ba092b0144d38900582c47efc0c38d95e65fddb0a684c50e6d268d6e9b8ffadccf79e3fa6be016fc3e9c61b8b5b436aea77081715c576608c723ec668e27b36b37eb814cc54e568784b2a2470661d094d775fda9bf8d5fd1bc213cf8373f0761628342e22dbd9b72b326fa36ffbc2127847f45224d8154e8bb34946fd53d264eafe4281114873592930591ee1e5a805ab877e21a0a744f55e5f6999465036284b7407541cc5888c35910dc0a5791e2583042f4567607419511a5f9ed653e34d014a19c186572f8281c62e01113cb52e6bd42c84c9f3a923334e96c49cbbb9a1dacf142acbffc3963b2436f74d6a832fd54b2d09f26898df2b88b8b7660cc498a97e5c38a6f7c77293b8c23c0a57091a8fa3ece9437154d5bf8a87e69dd5611d1aab1de6ea7df6af2694cbb5fa729d8d6b63337abe6da23924e95170756c45ecf3867d6477345b188a640385934210f6df1db24aaa3944cb7ba3209fa40a37ee2184a323ff9c2d340b754136fe1ce7ac70fd6c5dbaa2b4ee1160208068780d81e75f27e0597d12cd07553bfd461321a63a5f882f6a935cc9692efade5258c67e753db3b9dd501fcd1e657f6e393c581ac2d72c0bbff6adba5e1111072f9efddf971ff51dd406435a453b912c79022cfaaa937969c34a88c6260f810c3767cf7775dbc5b843f92ce3abbb85995cd2003d438d4035f32fa53f34e9b2e3b4c0e9fd60892698032dfc6c414adb294f0ad13fa93571141b9062d23b70d1534ce10ecce450b13aabf112a01b1c55837ae97d5907eb0ca660c5b13f6482dbcb89021d52b63ec0c73f80aa503fcdf05f615ad856aac95ccdb226c41fa8d2e414c21cb64c9772cec797e2ca4a4e40221cacdde395541f60ad8c4cec1407744b2beefec9b4a40e3c131bbc1278d8d77babdcace2f8f9ef763da6cfde9f40451ba3e0c149d424f373548450fcd41494526a45706214f5d4174fb2b34e3a90323403e129b36e43f7054fe698add8edceb58002f2b076268b711af6ea54ce0e8f828f7f4c6716f8ec158ab136a4b1f6802e62f1e06c7afef4fd665f88ef8a421454cce993fb4cb24ae15dfa7bbcdbd142aa575cd3e56d028fcf8ef978464e87a1e8b17d3257d28ac2f6f76b4a12e4996a72e29001107aa011d47a2d541446eeb2e0f13e338a57281b16d7a6235cec649a7a28360d32f29ee348b330d85fd5d9f885566b26f382d5070103c47a9858d86a0eee6bcb3646ef835b1138ecb889d4d526c0f20efafe4172064a2b82fb13a8d229469d8c8b3517d789fb80bef536612947f1182298d57e7753ee7202e7680343cbafe6f0b729f2d73d1e8ec81c78783434f7747c5e849898f816ebdfe759afd269331fc9d6236caf54c0f29b87be390d4f1ef9107497d54e6cca9808b85b24498dc8a3a1f2a275811c801e0dff0edff05f80bbb75fe1b8b2addab67e550df0c2838e0842aebd23df55a053a7351bede249daf559b27d8cf7ada4943dd38c8a19cd62b4a92c0266032cb942f41039f31a76aa495f78855666c918745a37c001734b3dc43f71cde4695009074c6290d6167e2fe9200a927cc57c4ce12c45a11fb422d4603d669cb7461c1d93274dd3c8a9be5ad07a981a96a1be06024a8cd4a62959a0a96f6701e94d196610dcc15f95849eb348bbdf4174d89fc87b2b0e35045189a94bf178439fdb44061437218f3ae8588dcb9d3d4f9cc19ed50158136ab89a51e0d45712b3a3f8468463d8f3eecdfbfd5731e97d7b32a9c3707d04135f96b4b82bcadb086d874c8b129a76a7f8a13fed6d8aed761796e9d5a0d11ae214a2325ba5f01dcb55b6cf015f8e05b8e64024c664b8bcb1f1b5292e3c38018023e9a2634ccca6cfd809fd11a38ee9", 0x1000, 0x49bae6f6}, {&(0x7f0000001400)="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", 0x1000, 0x80008000000}, {&(0x7f0000000280)="e18084857eb6397395d0a33a722901ad1093af041e1434d7c9b88b9d1b868887440689e1ebcf63dd43acdaef4a84878d67e5c355e17400873c89a3b3036eb23a6080fe18d15d2fc4aafb5b8376a8267fcace06dbd470f4a613c6116e6df52689d5781fd5fad41cd1d41b74583fb2593e06282bb23e2e5b52821bf5593645b00030180650c50ffec864baeae14b8ea791103a55c8b3cb5cb753cfec414345e42d", 0xa0, 0x6}, {&(0x7f0000002400)="ad390ab73a9775ba261b51c12c79779c5604dfd8a53ec70463e4bf1f9125c64d747d47000d004fef357346938760f2335db739a5bd6f692b12eed1a0333d7876e90f20a96b63e56dfb1b2cdf9c0d5913350cbb3dd4b6dfef1263b1c8f250dbdc18b8517ed97e579c5c72b4751b2716ef7305", 0x72, 0xfffffffffffffffb}, {&(0x7f0000002480)="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", 0x1000, 0x4}, {&(0x7f0000003480)="9a98569d69c3e7c8a59ffa9550712b795872bb2c8f09614c5a4e8ddecb677c7c0ef5af191bceb17a0d9b8f81710bf74e8a0eea3a43cff9ef5a81c6d7c4f84ba1ab5ed3345a7bc3282a2572b7493546ceffbf90234acdca7c89abfe4f49ed87c45941951055bcdf0ea379a8ded58e22", 0x6f, 0x1}], 0x1000000, &(0x7f00000035c0)=ANY=[@ANYBLOB='map=normal,map=acorn,appraise,permit_direcjio,subj_type=data=ordered,context=system_u,smackfstransmute=,euid=', @ANYRESDEC=0xee00, @ANYBLOB=',contexw=system_u,\x00']) 00:29:17 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000001cc0), 0xc201, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000001c40)) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1005028, &(0x7f0000000040)=ANY=[@ANYBLOB="6a6f75726e616c5f636885636b73756d0204006f7461286925d5dd6f69746162a6681bdd"]) openat(r0, &(0x7f0000001b00)='./file0\x00', 0x109241, 0x82) clock_gettime(0x0, &(0x7f0000001bc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b40)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/6, 0x6}, {&(0x7f0000000140)=""/21, 0x15}, {&(0x7f0000000180)=""/101, 0x65}, {&(0x7f0000000200)=""/130, 0x82}, {&(0x7f00000002c0)=""/143, 0x8f}, {&(0x7f0000000400)}, {&(0x7f0000000440)=""/85, 0x55}, {&(0x7f00000004c0)=""/223, 0xdf}, {&(0x7f00000005c0)=""/69, 0x45}, {&(0x7f0000000640)=""/116, 0x74}], 0xa, &(0x7f0000000780)=""/77, 0x4d}, 0x6cd5}, {{&(0x7f0000000800)=@isdn, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000880)=""/165, 0xa5}, {&(0x7f0000000940)=""/109, 0x6d}, {&(0x7f00000009c0)=""/13, 0xd}, {&(0x7f0000000a00)=""/78, 0x4e}, {&(0x7f0000000a80)=""/4096, 0x1000}], 0x5, &(0x7f0000001b00)}, 0x3}], 0x2, 0xc0010140, &(0x7f0000001c00)={r1, r2+10000000}) 00:29:17 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x45db, &(0x7f00000009c0)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x389, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0a85320, &(0x7f0000000280)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:17 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$nl_route(0x10, 0x3, 0x0) bind(r2, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:17 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) creat(&(0x7f0000000340)='./file2\x00', 0x196) socket$unix(0x1, 0x5, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="550000002a007f33deba2f977333bd930a0000ce01a843089100fe803900080008000000009eb43c6a95a0fb432c00000000fb83de448daa72540d8102d269c4d4133ab82286926700"/85, 0x55}], 0x1}, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000280)={'trans=unix,', {[{@version_u}], [{@euid_eq={'euid', 0x3d, r0}}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@subj_role={'subj_role', 0x3d, '%\'&-\xbb/**!-/+](#'}}, {@euid_gt={'euid>', 0xee00}}, {@permit_directio}]}}) r3 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="550000002a007f33deba2f977333bd930a0000ce01a843089100fe803900080008000000009eb43c6a95a0fb432c00000000fb83de448daa72540d8102d269c4d4133ab82286926700"/85, 0x55}], 0x1}, 0x0) write$binfmt_elf64(r3, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0xff, 0xd7, 0x5, 0x6, 0x2, 0x2, 0x3, 0x5, 0x214, 0x40, 0xaf, 0xb3d, 0xfffc, 0x38, 0x1, 0xffd8, 0xb034, 0xd2d}, [{0x6, 0x6, 0x5, 0x0, 0x6, 0x80, 0xffffffffffffffff}], "596e3cbfc4a0ecf7de4db901ea47a30faa7df48efbab8f3ef021d58b245a019975f85389374908bd52be53bc5a49540becbb88a2bfe7334f7846618f201147359dea8b2f7d61c7b70f5f05833e95e4530a2ff2000eda3b43187878d694393d0277a34ae5f2b9935aba08", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5e2) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1a14000, &(0x7f0000000040)={[{@commit={'commit', 0x3d, 0x5}}]}) 00:29:17 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:17 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) dup3(r1, r0, 0x0) r3 = epoll_create(0x5) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000200)) move_mount(r4, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:17 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) dup3(r1, r0, 0x0) r3 = epoll_create(0x5) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000200)) openat(r4, &(0x7f0000000140)='./file0\x00', 0x6480, 0x0) 00:29:17 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x10020, &(0x7f0000000000)=ANY=[@ANYBLOB='journal_cHum,\x00']) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$tmpfs(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140), 0x80, &(0x7f0000000400)={[{@nr_inodes={'nr_inodes', 0x3d, [0x0, 0x31, 0x25]}}, {@mode={'mode', 0x3d, 0x9ff}}, {@huge_always}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@obj_role={'obj_role', 0x3d, ').#%'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@dont_hash}, {@dont_measure}, {@obj_role={'obj_role', 0x3d, 'ext4\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'ext4\x00'}}, {@uid_lt}]}) 00:29:17 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x20502c, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x804c, &(0x7f0000000280)={'trans=unix,', {[{@nodevmap}, {@access_any}, {@access_user}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000002c0)=ANY=[@ANYBLOB="6a6f75726e616c6e299885aa957890327579e317249384a1d3a3c75f636865636b73756d2ccd"]) [ 328.976126][T23811] 9pnet: p9_fd_create_unix (23811): problem connecting socket: ./file0: -111 [ 328.986110][T23811] 9pnet: p9_fd_create_unix (23811): problem connecting socket: ./file0: -111 00:29:18 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:18 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25f5, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:18 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0xa1049, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB='bol_checksum,\x00\x00\x00\x00\x00']) 00:29:18 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f0000000140)=@can, &(0x7f0000000040)=0x80, 0x80c00) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB="7398737667726f7570732c6a6f75576e616c5f636865636b73756d2c00"]) mount(&(0x7f00000002c0)=ANY=[@ANYRESDEC=0x0], &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='qnx6\x00', 0x800, &(0x7f0000000280)='eXt4\x00') 00:29:18 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x45db, &(0x7f00000009c0)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x389, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0a85320, &(0x7f0000000280)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:18 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$nl_route(0x10, 0x3, 0x0) bind(r2, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:18 executing program 5: ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280), 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount(&(0x7f0000000140)=@nullb, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='nfs\x00', 0x20c0000, &(0x7f0000000240)='#\x00') ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r2 = syz_open_pts(r1, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000080)) dup3(r2, r1, 0x0) r4 = epoll_create(0x5) syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), r0) r5 = dup3(r4, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r3, &(0x7f0000000200)) ioctl$SNDRV_TIMER_IOCTL_START(r5, 0x54a0) syz_mount_image$ext4(&(0x7f0000000300)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x876020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:18 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="550000002a007f33deba2f977333bd930a0000ce01a843089100fe803900080008000000009eb43c6a95a0fb432c00000000fb83de448daa72540d8102d269c4d4133ab82286926700"/85, 0x55}], 0x1}, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000140)=@generic={0x1, 0x1ff, 0x3}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:18 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x3) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="550000002a007f33deba2f977333bd930a0000ce01a843089100fe803900080008000000009eb43c6a95a0fb432c00000000fb83de448daa72540d8102d269c4d4133ab82286926700"/85, 0x55}], 0x1}, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000400)="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", 0x1000, 0x20008000, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @local}, 0x4, 0x2, 0x3, 0x2}}, 0x80) 00:29:18 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) setxattr$incfs_id(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)={'0000000000000000000000000000000', 0x30}, 0x20, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:18 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x1c0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:18 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001c80)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/92, 0x5c}, {&(0x7f0000000240)=""/41, 0x29}, {&(0x7f0000000280)=""/64, 0x40}, {&(0x7f0000000400)=""/255, 0xff}], 0x4, &(0x7f0000000500)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x98}}, {{&(0x7f0000000300)=@abs, 0x6e, &(0x7f00000018c0)=[{&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/192, 0xc0}, {&(0x7f0000001680)=""/143, 0x8f}, {&(0x7f0000001740)=""/160, 0xa0}, {&(0x7f0000001800)=""/153, 0x99}], 0x5, &(0x7f0000001940)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}}, {{&(0x7f00000019c0), 0x6e, &(0x7f0000001b80)=[{&(0x7f0000001a40)=""/163, 0xa3}, {&(0x7f0000001b00)=""/64, 0x40}, {&(0x7f0000001b40)=""/56, 0x38}], 0x3, &(0x7f0000001bc0)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb0}}], 0x3, 0x2000, &(0x7f0000001d40)) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x1000000, &(0x7f0000001d80)={'trans=unix,', {[{@cachetag={'cachetag', 0x3d, 'ext4\x00'}}, {@version_9p2000}, {@access_client}, {@privport}], [{@uid_eq}, {@uid_lt={'uid<', r0}}]}}) [ 329.872867][T23869] 9pnet: p9_fd_create_unix (23869): problem connecting socket: ./file0: -111 [ 329.888781][T23871] 9pnet: p9_fd_create_unix (23871): problem connecting socket: ./file0: -111 00:29:19 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:19 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x2000, 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@random={'trusted.', '\'^\x00'}) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xc1, 0x0, 0x0, 0x1292058, &(0x7f0000000000)={[{@nobh}], [{@obj_type={'obj_type', 0x3d, 'ext2\x00'}}, {@fsname={'fsname', 0x3d, '\''}}]}) 00:29:19 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x42240, 0xd) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:19 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xad) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:19 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x45db, &(0x7f00000009c0)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x389, @time}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:19 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$nl_route(0x10, 0x3, 0x0) bind(r2, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:19 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1a020, &(0x7f0000000140)=ANY=[@ANYRES32=0x0]) 00:29:19 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r2 = syz_open_pts(r1, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000080)) dup3(r2, r1, 0x0) r4 = epoll_create(0x5) r5 = dup3(r4, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r3, &(0x7f0000000200)) move_mount(r5, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00', 0x2) 00:29:19 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x104) mount(&(0x7f0000004040)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000004080)='./file0/file0\x00', &(0x7f00000040c0)='exfat\x00', 0x1047, &(0x7f0000004100)='\xdd$%,*\xd6\x00') r1 = socket$inet6(0x10, 0x2, 0x9) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="550000002a007f33deba2f977333bd930a0000ce01a843089100fe803900080008000000009eb43c6a95a0fb432c00000000fb83de448daa72540d8102d269c4d4133ab82286926700"/85, 0x55}], 0x1}, 0x0) mount(&(0x7f0000001500)=ANY=[@ANYBLOB="2f6465762f187c8668676c"], &(0x7f0000001540)='./file0/file0\x00', &(0x7f0000001580)='pstore\x00', 0x0, &(0x7f00000015c0)='%-\x00') readlink(&(0x7f0000001400)='./file0\x00', &(0x7f0000001440)=""/162, 0xa2) preadv(r1, &(0x7f0000000300)=[{&(0x7f0000000140)=""/74, 0x4a}, {&(0x7f00000001c0)=""/139, 0x8b}, {&(0x7f0000000280)=""/3, 0x3}, {&(0x7f00000002c0)=""/58, 0x3a}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x5, 0x1ff, 0x9f1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001600)={{{@in=@loopback, @in6=@mcast2, 0x4e20, 0x0, 0x4e23, 0x5, 0x2, 0x80, 0x80, 0x8, 0x0, 0xffffffffffffffff}, {0x1, 0x8, 0x2, 0x3, 0x1, 0x2, 0xffff, 0x5}, {0xfffffffffffffbff, 0x200, 0x1, 0x6}, 0x9, 0x0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4d4, 0x33}, 0x2, @in6=@local, 0x3503, 0x1, 0x3, 0x6, 0x6, 0x3, 0x80}}, 0xe8) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x101088, 0x0) pipe2(&(0x7f0000001700)={0xffffffffffffffff}, 0x800) sendmsg(r2, &(0x7f0000004000)={&(0x7f0000001740)=@vsock={0x28, 0x0, 0xffffffff, @hyper}, 0x80, &(0x7f0000001c80)=[{&(0x7f00000017c0)="60054893cb14220f89ff2c0ad1f627245f6dd8035f2a08ac29a6c17074217aa0f102fcd778aff6bb6209529a25369fb2f79d86bd7e75e19002b025c9ec7f6e0a0c3308c01b18ae4306a7ff34cd6327076ea4746ef1797e69d58c6d3d491e5e757f4bdb748afd5a9452c002924b68ec6775ccad9548660ba3c4c9d75607c04df4e947f3594554554a187ec4898ace2f82777292b881f54884a35f85450358bbb147c15d608d7c2deb398ef00f021302014e0d", 0xb2}, {&(0x7f0000001880)="20ed71176afdbe532bb0b31bf736b0c1c235ee0aedd627940ec4eb851b433cd7317ec334599ee98ffb424c2cd65bf54f9e336b4605f327225f1bfe3adfdc931b08c90432e8d46fa8cedf2ef925507a3c0229a03aba0aa7d9679900224b13896eb869172fa866a596ebc7bd7249370ceb88cd035552d170776cff54f7e4583d7538121aeab08369c352742f86c59bc614572caa6674122eb64fbdfacc8375818e34dc94511e", 0xa5}, {&(0x7f0000001940)="b48f5fac5d209f326ba13cae7f5cf4e493e33ff2fa068d9683296e68b1e6cc2797c0aa3e9f35ee080af47ececab34325eaaf4c87057f9ab6082370862f0d83", 0x3f}, {&(0x7f0000001980)="ed1b5c647405a5ca743bf62c", 0xc}, {&(0x7f00000019c0)="6c5c1f7d6a7457c30c12b97ea4b7ba32f7b06cae5b0658b88bd60c26f0438838f7c8fb98f11b5f3051f8d620a7a6789cfdae61c3d146287036ab1849332352218b60654d76a26573267b674da26183542288bc89b5c98fc4b730b0a2270d48050625cb55ebe7c76d9415c11af9f950fe1bfbed56902ca655b7d189e8caf9e47036601720d1b24d88c671a62f84bee9989e37c76d39795b08c926d4a90152d4a702a3f45e519973a558304dc500f7a5e1011dff14164095b04466947e2827fa67d9eecc84607fc93b18cae270f0d1165f34d541eed27e3d8c3f8c78ba4c0b02c649b848c55db364", 0xe7}, {&(0x7f0000001ac0)="2ef393a0c393f5bb8090c59bb3654b2a178564dae7cba57b918fca55ed830e9f01a834760d385ceba8fbf2f472b2585fd2bc11ef1fa7996d7d1944a36c645c509fe37df703d62ce10feef13770b57b69779baa3274a71e7521f37b523b71f4d90b9d8f377b0ed2d322c3ae041e925e6009585da47485557195b3225bea7d35ce9aae617b38f8b9211c0105adaafc5b9e0398418d0714e9a0163192675d2418eb2b27d25af527bc63367315205180f30c769a56a61d0496d816a4015481250dfb0ea819a921b3d5fcc944d98e9c9c4693eb576cda5f3fe12369139d85f9ffc8730ffa23be12c2254b3804914c08973f6d1db4e0673d16b3", 0xf7}, {&(0x7f0000001bc0)="2c47b64fa7293dfb23105e76f6d07de38c710b9193006c41214aef808ec13ff51154cf90fa9c486d89a38f762a51d8b22efdc18ebfbc1f5d9d1909f1774ee6ae8988789b21c010b9883886e051d80db2074cad61e22a1a5327a2e2b222b4e68f88a83f94250299841e4ecf819439d2856781f705e52fd0378c691fe86bf2508c3706c72aa417dfad0f17d66c36c120f1ba7b14765342f58bf1", 0x99}], 0x7, &(0x7f0000001d00)=[{0xc0, 0x108, 0xff, "3eba2a05c34b63e877bbd794d030355f4b247b818722b0ac157b9378fb5a5a18fbdafb3f8d5261cc6e90193955be9e36b561af27d9a051b42ba0fb31b208ade450bdd87a3ace79f93f43dab0d0515cd9f4072f49223c6c09b7ded4ce08e59ca172c9ffdc4d7b99f31288507f757bd33e4ef8b7611aea2ecf7dff1763c1e1c66c38c72bf19d8dd65536a70513f68e1a7194840b6965f7d63832f838d958a22d0f2eb3783ec6b83db92cc6"}, {0xe0, 0x100, 0x5, "98999e6a656b364858101daef4ea36d76ea344ac2a3b0d8abf3d87fd5e051a75fc26c89cdb540506a5e6d705ad9aa27bd413ed4380a9b91f8977d4f09d2fbf70dab4db649426df70c6f3257282f5c0e011d0a3ab448e1a5a656ccd69ddb261487ae43fdf3bb32ccc6edbcec597c7334e54a9e55fb1330df2d905b3b7bc706050b123068427590d4e07f06cffb1ee5a6848f6a25762d69c57cfb5a0ef7258d1c21b51000c619d68f39cfc792e34ea2eecac59af8229085ec7db7e80f3488fce96b4641f9a4794ad5d7b8423ece76fac8c"}, {0x1010, 0x101, 0x4, "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"}, {0x30, 0x117, 0x0, "aaa0b9ebdf2500b657d9efa52b42b7427f7269e7f9d8de6e24b1cfc3574b"}, {0x78, 0x112, 0x0, "bfc62ccd20ad24cb4378dda06f584d9b1d7e995ef9ed2d4746c4952e392f56e5fc225214451d532837e46478759d9ff6750602c3720e76f94b444af59fe0c0e0ebce8a370f1becc07c84470019a343ac973197b51d1cadf22198cc3f5765876d1341a23a"}, {0x10, 0x9c, 0x1ff}, {0x1010, 0x3a, 0x3, "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"}, {0x88, 0x107, 0x20, "b79c4d2e5b4f7145359dca2f3d06befb6e8f1bc981c42e7715776730f8d96b3ebdc8c441747e7dda293122e29a255a6789649d472f097124ae703965f0088cf50578bfe0a2e1b7ac9c2a55944fc1690acb70193c8331e2e31f4f00ad65b1652870566246fde5b2bd3bce1648998c4cace66ff66be52154"}], 0x2300}, 0x20008085) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@noquota}]}) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000004940)={&(0x7f00000042c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000004900)={&(0x7f00000048c0)={0x1c, 0x0, 0x100, 0x70bd29, 0x25dfdbff, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004004}, 0x81) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000001180)={'sit0\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000004480)={0x54, r3, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x54}}, 0x4800) sendmsg(r2, &(0x7f00000046c0)={&(0x7f0000004140)=@ieee802154={0x24, @short={0x2, 0x1, 0xaaa2}}, 0x80, &(0x7f00000045c0)=[{&(0x7f00000041c0)="6f1982a59ca834950f9916ea68a8265dcfa764bec59065f6dd4e9c7a0691fd0f04e79061bd9e85017608fa6aab6d67c6d4f6aa4574a59f49f2a09f3624ac5d6e8c95a7c1a71cf934e1cc1dc7001fd620f524a49ce7469e73d49c5891db9f2ae461f3d71d654595b7564e203c1c131d3382bdb9b7864bacdeeeefef837ef1088f6c9512ec7bddad489b1e60773b294fc72f3fce2d78f443741985a1bfce178ea8077a4eae2fa4d16f62cdcfb73fb600ac397a6c0cdde958b90a60c632dead8b77822fdd8a1483088d64e1a340f6c238d2825c596c5acb0b408fe11bef9c3d3294f2e60eadadaa77245caeb99bda6e06e4", 0xf0}, {&(0x7f0000004400)="9ac009ce79f987c4d8a15b3c69492c906ac2d5e40a38ff0fc0cd3f5821a1a463000f68144d1469fa0d6d5a6128bb4513bff29024be7d1471d3048b54aa0b56eb9192b39423297e8fc279cebb4d42b1ea5c825a4c26a35bf854", 0x59}, {&(0x7f0000004300)="248d2bf13e5fac0da8a873d63fff364f97344762b94aae972d92c914debf9e08fe661902a3a3d9718a35f92c7f74c5e8564df8d14ea0a9399b692d7792b7165c2b9daeee76d0861164daf7c5633fe4d90b086329ae4fd7e27ca1b8492c30d4d407ee95f0e53dbe620ce98b5b88f214f5b3b556b2bb1811a0472ce027287b97d05a312edf1c821d0a63d35ee500f3c7eb5dd0cc2770ca24a68a174d721b35aba6bc8f463a0964fd0264b0bf5b7b52cea263cfae1a1942d9ce98", 0xb9}, {&(0x7f00000043c0)="847e1027baa727f3dc0a817c531bbc655150ccc757ef4f6f3f0af0dc874e6f917cc1eed0017012f3086055a5e7a41d7cd9", 0x31}, {&(0x7f0000004700)="c13879bcd0f8fd9e7926d7ae18a3fb1b87c9618abcdb5032044e37d973f7ec286632be3883e39981ffef757f2508767cff4b3f7f4581f010b2fbba9c8c3b59248d9e87633c5eef204b9918b29c53385cc356e83227ceba070b2a529d4d024bf84abbdefa89a52487ec48c3869098b6aeaad5b3d07f48fb3a62860ca4597429d3ecba3aeec8d908691687acda4de6e4c0dc91f0194d8379eb9003f32dc13a2849c8f084d037ca082b7498673550716b5e9477821417acf533c251a4db9d5c64010984d3225ad564f863986c16386c07abf5e203b30900fa4feac4e6de11f5472f6d4f0917648710b966feb8299e5b2b5f08f5d75d556da71e69b125a46e6f0373b2dd923cc278e56c9ca31af4b218383532e0d2775c3e177368139a14f80a8cef1c56344315e12ccdffb130bc88ccc89dddd8519b4f7715488ced98ca5b65857ae1a9c17c1e35420f22c9cc6a6b74a9fd6fec6162bdb49d2fd4a0a71c2983ce2a6f0209c24662a39d76398dd454b15d76f6e656893fd50b09326da5649d3bfa30af168a204fde076fca7abd2eccc3c9322d444541918788ff347ccead900b8806f6a51d78305f00"/434, 0x1b2}, {&(0x7f0000004500)="afd6d8761cd79c79a645de3ff2bdfcf86cf4e3827df79f9c199c8e736b448aa56c16e4ebaa519dc359dabd1b7b9f0f8b4780a1265d4848cc8bea973141fb9250df3ec8a4e550e145e27193846b629025f8821e53093a8b7e0a632ce2c03c4428e234571308e70765641c80a352d99c22b53e7f27604afeb0801f04a1cd023dc1ebef58727e4b43cab1b3de7f23339e405f218114b306cfdf2f82c4405752", 0x9e}], 0x6, &(0x7f0000004640)=[{0x60, 0x113, 0x101, "b4bf7019ba081164df36dac7e4625194d6fb4477ddc3a5279f4245ba80beb0f9d0d9545fc8fd2d48104da46f98791fbb3577f323cd60d82508965893708d41a2bf6c90bdaeb55d560d584b216dea27"}], 0x60}, 0x20040004) 00:29:19 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0xa8000, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x2) open(&(0x7f00000002c0)='./file0\x00', 0xc2, 0x4) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) mount(&(0x7f00000001c0)=@md0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='pstore\x00', 0x100001, &(0x7f0000000280)='journal_checksum') 00:29:19 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0xffffffffffffffe1, 0x2, &(0x7f0000000280)=[{&(0x7f00000001c0)="0ec47702c2c8a5cf24966e7e809812a08f22f8af48e68cd7573733bd99fbb526078cef1dba065404586c147d3907a8fdf909ecd288d8c5a1edc6c73cccfc9c5f1b18e8863cb3b96e8e7e450833593814222b04f2120f54357d170636773813d072e4cf0b4f04c6af3130a823", 0x6c, 0xcbf0}, {&(0x7f0000000240)="76ef1ff33dd2f48bb64c5982222e97bbc034a8163d8f39f37a8c2df4ce9e0174e789f62568aa6d", 0x27, 0xffffffff}], 0x20000, &(0x7f00000002c0)={[{@session={'session', 0x3d, 0xa}}, {@hide}, {@hide}, {@uid={'uid', 0x3d, r1}}, {@overriderock}, {@sbsector={'sbsector', 0x3d, 0x4}}, {@block={'block', 0x3d, 0xf00}}, {@map_acorn}], [{@smackfsroot={'smackfsroot', 0x3d, 'ext4\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'journal_checksum'}}]}) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) 00:29:19 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x41010, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101880, 0xc1) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000040)=ANY=[@ANYBLOB="6a6f75726e616c008a7534eb634beaf41365645a5550000000636b7c756d2c00"]) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r2 = syz_open_pts(r1, 0x0) r3 = epoll_create1(0x0) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x30) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000240)=0x1b) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000080)) dup3(r2, r1, 0x0) r5 = epoll_create(0x5) r6 = dup3(r5, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r3, &(0x7f0000000200)) r7 = epoll_create(0x5) r8 = dup3(r7, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, &(0x7f0000000300)) move_mount(r0, &(0x7f0000000280)='./file0\x00', r8, &(0x7f00000002c0)='./file0\x00', 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', r6, &(0x7f0000000180)='./file0\x00', 0x0) [ 330.735857][T23905] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=42 sclass=netlink_audit_socket pid=23905 comm=syz-executor.4 [ 330.760670][T23913] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=42 sclass=netlink_audit_socket pid=23913 comm=syz-executor.4 00:29:20 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x1800000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:20 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000000)=0x6e, 0x800) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="550000002a007f33deba2f977333bd930a0000ce01a843089100fe803900080008000000009eb43c6a95a0fb432c00000000fb83de448daa72540d8102d269c4d4133ab82286926700"/85, 0x55}], 0x1}, 0x0) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f00000001c0)) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x13, 0x0, 0x12020, &(0x7f0000000040)={[{@sysvgroups}, {@test_dummy_encryption}], [{@obj_type={'obj_type', 0x3d, 'ext2\x00'}}]}) 00:29:20 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f00000006c0)=""/107, 0x6b}], 0x1, &(0x7f0000000780)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000840), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000002800000000000000010000000130373d", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x128}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001d80)=[{&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000001a40)=""/209, 0xd1}, {&(0x7f0000001b40)=""/118, 0x76}, {&(0x7f0000001bc0)=""/236, 0xec}, {&(0x7f0000001cc0)=""/181, 0xb5}], 0x5, &(0x7f0000001e00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb8}}, {{&(0x7f0000001ec0)=@abs, 0x6e, &(0x7f00000021c0)=[{&(0x7f0000001f40)=""/232, 0xe8}, {&(0x7f0000002040)=""/65, 0x41}, {&(0x7f00000020c0)=""/225, 0xe1}], 0x3, &(0x7f0000002200)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}, {{&(0x7f0000002240)=@abs, 0x6e, &(0x7f00000027c0)=[{&(0x7f00000022c0)=""/182, 0xb6}, {&(0x7f0000002380)=""/55, 0x37}, {&(0x7f00000023c0)=""/182, 0xb6}, {&(0x7f0000002480)=""/67, 0x43}, {&(0x7f0000002500)=""/122, 0x7a}, {&(0x7f0000002580)=""/195, 0xc3}, {&(0x7f0000002680)=""/134, 0x86}, {&(0x7f0000002740)=""/121, 0x79}], 0x8, &(0x7f0000002840)=[@cred={{0x1c}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc8}}, {{&(0x7f0000002940)=@abs, 0x6e, &(0x7f0000002b40)=[{&(0x7f00000029c0)=""/196, 0xc4}, {&(0x7f0000002ac0)=""/94, 0x5e}], 0x2, &(0x7f0000002b80)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}}], 0x6, 0x1, &(0x7f0000002d40)={0x0, 0x3938700}) r2 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0/file0\x00', 0x1, 0x6, &(0x7f0000000580)=[{&(0x7f0000000180)="8ec860d1d3e6588c47b1ced77dcdfe6560af17546aa80c4cb43559b4a2a89a510180c3e65fba5bc82ef5932aa3fc8f257f8d851059fd85a20f26b95c2eabf3691dd0e8fb5c6709c628e7ff1a357454361ec18da0f2a0ed2c548bede81bdf41a63758209e07104f7213de214f3afdd5b4", 0x70, 0xfffffffffffffffe}, {&(0x7f0000000200)="ef4ec828016d42b3a36dee43513a1cb8d750ac66d7cd854110651c3c9a967b452ffb948212b998869186131c9f8ef5d0cc0b359dbf58ba07bc30e838f3e7c0d470c68307dfa5e66f7bed298c4f5b0acb065a090778d9b2b2e3f344b2a554ea", 0x5f, 0x8}, {&(0x7f0000000280)="51d6fb96e0aa0d534f3366a935a3d834dc0325c7ecca2ea5cc7b8ec163dda1a3dff0811a0554a7f16ade73661a6649069ad16684bf94ccae3d97664df60580f341d4cfb0fc34831a6350ab5fbe7884cc8b2fb51da489b3172f8bb7357bd494c449a8856d1ac1b3bb873522efb59de4e88e40ca6bdda30b08a7", 0x79, 0xfff}, {&(0x7f0000000300)="9b776a4719881510d8b25fd4f4b94e2ce13e7b1c1221d427ff276819b44e431314587e477373c374eec6c49b52cf6454d6be9d95a92b493c37a375037a4128e5bafa0e10fb5149e3938102292b032bed88013cbc56e27b", 0x57, 0x4}, {&(0x7f0000000400)="92be327753e2bd921b6b5f37aa357ad98def8e78daba115d6d2aab6146fd76b70ffee980e114e89af631b608d32ab1e8b5f37d96c170485b64bb7c99399ba86a4435ff207a771f01c37ec402c7d1378cd18fb3a028688ff8b8bd5aa30c674e23272aa53c49ecb4758b2235e96ee930eab58986c32251d574edd4bd13232f6bf9f16b3117070c8e2f18698c6578d43fb5621c81f31c28856fc4e9a267759ae39b591c092b3cb1896495ee15470cb56eba4a9106b2cbd5f025d4ca463267017c8f0b4faca425dad76de9021d92510c164373c2a09a68d844f916d39ba722f34746398125bfb9f9fdb2f1722436bdaa78cf7846", 0xf2, 0x9}, {&(0x7f0000000500)="9d6e80691d096da96346a9a044cca5558e066f1d030f62a6616deb20410106f10ab9275faba3bc8d315d7cbc2bf42d16457b58c71dcafcf91f6305bd7cab64e0262c4a8ae5e44a6e467991b360fe3d2c31c7b136f8f362720166e7596e5ee0d53445470aa7771efb4c7ddd2c77c399c3bf1864aa854101d50a1de9efef41", 0x7e, 0x2b0}], 0x400, &(0x7f0000002d80)={[{@max_batch_time={'max_batch_time', 0x3d, 0x2}}, {@noblock_validity}, {@abort}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'ext2\x00'}}, {@euid_eq={'euid', 0x3d, r0}}, {@uid_gt={'uid>', r3}}]}) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000640)=ANY=[@ANYBLOB="6a6f6337085b97f24359b12fbd1af7413421dbeec2004fb61c3e90b01971a219d4150c65f0d7bfe2063401f783c71527bde78c965ce3e0b2"]) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000040)={0x2d, 0x8, 0x3ff, "029501fcff235680031caace72619d20ad84bfadf6889ae75eda03782ca2757f4ea42de6caaf67c196037fa57d"}) 00:29:20 executing program 4: mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)={[{@max_batch_time={'max_batch_time', 0x3d, 0x9}}]}) r1 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000003000)={0x94, r5, 0x115, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_BEACON_HEAD={0x53, 0xe, {@with_ht={{{}, {0x7fff}, @device_b, @device_a, @initial, {0x5, 0x9}}, @ver_80211n={0x0, 0x4, 0x2, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1}}, 0xfffffffffffff28d, @default, 0x0, @void, @val, @void, @void, @val={0x6, 0x2}, @val={0x5, 0x3}, @val={0x25, 0x3}, @void, @val={0x3c, 0x4}, @void, @void, @val={0x71, 0x7}, @val={0x76, 0x6}}}, @NL80211_ATTR_FTM_RESPONDER={0xc, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_CIVICLOC={0x4}, @NL80211_FTM_RESP_ATTR_CIVICLOC={0x4}]}, @NL80211_ATTR_IE_PROBE_RESP={0x14, 0x7f, [@peer_mgmt={0x75, 0x6, {0x0, 0x0, @val, @void, @void}}, @erp={0x2a, 0x1}, @measure_req={0x26, 0x3}]}]}, 0x94}}, 0x0) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x28, r5, 0x200, 0x70bd2b, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x52, 0x23}}}}, [@NL80211_ATTR_KEY_DEFAULT_TYPES={0x8, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x24081}, 0x8400) setreuid(0x0, r2) r6 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r7) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000002f00), r4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000002fc0)={&(0x7f0000002600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002f80)={&(0x7f0000002f40)={0x30, r8, 0x232, 0x70bd28, 0x25dfdbfc, {{}, {}, {0x14, 0x13, @l2={'ib', 0x3a, 'team_slave_0\x00'}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0xc080) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000200)) openat(0xffffffffffffffff, &(0x7f00000030c0)='./file0\x00', 0x200002, 0x44) recvmmsg$unix(r1, &(0x7f0000002d40)=[{{&(0x7f0000000400)=@abs, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000480)=""/187, 0xbb}, {&(0x7f0000000540)=""/140, 0x8c}, {&(0x7f0000000600)=""/214, 0xd6}, {&(0x7f0000000340)=""/44, 0x2c}, {&(0x7f0000000700)=""/18, 0x12}, {&(0x7f0000000740)=""/61, 0x3d}], 0x6}}, {{&(0x7f0000000800), 0x6e, &(0x7f0000000ec0)=[{&(0x7f0000000880)=""/84, 0x54}, {&(0x7f0000000900)=""/239, 0xef}, {&(0x7f0000000a00)=""/195, 0xc3}, {&(0x7f0000000b00)=""/121, 0x79}, {&(0x7f0000000b80)=""/72, 0x48}, {&(0x7f0000000c00)=""/2, 0x2}, {&(0x7f0000000c40)=""/65, 0x41}, {&(0x7f0000000cc0)=""/211, 0xd3}, {&(0x7f0000000dc0)=""/238, 0xee}], 0x9, &(0x7f0000000f80)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x90}}, {{&(0x7f0000001040), 0x6e, &(0x7f0000001180)=[{&(0x7f00000010c0)=""/79, 0x4f}, {&(0x7f0000001140)=""/51, 0x33}], 0x2, &(0x7f00000011c0)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe0}}, {{&(0x7f00000012c0), 0x6e, &(0x7f0000002700)=[{&(0x7f0000001340)=""/44, 0x2c}, {&(0x7f0000001380)=""/40, 0x28}, {&(0x7f00000013c0)=""/188, 0xbc}, {&(0x7f0000001480)=""/75, 0x4b}, {&(0x7f0000001500)=""/243, 0xf3}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)}, {&(0x7f0000002640)=""/86, 0x56}, {&(0x7f00000026c0)=""/37, 0x25}], 0x9, &(0x7f00000027c0)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}, {{&(0x7f0000002800), 0x6e, &(0x7f0000002cc0)=[{&(0x7f0000002880)=""/206, 0xce}, {&(0x7f0000002980)=""/164, 0xa4}, {&(0x7f0000002a40)=""/225, 0xe1}, {&(0x7f0000002b40)=""/183, 0xb7}, {&(0x7f0000002c00)=""/94, 0x5e}, {&(0x7f0000002c80)=""/63, 0x3f}], 0x6}}], 0x5, 0x10000, &(0x7f0000002e80)={0x0, 0x3938700}) setsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000002ec0)={r9, r10, r3}, 0xc) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="02000000010002000000000002000300", @ANYRES32=r2, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="0200000081c600d4527142a56f0cf750c9ca9a48b4f4558a3aa46abb8b47cbd86bbe55c5440cd4c6794c4c18428cab8814d271fb51c054ce41d183f0e5e3f9026aa86418a77910326bdd818d7ff1fb8f7e59c5d36c72b62113ec97b0848f0cb567eabcc0da9500000000", @ANYRES32=r7, @ANYBLOB="040007000000000008000100", @ANYRES32=0xee00, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB="10000200000000002000010000000000"], 0x54, 0x2) [ 331.508235][T23937] EXT4-fs: 119 callbacks suppressed [ 331.508246][T23937] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 00:29:20 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x45db, &(0x7f00000009c0)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:20 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$nl_route(0x10, 0x3, 0x0) bind(r2, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:20 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x20444a2, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) setxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)={0x0, 0xfb, 0x3c, 0x1, 0x5, "7c6feea8da53a052312bfc1f9182ce86", "cd9497f81dbafd42752fe2214b9b7cbca06c7487aa4955b73bf2ace10254cc9f067bb89c211d63"}, 0x3c, 0x0) openat(r0, &(0x7f0000000140)='./file0/file0/file0\x00', 0x20400, 0x1) 00:29:20 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000004c0)=ANY=[@ANYBLOB="6a6f75726e616c5f636865636b73756d2c4b176af6e7770cdcc94ee4df43a19f0b43dfd3a0c7a5c41020d190a7ef04177f0ae8106c98cd07ae9226"]) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x20, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@access_client}, {@debug={'debug', 0x3d, 0x6}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@msize={'msize', 0x3d, 0x9}}, {@loose}, {@debug={'debug', 0x3d, 0x2}}, {@posixacl}]}}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r3 = syz_open_pts(r2, 0x0) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000080)) dup3(r3, r4, 0x0) r5 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="550000002a007f33deba2f977333bd930a0000ce01a843089100fe803900080008000000009eb43c6a95a0fb432c00000000fb83de448daa72540d8102d269c4d4133ab82286926700"/85, 0x55}], 0x1}, 0x0) writev(r5, &(0x7f00000017c0)=[{&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000001500)="a8e891188e28550c1cd93346e0412b9772271c67924c995e3bda63baa3c9aa8ef41b166a69c245450d09b9feca1be04afe17419a6222d2daa825f90261b00fa21745", 0x42}, {&(0x7f0000001580)="c4d967f8f1777835ddc64a4591135230c59b53fc143c6294fc59e64869cd16edeaff287a172a037b216704d627aa3ba76166406a4f3aefe1c151fcc2881b9d2c6b5d977559eb0d639a1c7a25a7c7b39386edd74e60857141b94e9a2ebe3f12c70377ab0e83b1aa67b6083b347057e68351cc362dcd3a76a679f6e2783644eaa0dea1256bf25e9cfca06c7ee10b4927d27a02d86f379234529559ad82b9663d627812acdab016162490f7f782a3c01eb7d45532ed5dae13b55c917577c4746f8782cdc47946e24874b7ef298a8b9482c4e4b77d359deea605b89af32e4d5b40aaefd7ae30177d0b692e8913630831f16121b19c3d518f3b62d4a21dc7c67c1f", 0xff}, {&(0x7f0000001680)="95f5de6700bbd6b77fbc964cf9afa51f75173095551879a7068aba76e5b16a5953f856ebbcb8772289dac6d048276896f4f97a99def373c41ceed574b423c21a54bc0a56a42bebd602cc465c55a0ac9424d9a25dadce19597d9b2f65678c97b51e8209063a5e8c98ea2b2f8e0ce36192d243cfcd30ecd57bf83299d9430177b4b263fa6e51fde3a7f8041056dbd90d35713e8266ec8ac2fbffde14bd8e1c666ce4f20f9a15", 0xa5}, {&(0x7f0000001740)="2a3eb0a8ba7be5c6ba3c917936f60bf34243ae734ca0f48c8991125275f0d3330f6d36f6e0ff330bd8b6a11b9da49cdb2eedfb5067b276bf716cb21c0b05e8d650fea053d6a449aafd10b98d343af331f6ec71b6d1616be874efdf4d111f88393dc542c1d9882fb281dca2b26dc7", 0x6e}], 0x5) r6 = epoll_create(0x5) r7 = dup3(r6, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r4, &(0x7f0000000200)) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x40, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_fscache}, {@cache_loose}, {@fscache}, {@access_client}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}}) 00:29:20 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x4000090) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 331.639036][T23962] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 331.676422][T23968] EXT4-fs (sda1): Unrecognized mount option "Kjöçw ÜÉNäßC¡Ÿ CßӠǥÄ ѧï 00:29:20 executing program 1: setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000040)=0x80b, 0x4) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) mount$bind(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x80000, 0x0) [ 331.676422][T23968] èl˜Í®’&" or missing value [ 331.702525][T23968] EXT4-fs (sda1): Unrecognized mount option "trans=fd" or missing value [ 331.711276][T23972] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 331.712244][T23968] 9pnet: Insufficient options for proto=fd [ 331.729476][T23972] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: none. 00:29:20 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000004900)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r3]) r4 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r5) syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x4, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="9ae3b638604ddf1ca2737b70999def923d022e7b2b7d5597f8f4cb452dc5b7c3caecca2f501268730750daeaaeb6da0c150cd7fa4b20709b013a17615747b64c99d27121b854436eaf124b4f304bf9f2b6226b891d67645fd17a77e915cf78d0770cdabdaa6d40514be7065c3f21187397cd40e57a4364f0f2f720870161280f1c410979db9bd0f200586a815c66dc1a5a2c092b4d1101c1f1b2834e5e69adefcab2fe18717b04d1554b96be698c82fcaef1d9b9e662d78a9d", 0xb9, 0x100000000}, {&(0x7f00000002c0)="cc31ab6f1c2e4cacc018369771369eaf406c0205c9cb95ce13b39e9bde9e9481a4829a85b4bd08e101ad549f836d168f50c2ac1f946c448e5f42beb745e4606e9f64ff12fa2b2d61dd4dce7a4e39981e4ef3e6e15c12bb76a53aa72c", 0x5c, 0x2}], 0x2240000, &(0x7f0000000400)={[{@session={'session', 0x3d, 0x3a}}, {@map_acorn}, {@dmode={'dmode', 0x3d, 0xc42}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x5}}, {@gid={'gid', 0x3d, r3}}, {@cruft}], [{@uid_gt={'uid>', r5}}, {@seclabel}, {@obj_type={'obj_type', 0x3d, 'ext4\x00'}}, {@appraise}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x33, 0x66, 0x63, 0x61, 0x66, 0x34, 0x61], 0x2d, [0x31, 0x66, 0x63, 0x61], 0x2d, [0x0, 0x64, 0x39, 0x61], 0x2d, [0x31, 0x37, 0x38, 0x32], 0x2d, [0x61, 0x32, 0x38, 0x65, 0x31, 0x38, 0x62, 0x64]}}}, {@dont_measure}, {@uid_gt={'uid>', 0xee00}}]}) utimes(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={{0x77359400}}) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 331.741514][T23973] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 331.750360][T23974] EXT4-fs (sda1): Unrecognized mount option "Kjöçw ÜÉNäßC¡Ÿ CßӠǥÄ ѧï [ 331.750360][T23974] èl˜Í®’&" or missing value [ 331.765365][T23978] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 331.777676][T23978] EXT4-fs (sda1): re-mounted. Opts: sysvgroups,journal_checksum,,errors=continue. Quota mode: none. 00:29:20 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rmdir(&(0x7f0000000040)='./file0\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 331.804105][T23984] loop4: detected capacity change from 0 to 264192 00:29:20 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2200000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:20 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB="09a9bb35bb63f833a20ae5310735b811c9e52315e0c62dd914231b9f7402f06eb9d34017022c4bb45fcb1c6fcc7059db4f76906ef695ba072352c11960da01e44e0da0c10f6569770f0fc2e77c31056e943d6fb68d4b43e0", @ANYRESHEX, @ANYRES32=0x0, @ANYRES16]) 00:29:20 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)) 00:29:20 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x6100, 0x100) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) setxattr$incfs_size(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)=0x1000, 0x8, 0x3) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000008c0)=ANY=[@ANYBLOB="8ca9a7fb000000000000000000000057000088e4b7548ac9d845fd1a8340c73d72750dc4e9280c42863ee25ff7a3803de900"/65]) syz_mount_image$ext4(&(0x7f00000004c0)='ext3\x00', &(0x7f0000000500)='./file2\x00', 0x7, 0x4, &(0x7f0000000780)=[{&(0x7f0000000540), 0x0, 0x9dde}, {&(0x7f0000000580)="3ca13f641eca54285185a89807eb9ff241bf8fbe91559cf5fc3e5505cf90b66d2b4433311971f687df05dbfc987a4f87f4aa60191419cb560a8ea046a6fbdc234eed253b8a77c9991220fc886d05e51d932e8e60e22742c6991d5f188d20952f002914025ad544a3c007ee28fad5aa7b84330afae4ea250d1867f7fcfd8a5f6f167b9de6d189c69e2d1b817d3b65ec16f840603081e51e72103cf6bd254c7f41fe12cfaab12dd5646b107009744c8dcef44e5770287acd4b041e4433e599f575d585bf066c24adfb4c080dabfffcbd56c3d51999", 0xd4, 0x6}, {&(0x7f0000000680)="9282dd1f4383b950e7017f6062bb2dd33dabd6d90dfb3c8d6cc45c2723cd94f2bcff2a5c6e2f76ec9e6c468039f34dd9a4af1d474706a3140e5c5e192c4082f192c971766412e72e0f59d2faa33a64b8d848425b47c99462635110578f488312226416f83c0876a80e73c2cbfc5d33b71d11854c06749c726056fc68739be9acf640c17d91065fe8f7737f8d818723529d5e0f5b7ade292beae3081c82c342bad73192860007b0941253714651c6748e2551f8995ed3", 0xb6, 0x914}, {&(0x7f0000000740)}], 0x2008020, &(0x7f0000000800)=ANY=[@ANYBLOB="6a71666d743d76667376312c6e6f64656c616c6c6f632c6a6f75726e616c5f706174683d2e2f66696c65312c6e6f75696433322c6d696e5f62617463685f74696d653d3078303030303030303030303030303130312c6a6f75726e616c5f6465763d3078303030303030303030303030303030312c6d61785f62617463685f74696d653d307830303030303030303030361c73a9fe8a93663030303030342c6f6c64616c6c6f"]) setxattr$security_capability(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440), &(0x7f0000000480)=@v1={0x1000000, [{0x0, 0x2}]}, 0xc, 0x2) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/233, 0xe9, 0x40, &(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e) 00:29:21 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x45db, &(0x7f00000009c0)) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:21 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:21 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1170000, 0x0) mount$bind(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x2, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x0, 0x0, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="00007376677208006561645f6e6f6c6f636b74009e3453db1e5f1e9066f5bb2ce925c48d35e4703b93b2d5bfd23e18d83dac5d2b60ac2549a150bbe2ff337e963d705488a4445d819b0e64d931f55524e7a1e3c6085b5312c3fd3720315f4a55bd81b03c51106871ebcf37208b4482f7b673f2cebd2f52fd64cd277772cbe2b5fde8fb8f5b3a9b2b2de957f42ac6f8a6221e14a946a9338a7d73a07a8e202f95810c7725a5d71fb30cb56eab00961b67fec0401a370056f14133a0969bc1"]) 00:29:21 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) newfstatat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_xen(&(0x7f0000000040), &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180), 0x14a014, &(0x7f0000000280)={'trans=xen,', {[{@posixacl}, {@version_u}, {@uname={'uname', 0x3d, '[\\'}}, {@mmap}, {@fscache}, {@msize={'msize', 0x3d, 0x100}}, {@access_uid={'access', 0x3d, r0}}, {@afid={'afid', 0x3d, 0x9}}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}]}}) [ 332.514963][T24003] loop4: detected capacity change from 0 to 157 00:29:21 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000025c0)=0x9, 0x61e) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, &(0x7f00000000c0)={0x1, 0x0, 0x0, "e2"}) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB="6a6f75726e616c5f6311266236195768368f"]) 00:29:21 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x45db, &(0x7f00000009c0)) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:21 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) acct(&(0x7f0000000040)='./file0\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:21 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) chroot(&(0x7f0000000380)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x2db, 0x6, &(0x7f00000024c0)=[{&(0x7f0000000180)="c4c909b6be9463268949c271198db5b56e78ea65904aa226e888e7f70cfe481b632908c6aa74b8273922", 0x2a, 0x3}, {&(0x7f0000000400)="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", 0x1000, 0x7}, {&(0x7f00000001c0)="b30d0115b79c56794f6344d631a155b856943bffcc12f154c07ce7595c0e47bfaf3794e487f5abeeff166d26f96e07dc997b11d1351933e43d9776c7dc6fe5c3e1f7895da7dfe600f1b68dc1f3a67ba5511df0d2a1119005f2467e75379dca8b80784adcc857eb83b7b1280654a957598926c7c28eebc265dd8b9c858411dae5b9245f3105652deb0d1703811dbd58767e4a37ca1bab46cb0b6596d1ac5f22b28f592cf03934f4ba8bd3bad36302ec2362a463cb3e7fdaba762a18", 0xbb, 0x9}, {&(0x7f0000000280)="dedf765619a871bed88d39edc6b974c14142a91f832bfea2508c774bfca9298005508a983b8a0b20613830154f610670919bc4a56e48371afcad792c62f862bdcb326ea8b18ce5e30ede5cc2cbd0fea14a34252ed9ab658f6af50ba1164102592468334e45e185a0e146e4bf64b26a7f0c0453d43b0a0a0e71b7d85b78df80be81dbc4672144985777ae69dc78363068971684921ff6aeb006debbe77600af6fa75946bfb324330fc657bb8cfdcf80b80f2bfea8017b28dfb99e65e3662fa1c0801019267cc2fc7a83036d1ae37a5370fa2b096167c3e284e57591b3ab29f1d2405a72f5bdd7c3b4158a6ec8dfea5f9646fab0ae616cfdc4", 0xf8, 0x88d4}, {&(0x7f0000001400)="e116d172aa3f7048131c6d0d2c18349ddf6d2b58be7fd08108aba9717cd1312d396fd12d523183fd5dc07ecc8eac3c4488636dd51d8fd9e0849ff8977eee35a1a7c7dd7dbb3a376bd2a2a976fe5b4375f2f8f733dfaa1fe52de71a04acafcb361519ab2d1baff95ebcb668b33b9a2a31d5783f5e3e8b60a3d1040e160fdb6a69ca73dab64bad23dfe73e05d586525708ef53224dd9fd8f2442972c44317e4eb2da0c6f59f386377f11a0cc94eb6f746b381373a01b692366034cad06159c", 0xbe, 0xffffffffffffff0d}, {&(0x7f00000014c0)="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", 0x1000, 0x646bcb74}], 0xa4, &(0x7f0000002580)={[{@sb={'sb', 0x3d, 0x2}}, {@data_writeback}, {@block_validity}, {@max_batch_time={'max_batch_time', 0x3d, 0x200}}, {@init_itable_val={'init_itable', 0x3d, 0x8001}}], [{@context={'context', 0x3d, 'user_u'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}) [ 332.644660][T24035] sd 0:0:1:0: device reset [ 332.658720][T24038] sd 0:0:1:0: device reset 00:29:21 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:21 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x351890, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000000)='./file0/file0\x00', 0x101, 0x0, 0x0, 0x33140d6, &(0x7f0000000180)=ANY=[@ANYBLOB="5cef43d7653dead64b24574400"]) 00:29:21 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x12020, &(0x7f0000000040)={[{@journal_checksum}, {@grpquota}, {@barrier_val={'barrier', 0x3d, 0x5d}}]}) 00:29:21 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x45db, &(0x7f00000009c0)) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:21 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x18020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:21 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:21 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)='hpfs\x00', 0x1020000, &(0x7f00000001c0)='ext4\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) r3 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="550000002a007f33deba2f977333bd930a0000ce01a843089100fe803900080008000000009eb43c6a95a0fb432c00000000fb83de448daa72540d8102d269c4d4133ab82286926700"/85, 0x55}], 0x1}, 0x0) dup3(r1, r0, 0x0) r4 = epoll_create(0x5) r5 = dup3(r4, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r2, &(0x7f0000000200)) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x400400, 0x8) move_mount(r5, &(0x7f0000000200)='./file0\x00', r6, &(0x7f0000000280)='./file0/file0\x00', 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:21 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB="6a6f75726e616c5f6368e5636b73756d2c00"]) 00:29:21 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x45db, &(0x7f00000009c0)) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:22 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0xa) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:22 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$nfs(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x400, 0x3, &(0x7f00000004c0)=[{&(0x7f0000000180)="53763d6bf71b25839685ccba6d349083bd59f34b236226f2e684aad850f9659f10f91ac559222b8c10207994115c6f758c9ac2f7d3ee3666b0faafca1653973dd60f2573f3da7bc8f2530f5be53946e3b6824b5d8c3e3fe701851cefbce414d30a73c72e3ecc831bafb7b0ab5ce763edbad3c0a3797078ed07c698fa637bf7a4f8c37acb3556e857ab148b9a54f4fbcd74552d5441e74cedbc7fe7fc063189e6cdafea34f130eb2758fc00f3deec3518cecd26cff396db7f15f24143e67e0f0b6d9bf3c4ffa0e68338fe987cdc5af7c3727eac217843169266fbcd3d9a3df4a3b3faa5bce6e758a326d8901aca4ad959", 0xf0, 0x1}, {&(0x7f0000000280)="d550afcec9cdbfec41b432c6602fa6272c189469a1336e0a338a01f852cc9dc8414c2a526d14f7db44844e839f70dd5b6a749a658a8d0f49fbbd89472a3ae3e108b5324e8f11981a81d0d1f69c87cf76d4a5034c2fe490fdff07803b443b43b9e38326743d77cc843f80043d3ae99678cd511858844efb0c167a4f3f68d2a78a0635346e923ba74714cca98a2b159e669a6b3f56eb8bf0bdf476fa71038089ba16140e60670dd6e739f4e0ea5102473f04866a8ed39e92d859501d1e17940be80c8aa3", 0xc3, 0x7}, {&(0x7f0000000400)="a2e1a8128b61e86efb4dae48b35a102291934c7695e73a93cee515d569344193b6e85837488cec7bd86e9858473c1a80f9e25a7c671b8f7492a3692df3f5bfd3858cfd92c363a8385ebdc12e31320aa8129f3e38d72ed73cb0b86f0f2c0743e291f6fba121904d01c4da675675239707e13dc776d61a4640c0bebdce54b6c8a034d68edde9d259be2696d7ec58b33cf67c27a907604f1094486c96ed0781507644ec336060c650684fe1e272075042997450", 0xb2, 0x5}], 0x3000000, &(0x7f0000000540)={[{'journal_checksum'}, {',&'}, {'\'!{'}, {'journal_checksum'}, {'&'}, {'\\\'$(\xbb'}, {}, {'ext4\x00'}], [{@obj_role={'obj_role', 0x3d, 'ext4\x00'}}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}]}) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:22 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180), 0x2, 0x1) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB="6a6f75fd4c616c5f636865636b73756d2c00"]) [ 333.581123][T24090] loop4: detected capacity change from 0 to 2 [ 333.599721][T24090] nfs: Unknown parameter 'journal_checksum' [ 333.673426][T24107] loop4: detected capacity change from 0 to 2 [ 333.679779][T24107] nfs: Unknown parameter 'journal_checksum' 00:29:22 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[]) 00:29:22 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x45db, &(0x7f00000009c0)) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:22 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000200)=ANY=[@ANYBLOB="6c74d4530b6688fe5e48cae22e09ca6b41eb552c00"]) mount(&(0x7f0000000040)=@md0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='gfs2\x00', 0x200000, &(0x7f00000001c0)='journal_checksum') 00:29:22 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:22 executing program 1: r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r0) r1 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ff9000/0x7000)=nil, 0x7000, 0x9, r1) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f0000000140), 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB='sysvgrecksum(\x00']) 00:29:22 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:22 executing program 1: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000, 0x6, &(0x7f0000ffd000/0x1000)=nil) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:22 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000040)={[{@journal_checksum}], [{@fsname={'fsname', 0x3d, '%#(^'}}, {@appraise}]}) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='rootfs\x00', 0x12080, &(0x7f00000001c0)='journal_checksum') 00:29:22 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x42) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1810, 0x0) r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x501840, 0x97) move_mount(r0, &(0x7f0000000180)='./file1\x00', 0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:22 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:22 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) llistxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/192, 0xc0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) chmod(&(0x7f0000000040)='./file0\x00', 0x0) 00:29:23 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='ramfs\x00', 0x200000, &(0x7f00000001c0)='*#\'#^^-.@\x00') syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:23 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) acct(&(0x7f0000000040)='./file0\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:23 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_evm(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540), &(0x7f0000001580)=@ng={0x4, 0x3, "e477867751"}, 0x7, 0x2) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x3fce, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000400)="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", 0x1000, 0x2}], 0x0, &(0x7f0000000200)={[{@hide}, {@session={'session', 0x3d, 0x33}}, {@session={'session', 0x3d, 0x2a}}, {@overriderock}], [{@obj_role={'obj_role', 0x3d, '\xe2]&'}}, {@appraise}, {@fowner_lt}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}) mkdirat(r0, &(0x7f00000002c0)='./file0\x00', 0x4) open(&(0x7f0000000040)='./file0\x00', 0x400, 0x11) r1 = syz_open_dev$usbmon(&(0x7f0000000300), 0x5, 0xa140) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r3 = syz_open_pts(r2, 0x0) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000080)) dup3(r3, r2, 0x0) r5 = epoll_create(0x5) r6 = dup3(r5, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f0000000200)) r7 = signalfd(r0, &(0x7f0000001480)={[0x4]}, 0x8) renameat2(r6, &(0x7f0000001440)='./file0\x00', r7, &(0x7f00000014c0)='./file0\x00', 0x5) ioctl$FS_IOC_READ_VERITY_METADATA(r1, 0xc0286687, &(0x7f0000001400)={0x1, 0x7, 0x20, &(0x7f0000000340)=""/32}) 00:29:23 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffffffffffe2a, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 334.637079][T24171] loop5: detected capacity change from 0 to 31 [ 334.680994][T24180] loop5: detected capacity change from 0 to 31 00:29:23 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:23 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000140)=@md0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='fusectl\x00', 0x2000, &(0x7f0000000200)='ext4\x00') inotify_add_watch(0xffffffffffffffff, &(0x7f0000000240)='./file0/file0\x00', 0xf90) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) acct(&(0x7f0000000340)='./file0\x00') mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='minix\x00', 0x200009, &(0x7f0000000300)='\'-\\\x00') syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB="7379ffff367e6f7570732c6a6f75726e616c5f636865639b73756d2c00"]) 00:29:23 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@dax}]}) 00:29:23 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:23 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB="6a6f757200020000000000006b73756d2c00"]) r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x7, 0xa, &(0x7f0000000780)=[{&(0x7f0000000280)="6e25bd1dee511e6084519fd50da2d8d67c9910b14d3d0bbf1c4295bfd91e668285f2f83d6768a9f2714ec2b747d2220412de9bd126797a0f2a", 0x39, 0x1}, {0xffffffffffffffff, 0x0, 0x5}, {&(0x7f00000002c0)="2c01a7ddf87af03bea14eba54c4b388e2d535335e2b9a91df400ec1b14887e1b6110c32e58fd79af", 0x28, 0x8}, {&(0x7f0000000300)="e2be1a7cd9db919b8b3f4546893baddd9f3c9e028b566aa16e09f7336a54ccbf58186cba75cba206c480f2726e116a", 0x2f, 0xffffffff}, {&(0x7f0000000400)="113ede59fff3ba55dcfa71104dc33f1d7b988eaea6b00c2b2d7c2162ec78d32852b457d1707370fd1721182eedc5afe2bcc878d34b749e72eb80977426e04656792bf5a7e4fca002c77c617e2817157b7b28c4dd934a4f49108c64890b746679b62cfb396f94be1d1eb7e06c2651e1054528261dc9057e4a869d48692dfc7fa43fb9badd82ca571f77d1f1a24e15cd57d36dc2a927616d5b53cbad927369a8355eecd30741027b6bffb0", 0xaa, 0x2}, {&(0x7f00000004c0)="2522e783f314874ddea778691dc1db3dd0741aaa77fa57589d70c857463f393d7835779bd540694a72251cba139fb626db3033820b9363482e43717945a0a9b8ba32526c9a1a3fcfb85dacd8d01376467c28ed7ae61be4836f9d4f2dd518d2edcf186ba0e71bfdce0a72708208418a367acf3dec243961bca0fcfbdb5dd0334a91f3f4e140959c65ba441b4f7e1db5b53492948d54139bc6d0f81eec77906b0332db7e7b443912c7f5e334ecbff815e2316a854c7f9bb5778f1c3fee426c2b350e8ae1ca", 0xc4, 0x6}, {&(0x7f00000005c0)="7cf42f870afc92f9f7f8ffe424a9fee659a9bda89c00c01aa768e5817483d0e27eff04d867934e57e42eaa3e5fbd127866215703fb985af9c45ef1cd896035bed6ea056bad9ba2bcf7354152930dfb", 0x4f, 0x7fffffff}, {&(0x7f0000000640)="13e7df62014a0ebe8b0e8d115c418a14126cfbb9e45a9c6e91c139607f6f30135f878bbb9049d6216af336dc94cca6d79fb7d2a96c230c928e927a316b46684402026437469333cba72b4ec70e6da39ac05f17febce8874b4c13a4ccca7cc059789a02d89d5aa2", 0x67, 0xade3}, {&(0x7f00000006c0)="00eeb5d275bae7f285e236a8a600a5f8f823cdbd765a337322a1a9e18bdb72369a150c380631f82bdc73ae71df103559aac83198f208b8c26abee08de0fa543a60d7cfca69d5142bd6eb4f82d0de6e956beb64bc1e25c69f0037d391a7a416486aadfdd602f8f9937a7f012b70e1a13477bbcac4471eeccd9b0e30f6d1ca8e837b0f846acc5b0fb8f04b93d4b86bc17680c8efdb7629e78dcd3599fc9dd8316b065634f2ed5dd45865617e1eea", 0xad, 0x200}, {&(0x7f0000000340)="d73af6984d53767116daf28b6cfc80", 0xf, 0x6}], 0x80000, &(0x7f0000000880)={[{@mpol={'mpol', 0x3d, {'local', '', @void}}}, {@uid={'uid', 0x3d, r1}}], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@seclabel}, {@smackfstransmute}, {@seclabel}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='\fdev/nullb0\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='debugfs\x00', 0x1295000, &(0x7f00000001c0)='-\x00') statx(r2, &(0x7f0000000940)='./file0\x00', 0x800, 0x0, &(0x7f0000000980)) 00:29:23 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:23 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:23 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB='journad_sam,\x00\x00\x00\x00\x00\x00']) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x2, 0x6, &(0x7f00000015c0)=[{&(0x7f0000000180)="d4de61e01225933ba2f97a280d080e8058e227a846c4c9e0320c811d046f1f5ccd32cd8a13e033a977869e5bf97f25e4a806f181a1e633ce4d45a1dd525c7500a1af867610f20a2b8982120d717f88bcb2f9377306a23b7e26e982c2df727419169a264171698bbe666ea2670bf655b275e829ea579a4d5f3138e84e34c659ee35baea02fffe498230abe7e9b7caa32fcfb7685bbde16599d075071a8cc95eeed3c239087cfe6782d11ac01ac4b149f881c54d1d95c9e3427b0efb152e7d05c9185d6ef9cc0c3a1d9c486938da6176a4d85522136b", 0xd5, 0x20400000}, {&(0x7f0000000280)="beb87554d26d8f4f8c7ce69c384ec6c50f644c2b33cb45226acc4e32897ca0b5f2867838f67f8c9879017241096ee74825b5c1d3e863682caff25917379667607c498ba55be1e1da7447a50c1c380a450b96b2bc3530b4e23718e4b8a7fe96bbffb2732fa4cf7a3769baa97ed9a409df230bf527cacb8fc66bc8f9a14ea0bf135f0d43ef266c850896724666db050a38546405be604e378731accabbf2845f04b86b98522aafed22fd8e018aad2059a80d9df4f4d336a7e0433c", 0xba, 0x91}, {&(0x7f0000000400)="a52c333debea3004fe4991811a3dea635943906b89c2f47c259a5587082be47323698d5bd26988de52addb3488e4db9d44f23801bc86fcad4fb7a8f08f58c073dacac75e85d4790153f39259109a5e8b99417dfb81b91d12147d343df871ce51ffc8e404cd33b4df47239d6017e445b3dc267d2f318adf0710ba426aab816203e3ab9a223438f949c3b39810b294611702c743", 0x93, 0x3}, {&(0x7f00000004c0)="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", 0x1000, 0x8}, {&(0x7f0000000340)="593893780fbe9d12829d695068ed9be309402b7f62f0e2459bb04e2694", 0x1d, 0x9}, {&(0x7f00000014c0)="a73f2609e3a5add74a0b0b49bb74cba1a2c13ccabf11d7a210585249af95c0ff37b145aea4c2ca882746a6f236b0a9cf53f09fb54d62beeaec667800a37b5c4a953b82abf3ec3dd367400cc5ab6b35aeab22eb3fe5f401c0c4974283d3f439ef3feb9cfbbb29c74fa3beea4b2ecbd073f4a2b116cd937411a9ebcbb7755a9dfac3fb66ab7603d8f29d14edff85483400865b22d72225399b94f9ccdc0ac018ce7d222e4ebaa319ceeb9f2499e1623b5b2f37eb5957fe873514512d4fc9cc892296b51dc64d8777", 0xc7, 0x8}], 0x80040, &(0x7f0000001680)={[{@sysvgroups}]}) 00:29:23 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:23 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB='sysvgchek\a\x00um,\x00'/29]) [ 335.385310][T24206] loop5: detected capacity change from 0 to 264192 00:29:23 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:23 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='aio\x00', 0x20022, &(0x7f00000001c0)='journal_checksum') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000200)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x10001, 0x1, &(0x7f0000000340)=[{&(0x7f0000000280)="e7f30f1e6be7c9e29d6f60a5e124ee2d26659687cfb33bebc6df5b2e658b50d83207627823e843d20597133893c50aae649799cf0357d1bc4c8e15c0604092d14c26eafcbfc2e633d3ca5b09a30b69f208a6e754e44e05dbe0aa6ee6dc29eb1f65a4f81824290060fb5e92c42c206f684913ea830f19a6052b57a5d398153daab045fc459f81f9322dc31e61edee7e901450133e333432b8efcc003ea4519bc0c6eb38eee5e914c8e723", 0xaa, 0x5f4}], 0x80000, &(0x7f0000000400)={[{@nodelalloc}, {@noacl}, {@bh}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x3}}, {@jqfmt_vfsv0}, {@max_batch_time={'max_batch_time', 0x3d, 0xffffffffbf445d66}}, {@debug}], [{@seclabel}]}) move_mount(r0, &(0x7f0000000480)='./file0/file0\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x25) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 335.475666][T24219] loop4: detected capacity change from 0 to 8 [ 335.525399][T24233] loop5: detected capacity change from 0 to 128 [ 335.547480][ T1126] ================================================================== [ 335.555556][ T1126] BUG: KCSAN: data-race in __d_drop / fast_dput [ 335.561798][ T1126] [ 335.564110][ T1126] write to 0xffff8881060e5cd0 of 8 bytes by task 24233 on cpu 0: [ 335.571817][ T1126] __d_drop+0x13d/0x1e0 [ 335.575970][ T1126] __dentry_kill+0x12f/0x4e0 [ 335.580541][ T1126] shrink_dentry_list+0x1bb/0x340 [ 335.585542][ T1126] shrink_dcache_sb+0x188/0x2d0 [ 335.590370][ T1126] reconfigure_super+0x2aa/0x4f0 [ 335.595284][ T1126] path_mount+0x145a/0x1d20 [ 335.599766][ T1126] __se_sys_mount+0x24b/0x2f0 [ 335.604418][ T1126] __x64_sys_mount+0x63/0x70 [ 335.608982][ T1126] do_syscall_64+0x44/0xa0 [ 335.613374][ T1126] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 335.619247][ T1126] [ 335.621550][ T1126] read to 0xffff8881060e5cd0 of 8 bytes by task 1126 on cpu 1: [ 335.629063][ T1126] fast_dput+0x92/0x1c0 [ 335.633194][ T1126] dput+0x26/0x360 [ 335.636890][ T1126] do_rmdir+0x1a3/0x330 [ 335.641020][ T1126] __x64_sys_rmdir+0x2c/0x30 [ 335.645584][ T1126] do_syscall_64+0x44/0xa0 [ 335.649982][ T1126] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 335.655856][ T1126] [ 335.658159][ T1126] value changed: 0xffff888237af7d90 -> 0x0000000000000000 [ 335.665240][ T1126] [ 335.667544][ T1126] Reported by Kernel Concurrency Sanitizer on: [ 335.673667][ T1126] CPU: 1 PID: 1126 Comm: syz-executor.1 Tainted: G W 5.15.0-rc1-syzkaller #0 [ 335.683706][ T1126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.693739][ T1126] ================================================================== 00:29:24 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:24 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:24 executing program 2: io_uring_setup(0x45db, &(0x7f00000009c0)) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:24 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:24 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/T)dev/sg'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='reiserfs\x00', 0x0, &(0x7f00000001c0)='ext4\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB="6a6f6b9300000000"]) 00:29:24 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@md0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='dax\x00', 0x4000, &(0x7f0000000640)='/,^\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000680)=ANY=[@ANYBLOB="7379737667726f7570732c6a5175726e96d6d496cd858f10932af61563116e9f8eb3c28534f68f753f500af1ccaa38e5bba4ae8746f1af80b6d476fbf2cad8f0ff1d1d69b318fc241ab8ebdd0dddbc66dc4aac33f3097e9aefb9a9faea5bdd6861ab950b0d1ea79eed5084f2728a0dbf2030f7ffd6a6d87f3462de9ac108ded78e8764c0f0238e11d865e4cff2f998bafecae7320a1ca54ccf4de0e3e31081f0fe0fd929aa74469c882f7504b1e8e06b26fd181a719469bbec9f70e38a385fc4"]) r1 = signalfd(r0, &(0x7f0000000040)={[0x3]}, 0x8) umount2(&(0x7f0000000540)='./file0\x00', 0x19) recvmsg$unix(r1, &(0x7f0000000340)={&(0x7f0000000140), 0x6e, &(0x7f0000000300)=[{&(0x7f00000001c0)=""/173, 0xad}, {&(0x7f0000000280)=""/81, 0x51}, {&(0x7f0000000400)=""/166, 0xa6}], 0x3, &(0x7f00000004c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x12000) 00:29:24 executing program 2: io_uring_setup(0x45db, &(0x7f00000009c0)) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:24 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=[&(0x7f0000000140)='ext4\x00'], &(0x7f0000000280)=[&(0x7f00000001c0)='ext4\x00', &(0x7f0000000200)='ext4\x00', &(0x7f0000000240)='ext4\x00']) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB='journhecksum,\x00\x00\x00\x00\x00']) 00:29:24 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4000021) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000040)=ANY=[@ANYBLOB="6a6fbf3e75fab0c5979dde6e1f000000567375726e616c5f636865636b73756d2c"]) 00:29:24 executing program 3: mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:24 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) sendto(0xffffffffffffffff, &(0x7f0000000140)="d8df1bc39c9089eb530adac7cca394297eeedc3aa59bed2742eac9f88c38a9518bc9dd5bcb9b292bad67ae967e6c926d25ec6d430d71ccb1cf07e53e767c14b15fc832e7ebbe9aa3b016da1e", 0x4c, 0x1, &(0x7f00000001c0)=@xdp={0x2c, 0xc, 0x0, 0x37}, 0x80) 00:29:24 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x144) 00:29:24 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000240)=ANY=[@ANYBLOB="00fb2b3a0983adc5d62df25e445a1d459a2c087921d9b141f3c738da8ac14892304e00008f5690c319d7ae3ef4d72ca40bb93646e3f93c37c59ead060a92c97b03212973ed30864f6e83620f00040000bbf3ee6cb6dd6289099c5500e478d97c9ce64f91422f93"], 0x2b, 0x3) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) chdir(&(0x7f0000000040)='./file0\x00') ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000000)=0x0) r1 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000400)={[{@journal_checksum}], [{@uid_gt={'uid>', r0}}, {@subj_user={'subj_user', 0x3d, 'ext4\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@euid_eq={'euid', 0x3d, r2}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x5b, 0x34, 0x65, 0x36, 0x63, 0x33, 0x31], 0x2d, [0x64, 0x34, 0x31, 0x62], 0x2d, [0x35, 0x61, 0x66, 0x65], 0x2d, [0x64, 0x66, 0x36, 0x65], 0x2d, [0x30, 0x30, 0x36, 0x64, 0x5d, 0x30, 0x66, 0x39]}}}, {@subj_user={'subj_user', 0x3d, ')'}}]}) 00:29:24 executing program 3: mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:25 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:25 executing program 5: mkdir(&(0x7f0000000180)='./file0/file0\x00', 0xac) chdir(&(0x7f0000000140)='./file0\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='.\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000280)=ANY=[@ANYBLOB="6a6f757273616c5f447a65416b73776d2c00ee3cc2b5ba79b167e7c9f15ecd534183d3a4fa9903443348edd36680a56262734b1d6822cfc7187b8c81a90bdddf2b6fc7f6c0c7f5f7fa971310fade9b433c44a71392049d92e7b02c9ada7ed7b5d892361e9a20dd672815ee0af827a8b7"]) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) dup3(r1, 0xffffffffffffffff, 0x0) r2 = epoll_create(0x5) r3 = dup3(r2, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000200)) fsconfig$FSCONFIG_SET_PATH(r3, 0x3, &(0x7f00000001c0)='\x00', &(0x7f0000000240)='./file0\x00', r0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r4 = syz_open_pts(r1, 0x0) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f0000000080)) dup3(r4, r1, 0x0) r6 = epoll_create(0x5) r7 = dup3(r6, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r5, &(0x7f0000000200)) openat(r7, &(0x7f0000000040)='./file0\x00', 0x200840, 0x4) 00:29:25 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) dup3(r1, r0, 0x0) r3 = epoll_create(0x5) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000200)) openat(r4, &(0x7f0000000040)='./file0\x00', 0x200002, 0x0) 00:29:25 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) dup3(r1, r0, 0x0) r3 = epoll_create(0x5) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000200)) r5 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/ipc\x00') mount_setattr(r4, &(0x7f0000000040)='./file0\x00', 0x8000, &(0x7f0000000180)={0xfc, 0x9, 0x160000, {r5}}, 0x20) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:25 executing program 3: mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:25 executing program 2: io_uring_setup(0x45db, &(0x7f00000009c0)) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) [ 337.213113][T24317] EXT4-fs: 101 callbacks suppressed [ 337.213125][T24317] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: writeback. 00:29:25 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000140)=ANY=[@ANYBLOB="6a6fbc726e616c5f636865636b73756d2c0024674fb6063ab3aa2848305cce9bb7eda99e8a22a5b5946317597886ce1a090ea4d1ae9fa37ade80e5288cbce27b629c4573ee80245cebba070c1879451162a3fa8d9305535d6b26f0bb954a141571361cb760cb5d235818f10ee733111cce6c153eeec623029cf0cd6c0a720991ab6810ce5b48d56d4bb84853b3dfac64acb06435edb7fe6aef00351a839e57543e83731c3f47a33dcf7c730e008c4f2d36b5dbc04e95969a68b5eac79c0e3a88086da01dda592726f75d68e39dfc1c0d7e1cd66c20f4d6a4403b66335b531e81aa4c1e4300000000"]) 00:29:25 executing program 3: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) [ 337.291286][T24326] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 337.322959][T24326] EXT4-fs (sda1): re-mounted. Opts: sysvgroups,journal_checksum,,errors=continue. Quota mode: writeback. 00:29:25 executing program 2: mkdir(0x0, 0x14) io_uring_setup(0x45db, &(0x7f00000009c0)) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:25 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nsfs\x00', 0x20000, &(0x7f00000001c0)='ext4\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) [ 337.337653][T24325] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 337.375737][T24325] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: writeback. 00:29:25 executing program 3: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) [ 337.389009][T24338] EXT4-fs (sda1): Unrecognized mount option "jo¼rnal_checksum" or missing value [ 337.416898][T24342] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: writeback. [ 337.425888][T24343] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring 00:29:25 executing program 2: mkdir(0x0, 0x14) io_uring_setup(0x45db, &(0x7f00000009c0)) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) [ 337.438290][T24343] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: writeback. [ 337.448653][T24346] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring 00:29:26 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:26 executing program 3: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:26 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='journal_checksum') syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x920a0, &(0x7f0000000200)={[{@journal_checksum}], [{@obj_user={'obj_user', 0x3d, 'devpts\x00'}}]}) 00:29:26 executing program 2: mkdir(0x0, 0x14) io_uring_setup(0x45db, &(0x7f00000009c0)) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:26 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB='journcl_checksum,\x00']) 00:29:26 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) dup3(r1, r0, 0x0) r3 = epoll_create(0x5) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000200)) move_mount(r4, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x57) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:26 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:26 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) open(&(0x7f0000000100)='./file0\x00', 0x40000, 0xa0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000140)=ANY=[@ANYBLOB="6572726f72733d72656d6f756e742d726f2c6a6f75726e616c5f636865436b73756d2c7375626a5f757365723d2c00e7053cf7763b8eccd232da9fdb02383c6aa79ab19203cc6dec7471a2c46f96fa0a4a4e2652e0b9f722fb7708673b00ad86b3330fdee4838de799a67c8226e62d1d066b"]) 00:29:26 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) r1 = signalfd4(r0, &(0x7f0000000040)={[0x4]}, 0x8, 0x800) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x3f7, 0x1, 0x70bd29, 0x25dfdbfd, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", ""]}, 0x28}}, 0x40080) openat(r0, &(0x7f0000000240)='./file0\x00', 0x280000, 0x86) 00:29:26 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) [ 338.258244][T24378] devpts: called with bogus options [ 338.280655][T24387] devpts: called with bogus options 00:29:26 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x40) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x112000, &(0x7f0000000140)=ANY=[@ANYBLOB="6a6f75726e616c12f5da5d4dc0825f636865f12ef2794da0a7da2cea5273cee827256bbcb825666744cbb9d77a08bb767eaf3cfb42a2db0747137ad1d02b7ddad46ded9ae0a24972b16272248b8fe98319f5617b58b53d67102a620f8c93594d26cbc692c1c50d4fa6e95364"]) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) dup3(r1, r0, 0x0) r3 = epoll_create(0x5) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000200)) openat(r4, &(0x7f0000000000)='./file0\x00', 0x40, 0x1de) 00:29:26 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) io_uring_setup(0x45db, &(0x7f00000009c0)) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:27 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:27 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:27 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="550000002a007f33deba2f977333bd930a0000ce01a843089100fe803900080008000000009eb43c6a95a0fb432c00000000fb83de448daa72540d8102d269c4d4133ab82286926700"/85, 0x55}], 0x1}, 0x0) sendfile(r0, r1, &(0x7f0000000140)=0x7f, 0x2) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:27 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x81, 0x0, 0x0, 0x12020, &(0x7f0000000040)=ANY=[@ANYBLOB='jowrnal_checksum,block_validity,\x00']) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) dup3(r1, r0, 0x0) r3 = epoll_create(0x5) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000200)) fspick(r4, &(0x7f0000000000)='.\x00', 0x0) 00:29:27 executing program 5: mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x1010, 0xffffffffffffffff, 0x59422000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000140)=ANY=[@ANYBLOB="6a6514206d75726e616c5f636865636b7375688e3e20263182abc31640b414c742490d732db982d397404b547278226404989a17f3412d6d6acb3a71ca5a49463858104c2c9c21ddb668625ad3601694a2d0cfe2881d729d2d55b92c789ca0c35ca164dc4dafe99d7d514cd97f3767835514fdccf63c5b0ad846ccd8a3a8639837"]) 00:29:27 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) io_uring_setup(0x45db, &(0x7f00000009c0)) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:27 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000180)={0x1}) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_dev$char_usb(0xc, 0xb4, 0x7) fcntl$lock(r2, 0x26, &(0x7f0000000180)={0x1, 0x0, 0x0, 0xc}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$lock(r4, 0x26, &(0x7f0000000180)={0x1, 0x0, 0x9}) dup2(r0, r1) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) 00:29:27 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2881090, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:27 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) io_uring_setup(0x45db, &(0x7f00000009c0)) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:27 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x5) unshare(0xc040400) r1 = fork() fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x2, r1}) fcntl$notify(r0, 0x402, 0x8000002d) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:27 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:27 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2881090, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:28 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xffefffff00000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:28 executing program 1: shmctl$SHM_UNLOCK(0xffffffffffffffff, 0xc) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = shmget$private(0x0, 0x4000, 0x2b, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000500)=""/214) setxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000040)=ANY=[@ANYBLOB], 0x3, 0x4) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r1 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000400)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x8}}, {@sb={'sb', 0x3d, 0x5}}, {@commit={'commit', 0x3d, 0x9}}, {@grpquota}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x38000000000}}, {@journal_async_commit}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x20}}, {@usrjquota}, {@orlov}, {@usrquota}, {@oldalloc}, {@dax}, {@noquota}]}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00') move_mount(r2, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x24) move_mount(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x14) 00:29:28 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000240)=ANY=[@ANYBLOB="6a6f7572300796c9b4da4dab5f851e9cf2d573e46e616c5f736865636b73756d2c00d21b6b95d68344fe6f2fdee14543f5c06a3349bb9845f1347ee67d8dabb3e5ed5a884293c004d822fa5d52009ff35b934ef0c5e2b9bb368c6119f0f0bef65b524c1f5f6d3872e5fb557febef16f67878ef7a6e490d5cf119c1322bc273e640303323c9080013e8d0d5c12b4082a5ee4a1542e25e59d8aa4014878e382116a976c0a4b1cb5543128504e67c6485d24874a729f20074dd1c3c7a348dcf029079768d3fc6fe230d28df1982f100"/218]) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) dup3(r1, r0, 0x0) r3 = epoll_create(0x5) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000200)) openat(r4, &(0x7f0000000000)='./file0\x00', 0x600080, 0x112) 00:29:28 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="d89acb"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) tkill(0x0, 0x30) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0xff, 0x3f, 0x7, 0x3b, 0x0, 0x9, 0xa0020, 0xc, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x41a}, 0x4020, 0x5, 0x4, 0x5, 0x8001, 0x1, 0xffc0, 0x0, 0xa6d, 0x0, 0x9}, 0x0, 0x6, r0, 0x8) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@nobarrier}]}) 00:29:28 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2881090, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:28 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x0, &(0x7f00000009c0)) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:28 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:28 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000001640)=ANY=[@ANYBLOB="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"]) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000001780)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) sendmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="550000002a007f33deba2f977333bd930a0000ce01a843089100fe803900080008000000009eb43c6a95a0fb432c00000000fb83de448daa72540d8102d269c4d4133ab82286926700"/85, 0x55}], 0x1}, 0x0) writev(r2, &(0x7f00000014c0)=[{&(0x7f0000000240)="1dc7c9ecade3d4fe03e7aa51ad437c38e142a218396f8841721f472716c17188c0e5a8e519cfa65cc9ea489d74d3a4e4d67efe29f9e2cfcb9eb02fb4fd90c142acecd163016e696028da1e2979eef81068030393c112fc4442f187d5e066b4d726852c8fe92529d901ee1e3d6c2d9a625256e9a622e1d5127fca29ab503b4400f4c5425481320e2d3dd70ca4f877b7a72543bbf06a8d7832bbca17945ec5ae65cf4cabcdfbae38695abd35053462cc3b3bf935bac6c27de3a8169181aeac", 0xbe}, {&(0x7f0000000300)="60bb5e7ff258ca38b6f8c73fb085e6f60ecb58f21832c8099406851d6d1fc99d0403a17eb568b453da4bccddf9191d0db15cc95c480fe4394d793287b8e94241fa961f56370013adf41b", 0x4a}, {&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000001400)="f82ca6f28cfe2dd754240a330aab54a7c52af2702e739737886e39d84e53c3bd8e7c73b3444cc713dce62cc82ff9b3c31b7bb4e6f8e86b49004a5d60010893bf3e21816a828ff818225e273401ccd791e9d3c103820bef62b5cf9c86bb46b5a1af5971d3f051c4427dd09740c2792a04162c3ebfb8e0c6373dfe5f7318de1df8bd41b868c7a3cb96", 0x88}], 0x4) r3 = openat$cgroup_ro(r1, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r3, 0xc0046686, &(0x7f0000001500)={0x2, 0xd5, "321e5f86034800c3ec9b6bf4624111eb457b3b8ee63dbd481e6cee97a552f2f514b735d604f06acf474c077dcafea940f36b848c635c7de4b760f9941159b2e2fa13551f5235125ecd305c61433cd8dd95f5a3d717ef2e8aa77a9149102207453a6f559e51792a799d0cc34be870f98eb7008afeec23917f055df6d67ff65e9441d9555f05089a66b02505bf492b1ad9b24ef679e151407df58479b65f7d9859aa2e85d29ccc23b9f2cb0757751f406834f4b023200ef00a66d7251e8976c216fe48efa8ac885aa2cc59ca5d6bc119de964830cb1d"}) openat(r1, &(0x7f0000000040)='./file0\x00', 0x40080, 0x2) 00:29:28 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:28 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@sysvgroups}, {@journal_checksum}]}) r1 = open(&(0x7f0000000280)='./file0\x00', 0x80000, 0x10) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/bus/snd_seq', 0x800, 0x106) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x80, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@noextend}, {@msize={'msize', 0x3d, 0x3}}, {@nodevmap}], [{@dont_measure}, {@subj_user={'subj_user', 0x3d, 'ext4\x00'}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@subj_role={'subj_role', 0x3d, 'ext4\x00'}}]}}) r3 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="550000002a007f33deba2f977333bd930a0000ce01a843089100fe803900080008000000009eb43c6a95a0fb432c00000000fb83de448daa72540d8102d269c4d4133ab82286926700"/85, 0x55}], 0x1}, 0x0) sendfile(r3, r1, 0x0, 0x1) 00:29:28 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x0, &(0x7f00000009c0)) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:28 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB="6a6f756d2c00000000000400000000000000"]) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x48001, 0x0) move_mount(r0, &(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x14) 00:29:29 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:29 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000002c0)=ANY=[@ANYBLOB='min_batch_time=0x0000000000000009,journal_paih=./file0,\x00']) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000280)={0x1, &(0x7f00000003c0)=[{0xa, 0x0, 0x0, 0x7fc02000}]}) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x8000, 0x184) creat(&(0x7f0000000240)='./file0/file0\x00', 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r3 = syz_open_pts(r2, 0x0) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000080)) dup3(r3, r2, 0x0) r5 = epoll_create(0x5) r6 = dup3(r5, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f0000000200)) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r7, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x80082102, &(0x7f0000000200)={r8}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000040)={0x0, 0x1, r0, 0x3, 0x80000}) 00:29:29 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:29 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, 0x0) unlink(&(0x7f0000000240)='./file0\x00') syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB="73797376c506c929e4e270a16f75726e616c5f636865636b73756d2c00"]) rmdir(&(0x7f0000000200)='./file0\x00') 00:29:29 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x0, &(0x7f00000009c0)) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:29 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x1, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000004900)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r3]) syz_mount_image$tmpfs(&(0x7f0000000440), &(0x7f0000000480)='./file0/file0\x00', 0x1, 0x6, &(0x7f0000002680)=[{&(0x7f00000004c0)="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", 0x1000}, {&(0x7f00000014c0)="8329a70f682421de1715ce605cfec6dc075b576712e2aff4f3736f9c4db526a393b8e2c349d505a4fe6fdeb323b95a38ceb782705e08e8613d4ee038", 0x3c, 0x200}, {&(0x7f0000001500)="48afb3310f142545687272614f0e9818ca708beb329bdf99ae789431a2adce9ce0a8c70037085caa1ffb8f144da3161b697b63559a8a41e8beac1792d8ff33b023de1c84f835e07c9264fb228e56fb2d866fab0c4212dc77a8f5c7232890be4c45177dd499947c4e96ea8669fab645d43e74d6458cedd89f65927aa5dae05d870418a53e27160a826ff528f33e544cd1cec58fa7f8e64d16777a65de84ed272c8ff559fe6b2e24df3111e86282", 0xad, 0x8000}, {&(0x7f00000015c0)="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", 0x1000, 0x9}, {&(0x7f00000025c0)="65883901f5e4fc430c8724bfabe2111161469bc8ae1a1aa479ac20d19d87f448db32de9092a94e0880e006f3", 0x2c, 0xb59}, {&(0x7f0000002600)="6ec70c660ee95cdb50ccc534bc8adbaceb0c9ea3207e096deddbda6caf0e90b7e418b4ad44ac4da58cd7096d8493bcccf94ff3b99ed8cba126034ab6d55413f5d86e41b47365a1a2df2fc281287feb7c082ec81ca31dff1a7f622232a44448f4814ad9437290524d0f3519019d290a", 0x6f, 0x6}], 0x20004, &(0x7f0000002740)={[{@nr_blocks}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x74]}}, {@gid={'gid', 0x3d, r3}}, {@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x39, 0x35, 0x38, 0x36, 0xf, 0x30, 0x35, 0x6, 0x38, 0x32]}}}}, {@size={'size', 0x3d, [0x2d, 0x38, 0x65, 0x34, 0x74, 0x6b, 0x38, 0x41, 0x6d]}}, {@mode={'mode', 0x3d, 0x64}}, {@nr_inodes={'nr_inodes', 0x3d, [0x34, 0x78, 0x6b, 0x37]}}, {@huge_never}, {@huge_never}, {@nr_blocks={'nr_blocks', 0x3d, [0x6b, 0x33, 0x32, 0x11, 0x6b, 0x39, 0x33]}}], [{@measure}, {@appraise}, {@dont_hash}]}) mount(&(0x7f0000000000)=@sg0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000400)='aio\x00', 0x180404, 0x0) 00:29:29 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:29 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000140)=ANY=[@ANYBLOB="6a6f75726e616c5f636865636b73756d2c007ad85b1f1335a375d272096b87e59a94143bd7c44e72c28858c76afd60328e2ea3a4a48579031428c66df57dc52a57438c341308ad36a2c4d80c9a63566cc97b728f1983b610c3575a1eee0b04"]) [ 341.094885][T24523] loop4: detected capacity change from 0 to 128 00:29:29 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x217020, &(0x7f0000000140)={[{@acl}, {@journal_checksum}], [{@measure}, {@permit_directio}, {@subj_user={'subj_user', 0x3d, '&,(+'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '[\xe2'}}]}) 00:29:29 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x45db, 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:29 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) [ 341.175011][T24536] loop4: detected capacity change from 0 to 128 00:29:29 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:30 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x12020, &(0x7f0000000180)) 00:29:30 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000140)=ANY=[@ANYBLOB="6a6f000000000000000000ffe30000000000d7bade27c5e327401f16c1d52a62d3a62ee3c361275f70baf914759bf8fc13414c3a4f89e613c5d7afd5aad645ee7f442cd9f43c11bdd108a18fe27a2bdd50a68021ea7427a051acd2e911cd046ab4f98331c9600000000000000006aa063b4d63318d93f5c93cef6bd0b06f5044f4715d9ce07f61ef1f1ffdc6fe6fbaa332f9e1184bfcc7dccba73727acef60945a"]) 00:29:30 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_ifreq(r0, 0x8946, &(0x7f0000000000)={'syzkaller0\x00', @ifru_flags}) 00:29:30 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x350400, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:30 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:30 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x45db, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:30 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @xdp, @vsock, @vsock={0x28, 0x0, 0x0, @local}}) 00:29:30 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000001, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@bh}]}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvfrom(r0, &(0x7f0000000140)=""/15, 0xf, 0x40010060, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1, 0x3, {0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, '\x00', 0xe}, 0x2}}}, 0x80) 00:29:30 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:30 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r2 = syz_open_pts(r1, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000080)) dup3(r2, r1, 0x0) r4 = epoll_create(0x5) r5 = dup3(r4, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r3, &(0x7f0000000200)) move_mount(r5, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00', 0x31) 00:29:30 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:30 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) getsockname(r0, 0x0, &(0x7f0000000080)) [ 342.222900][T24607] EXT4-fs: 65 callbacks suppressed [ 342.222915][T24607] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 342.239779][T24607] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: writeback. [ 342.251511][T24617] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 342.261735][T24617] EXT4-fs (sda1): re-mounted. Opts: journal_checksum,,errors=continue. Quota mode: writeback. 00:29:31 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:31 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x45db, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:31 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x41) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x1) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12022, &(0x7f0000000040)=ANY=[@ANYBLOB="6a6f757e6e616c5f636865636b73756d2c0033c9505d14cbc4ec55ddc9b02f4cb5db98e7485b09"]) 00:29:31 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, 0x0, 0x12020, &(0x7f0000000180)) 00:29:31 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00') mount$bind(&(0x7f0000000180)='./file0/file0\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x33000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:31 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r0) [ 342.982986][T24623] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: writeback. 00:29:31 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:31 executing program 1: keyctl$unlink(0x7, 0x0, 0xfffffffffffffffb) 00:29:31 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000140)='./file1\x00', 0x10) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB="5002e7823b17918b097300000000000000"]) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101000, 0x22) [ 343.069008][T24633] EXT4-fs (sda1): Unrecognized mount option "jou~nal_checksum" or missing value 00:29:31 executing program 5: sendmsg$NL80211_CMD_START_NAN(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x1, 0x14}}}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x82}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x2}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x9}]}, 0x38}, 0x1, 0x0, 0x0, 0x8011}, 0x4000000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0xd4) mkdir(&(0x7f0000000140)='./file0\x00', 0xec) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:31 executing program 1: syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x80200) [ 343.114914][T24644] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: writeback. [ 343.151115][T24647] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: writeback. 00:29:31 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x45db, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) [ 343.161155][T24648] EXT4-fs (sda1): Unrecognized mount option "Pç‚;‘‹ s" or missing value 00:29:31 executing program 4: mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) 00:29:31 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) [ 343.208091][T24657] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring 00:29:32 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, 0x0, 0x12020, &(0x7f0000000180)) 00:29:32 executing program 1: clone3(&(0x7f00000011c0)={0x20000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:29:32 executing program 5: mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x409, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000940)=ANY=[@ANYRES32=0x0], &(0x7f00000000c0)='.', 0x0, 0x1338a1, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000a00)=ANY=[@ANYBLOB="9e4c9fa558f1780b49a6586812731bc05dc262310f7266158bc089e2cdba000000000000000000"], &(0x7f0000000040)='./file0\x00', 0x0, 0x5110, 0x0) acct(&(0x7f0000000980)='./file0\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x7ffff000) mkdir(&(0x7f00000009c0)='./file0/file0\x00', 0x86) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x61) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x2, 0xa, &(0x7f0000000840)=[{&(0x7f00000001c0)="4c718f8eebba3d31e5357aab6f04c181b16dc916a0e01d45224bfd577835e6a0e1dc8d", 0x23, 0x5b6}, {&(0x7f0000000200)="bc630997790ee8b1d2c60a28c46524f7ffe3b62706d9c6a25695ee31dcf99c82a3857f524ced40617a9440eb9338cf04bae705", 0x33, 0x3}, {&(0x7f0000000240)="f2a8168a05a0787ca6587a8f4fe322f7f72afb2d9b463ec46f72d35d1c", 0x1d, 0x9}, {&(0x7f0000000280)="7416b1a83c159a67f3ac3c5ad16268e00e64385223d4a66383ce64f0a7a29a3e6421b0d7bd0615230c5bb3c705885b329048693b973a9e27abc01fd5ff06b99b2be2cd0afd8fa373ad02d578d52994de76105fae716412390d20dad0e554a3ea00ee973347a5c679b37a3012e3d0abcbe82e2a0bb2a40eae089823d10f951317279c6ec20bd8409932fe79ddca", 0x8d, 0xfff}, {&(0x7f0000000400)="8f377a46ec95f9dd0a935860f8e0ddb77fd6c79a02f85adce683b23606f0a290cb1db7222610462b6e8d77278b69db1ad8a1ed83b25156403dfa518c1a432544ff39d4da75d37f22ed715bb18b0b69e8f2f6722472afae98320d57fdd9608664fb379b177e90192a56111334009eed7d923e8d04c7fffb270f0354139c99913897f8e49b69fa155f9f27740e3b61f46635b639215e1de813aa1997c7bc241d88a4d1afaa7f889044954e4a7f300306f78c3fee1eff567ff1021e1e92406b4704988386de49e195c33cb6389818eb4527ebb2d9626d0e", 0xd6, 0xffffffffffffd4d1}, {&(0x7f0000000340)="242f67ee0d1eebe3f6777a49ac88af", 0xf, 0x7}, {&(0x7f0000000500)="1db9e26748f3adc2cd8a45c1de7e5d5cfe75f41d4f7156cfd3d2a51b0f359e504c6e638d006fc618e3439a253575a759a99fc8afceb75cee40a5897543035e73e892cbafb64da9668da7c1e3368bbbe96a564e9cf5930d16d9b4f8baf6ca1f45ea91982ced4575d9117fee6a35d23485401461e3f8ff73e4e86dde89b8de8f7a081318b7c6f45659e0e499b531d820ac85f7991becde26d8595f2fa9e5a8976e2c2ef541730b1af462ef3e51c5fe9dafba1044627d9717f3b5d2a276b28c72319489449f76d954a8071dd188c15b7f7734d03b", 0xd3, 0x3}, {&(0x7f0000000600)="391a43fea44a1b70eb3bc0ec8a6e803d5315b15f7107478da489916f5cf86ad8f66d7668517b2b60b311834bb05bc3be742c197a5699b5eac4e0f7eb665bc4a2021aea725cd46c5d24658261aa64efada28a70b2209f3fe4a1aa32c7e87a9214567ef6e0408f88d4ab7b53dc6564866476980a561b85105754d687f6e6dc6507848b48e61192a9a51ffc7385ca875cc64af298005e77a5e37175e46d1c3d73147749461b56e6bc47050373c41c2b060f7e24b4276c07a2947df3d29e9543dc9336ef", 0xc2, 0x7fff7da6}, {&(0x7f0000000700)="fab3cf32afcbd319f320b73a5e2a66028d19d59eede9f8", 0x17, 0x9}, {&(0x7f0000000740)="79cfb20a3362bba0089e85659527321d0818e2adce1ccdb0d15fd38bd169ccb418da512799bd4e79e226185957d2e0a1f5a2c490df5a3b285b7909cf03b2c21235400ba3ea6087b10cb79bfb5c63b9080f8b9e7ac215f31d1b99742cf5560be4906fed3a0e8398de2729956c8549698d6d1384c75dbc67bd13d8fe6c0b6efae31ed60da9fa02639ce2c33707021d580302df0504b37637547829383ff2bf9dc935b9b466aac96309a54210089ec26f6dc9549e5902e259283651aae6087172e4aa85ff800e3aad", 0xc7, 0x7}], 0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00', @ANYRESHEX=0x0, @ANYBLOB=',huge=within_size,context=system_u,subj_user=,dont_hash,uid=', @ANYRESDEC=0xee00, @ANYBLOB=',smackfsfloor=%)%$\\&$!,uid<', @ANYRESDEC=0xee01, @ANYBLOB=',euid<', @ANYRESDEC, @ANYBLOB=',appraise,euid=', @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) r3 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)={0x80d80, 0x42}, 0x18) move_mount(r2, &(0x7f0000000a40)='./file0\x00', r3, &(0x7f0000000b00)='./file0/file0\x00', 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000c40)='limits\x00') symlinkat(&(0x7f0000000c00)='./file0\x00', r4, &(0x7f0000000c80)='./file0\x00') chdir(&(0x7f0000000bc0)='./file0\x00') 00:29:32 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x45db, 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:32 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000480)='./file0\x00', 0x0, 0x3001800, 0x0) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000140), &(0x7f0000000180)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@private2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) r2 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) ioprio_get$uid(0x0, r0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000300)={[{@journal_checksum}], [{@fowner_eq={'fowner', 0x3d, r0}}, {@dont_measure}, {@fowner_lt={'fowner<', r1}}, {@fowner_eq={'fowner', 0x3d, r3}}]}) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000400), &(0x7f0000000440)=@md5={0x1, "681fb69344b1118fa1119705e1adb75c"}, 0x11, 0x1) 00:29:32 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:32 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB="d66f716a6f75726e616c5f636865636b7375"]) 00:29:32 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:32 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xbc, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x17f05, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 344.027082][T24687] loop5: detected capacity change from 0 to 264192 00:29:32 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:32 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x45db, 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:32 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) mount(&(0x7f0000000040)=@md0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='ext4\x00', 0x1, &(0x7f00000001c0)='journal_checksum') [ 344.138702][T24702] loop5: detected capacity change from 0 to 264192 00:29:33 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x100005, &(0x7f00000001c0)='ext2\x00') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, 0x0, 0x12020, &(0x7f0000000180)) 00:29:33 executing program 1: process_madvise(0xffffffffffffffff, &(0x7f0000000540)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0) 00:29:33 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)={[{@journal_checksum}]}) mount(&(0x7f0000000040)=@nullb, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='ntfs\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private1}, 0x0, @in6=@mcast2}}, &(0x7f0000000340)=0xe8) lchown(&(0x7f0000000200)='./file0/file0\x00', r0, 0xee01) 00:29:33 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x14) io_uring_setup(0x45db, 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 00:29:33 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:33 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f0000000000)=ANY=[@ANYBLOB='jocksum,\x00'/18]) 00:29:33 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_ifreq(r0, 0x8906, 0x0) 00:29:33 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="876d00000000000000000c"], 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000200)=@ethernet={0x306, @remote}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '+[+}.^$.\x00'}, &(0x7f0000000180)='%:\xf6\x00', 0x4, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12020, &(0x7f00000001c0)) 00:29:33 executing program 4: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000140)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000400)={r0, 0x0, "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", "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