417178065206b40ab637bff7b3593ae518494cc8d560ddef569384c6bcf68d9cd62bdbb9ef8a8377857894be69f3f0b3c37c46d348e3d61c6e65756ee4aa65f1d0859c015ad7ab6b4c63f38e431bb8bd24c72aeabdab00b46184036bf1bf1f58cd8fa2cad49b17885009d874b0a1af1f2b5f1405f54441e7d5260bd2801ef31d45719679f0efa08ff17b7b60590657cc1374507768caf564781263ca03f1f4f331a48ab7685e8a0b12571ee40a5f98cf89835330248c977f209870c5a7de08e944b47a46f77c01b9e9746db3745b61ac2735e6a324d69d3f97c6ccc539dd09009a2b2e82929bf333e8511b64cf4188a319d67c98fc1342485ca627e896a556ab3f42267196680d86cf8ba1c2fb3999007d0c6d53e18abceb03cdfef55ff487558ac220d575ba54a9dfd63b767527517a8236ea96fb1e98506e422a9702f90de9fb9d8d812610e0b7c90313b4a02656c0ec241313b1e09b1f4edfb0a796cbd9c5c3bcb86340ce075dae955cd40517f8bc532be07097ea39c6d5693a5e797c790c27e21f21f4d0010b089896dd16c7f017f949d25d3028e49bfbf957eb5095501514e157301dd88f19fce9de7e3348dd8561cdc9a4fc9fed7d33c90cb78eba16d5d7c56729e95f17941818e598052dc7097e3e31e33f000b132f9b6a332c7a2e701ef3f51343234f0819a23d1e1f967bfc4294e0d794780f5ad001ef06c4545c38d89b82568bb78dab63da346c0185c63e2222e0f12816077d831500a061229420ea1642d88cbe75db412ac8ad92e69ec1e7e5cdeb74dd4a75187fc6c9c69bd1040275838987d5a3b708c928a2e265e065d7b076eded55e3f5fc696524ba571d9732652b661a66ea51570dd66400d1b1f10e0f858ec41ebe5ef1335b18cb93b4cfe82ee5d0fa1b61bf3e6a27a351692f3d886eb56705cbec70707e077a887bb8c19c964b2d35db9331ffee879b06085375dd3ecb14db1e8df19d0055cf3d53a1aa1503979e3f13273e860b3ebd593eda4135ebca5d6e2b46edba24eb66b7f94b0c7b15b821d2df90fc8eaafcc43a834742e56e6a5ddd3888c81a7d6c400f1489aca1cd4b49351e8422b2efe6fa665c23e5bb2ccca7e32236ad43d3a0db4a0a6f0af39c69d86e2acff0f1f1c974fcc3cfbb56d0ba67af2afd0da10def028b9be639ec15686086671132c733e3950b4f3feadb7f0d809dca1d005e2fb1bf48381020a8fe220d55fadbb3819e2c615d53579aa4a0b80df1d652ee1f5603365888263bb42ee5fa4918c89e352ca9d03f1c0e3705d2c5e1ef936cd00168022a9d5e532bda16f0dc78e682b6738432a7a1de3ca5e5b0a9fc0dd0fbe211b0961e66e0ce163196a20ce3e27b3c86fad45be7360ff4d6f5742e8879dafca8c069b739d24a0224540dbf2d70364f855101012ea81045554d73e84ab77a8bf5e6964c598b995b233d9e88366c5285b1f9fba089ec9aeb796b7147e8239bb7ecbea774b47c32fbaa2356b506fbb64ec5296ca6091114ee49247fa8d87a3dfe8c5c24f5ef2b34edaf4be4fd8afe3217b0df2b0f98069829cdcdedfcd896c2e134b63aa8ea678718865dd598372a7580da939cb3440f77324389f04b235d775fc8823e8d83f27342b1e77945cb67b19318e704951cf7490d21821959d8938ee11dfbf6706c102011ad895c4cb6924b749a2a0be48f7dc42bdb5104dd325bdc7f20d9a9edfebf766e0a1116c363f72253efe81496ef18d2dc25b624662aa1416d6fe112a0ee9c05f723bcc66f49ea381867d064bb216810d370dabc138a1ae0a7cd8dcb897de769acdba07ba8c4dde97a7a7d819d55ac00769aef5179a6c35ef08506c838f42a97afef1009b05b0f6222c22a7b00b38ebe67e77580c5e04de87172b090239f541d8f03014652876876cca988205f79366d195b19a9c13612c64d941c1f3a2322b23af61816221a5cb875d11bb1a1040e4d43445305b8bb6ed7b8537a6ee6beb41a6bcfac615f75f34d695091f73b5153adc9126b4e2870c97553a108ea8f310330362389e3a0c1e9c65514019101c0abfbfc90ba09fa16d493a9a34ce9541d9f9e6c29fd5e5ad80e0e5d1d4c3a0640565a1b0fc31e0899b5e642a9f31e6c1f1653860b0ab16d7ff33f769919b252bcfdd40acae89db502b5bb3a8169fa011a7593eaea60b634fa0dd0542b00346d68b98c4f5d859d8879bfbffb2a109ce87d23c3320c3cfb345c22ffe4ea5a61b06e031f6da5633e922a360c0ae32ce2b5d3fd90e2bcf535ae35179c6ec274b2beccb09a73dd76ea900a02f46cb23fd57aeb12919156faa1e02e889778468fbda927be0e2ca56860fe45b614a5337990651e3709f7669b080bb472bd9de2bf2078f8d2a263904f5439d9b2f1dac57587e66685405c15f669d927a2e12532cd178396ca2dfd031085bb3684cbfa0c4fa97c6948c3815a665340248c546d3d3f002e6395d2e1f51a4882b7506dd7df5cdabef9b4980b028809ea704b49ff29ae883b6368237509246489000ed45d72908a1e63dd0e8194273554484d2955648d4e8a7fdea06f3cee3ee88fd68df12dd4ed332cde289761734800809c13afe33ea78b004fffe8e831a326d69e8f6fc6fdfa504d73fb422a6bd2887d624f74da47e8041de3d101bd7808bfc816be6afb8efe2fa5365d7613581eaf6ef37c6eea34dc2a26ec892b80a87448a48c781d7f0fc8b1d3be6efd3caf19bc0ea8d9d6cfaf7943f3dc9ff16de760e9599ce3304e72e3c0cc1562a565d6a1dba2507e9b62e6d5001cd49e9c76bfb89feceef0754252083ba5490424161a33a018eff99d16bdf1ae8ab68b08d55f1f0faffc45a8e8ac26bee27e00a18d5779be7504babd69d6972b11a67eab7651b179b3e59eea07143eba3e939e47feecc52673c764e95e04924aca5ed99f3b9d214c28dbf7cda24de26c2a1d4bca6d9a4817f69e33ab3d67db2d8a87f9375b7f7ce2b666debda202abc6a154d60bf39a9f221916142989784fb74e217ec62bc820d53d399dd0ded5490279b1cebb6273ac02cd996aea6a30fb66e83285bafbb0e1986f2eeea67e871c594ee91e96687cddd16aa4716378e1c037b5f32c13617b4143f21bb2bc03b2644d4084bf5be6a2959601f60ba5a40030af706788401b5067acde96bc30da3860c012ae65f59617a0e72883663605fffb2ff9b475aa8c761979572c942d16a6230fe594aef2a3de6bd3816c99276809241e9084e291f0e290527067df8032f0bdfeb0510393a2e02bd81c940ad1b71e97d4846b90a25884a8fcaa3ec170390780fb938de033058fde45d87d48340ca27b4601fcfe41e4b61dff68647613071825d4e22392fcc06569ec2eff66076b2b3d0e2ec5cadf2f57239f31ee7386b91397b2945da212ed611c6922668f015e2c5fc8e11a200aaaa05c3cd85b8a97bf5764284510c9e62e44b1613482ddd2e525121da94dd207c70ba3b36ff914376073320daab036567f3303bfa6418f8c04ebb6823011857cd4ee625dadbf600733a330d6e6cedd9c9939ffd5a05a04a764b76287ac9cdae69e0a604474a1a1e646ceb0cfee67b2b259a5332821300364dc90e917ec84851bd904c7c470659ce79a4ccaf134f329486792bd32a2ee02426607f1dad24fed79535b8017c60d0a4d24c0593d1e898fa7bc8b25c0eba3dbd82e2ab50bb21f96b592249e8d411e2631e033605dc4029e8c985e7493042221dfea9f43367b60cf094e71de1dd1cce96d1ca9e57ca2cd0cc8cbf57d976695d7d18a4b5e61106dfcdeb00fae45441a34314f409889e62ce48ea5f2b853db0c06c8ff9b85eeaf3f482466aa2767c8123f80d491ecb4717f58c5a1662ebdca83239dafaf2a802e2977611ea00841f843126d624dee3033fecde8f080f130f717a9cb372f0918086b88d84d7ad26e038f01832e8110b071cb3243637bdccae9e50419c7060566c21b7b132e9be82543d3ec071641dd2a9bace06bbe6e9ac9ba7b0b41e8cafc3b58bd334498cf3e9cc95f1fdd7ac6c8038837458491f342a8"}, 0x1015, 0x3) 18:28:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="e4b3131ee6eea131db0f34acc09e0c8c881c9552339de05fd8337234eefbfb620ffad6863374ff3dda9c3dc9b7060185ea8758dc9091aa8e8fd44b", 0x3b, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000140)={r1, 0x200, 0x1}, &(0x7f0000000180)={'enc=', 'oaep', ' hash=', {'vmac64(camellia)\x00'}}, &(0x7f0000000200)="5cbd45aa3ce7380f76ed8eb5eecb078fb61a77c7d1ad58", &(0x7f0000000240)=""/204) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) 18:28:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x300, 0x0) 18:28:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x80000000) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x100, 0x7, &(0x7f0000001500)=[{&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000000080)="543a24e8256f5f35e3e2af86ec724e3c82c3fbade2ac683be20236157b3ee6b164cf4f240b67fe1488b336ad3a9f6cda4a56c837d44c67fcd4162f1f3ff50afeec71b892930cbc3d6dca9e42779e43e3bed6af8086b94743b37835c3aeda5689433fc5dec69a1d1dc9ea31ad01fafb0d1893b0fb77802c14f14c0ad0bcaccefb7c333aedf7abe82735353e803a03092c82b7da35d5cb576878dc6843d285bd7a495d7d24e3c1bb0049184dde96f97f3c401fd4153147c8d321f1d6200ff75cef2474d7d0eb8ea9df19c95f4a5723b50202a8dd3b88351be3235f5e18706fb380b6b9578d", 0xe4, 0x1}, {&(0x7f0000000180)="88b379f6728e6fe99734349aeebfd4797e811008c3edb6f5b3b431aae28b833f870b0a23d9240f453d", 0x29, 0x7fffffff}, {&(0x7f00000001c0)="7c804730f2ed386179a5cf98f56499495d28710d635d83ac51c26766ca14", 0x1e, 0x3}, {&(0x7f0000000200)="ef53aa1e9ffe4fe2b9fe06920035a622706508935ec70b0709f6de85be9613174ddba3133b0703e2bd0793ede8a2aa3a162f88c5c4ecd1592bed1b4b99c9b8b64bc5af7fb03751e533912406fdceca775b88ea8c44597d43fd63c938e48d", 0x5e, 0x3}, {&(0x7f0000000280)="1dd54e02d28ecc751b252e7243cddd4030f1f14f5ab868f323e77b17d2f07ad5fc87068da7df5d2c09691afab6a08e6f710f281d85086a09d30e3f5efd3115cd5e1805ec7f2375a830e577897c4bba7a8f616b57823615e876cc8729ccb0e73b", 0x60, 0x20}, {&(0x7f0000000300)="8fb71a0b00c343b8a6f260eb33c34406dcaba323367e926329199dc64019550f7d1d4da46684b7ecb0e46f7864e5d0cda7558a88a567ccf7aefb820f8d9689eacab7fcca6e72199f537b003b5041775570cb0a96d568c842a9ba8df5692cc141590ec42f870b4f1d093af738457a9f4c72fa5f219687da4ca00807668d8726e41f80ee1f12167b844d800573862f05e93f820aef94a7cab1231b8674010d1ba36414c738b0e9f513950a12b0ace455b85aea0d38deeafb0a1a229e5054b3750bb698768f521c8fc74891d74a54ae58a83da4", 0xd2, 0xfffffffffffffff7}], 0x10000, &(0x7f0000000400)=ANY=[@ANYBLOB="6572726f72733d72656d6f756e742d726f2c6572726f72733d636f6e74696e75652c726573697a30301a303030303030303030303032302c75737271756f74612c6e6f646973636172642c66756e633d46494c455f4d4d41502c61707072616973655f747970653d696d617369672c0000000000"]) 18:28:59 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dilcard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:28:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000001440)='/dev/rtc0\x00', 0x1c480, 0x0) mkdirat(r1, &(0x7f0000001400)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x130, r4, 0x0, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x800}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr="8a44c76df0070479f1ea589aa7661720"}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8001}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xffffffffffffffff}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'batadv0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x15}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}]}]}, 0x130}, 0x1, 0x0, 0x0, 0xc041}, 0x20000000) prctl$PR_SET_FP_MODE(0x2d, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB="289a9a48106f59bd3d", @ANYRESHEX=r3, @ANYBLOB=',cache=fscache,\x00']) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r5, 0x6, 0x1, &(0x7f0000001380), &(0x7f00000013c0)=0xc) ioctl$int_in(r5, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r5, 0x800000c0045002, &(0x7f00000000c0)) read$FUSE(r5, &(0x7f0000000380), 0x1000) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c06, r3) [ 800.526645][T23647] JFS: Cannot determine volume size 18:28:59 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = accept4$bt_l2cap(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x800) ioctl$sock_proto_private(r0, 0x89e5, &(0x7f0000000080)="458f3a0451f1e2a7938f6e28b1e4fbe4a254d0a79df4887ef471e9794afbb2dc9ea18bb37e6ae83370644d74f127d5280611d90b47f1eff1a0026e8f5587c38d4f40d3ca869a86e56dc944c2f220b7511f0ee025706712413c0889cf9755662e1aaaab119f1a793b5e881cc5065fab3d0addb14762beddd13c65c33b092ba88744719ac116d04b540977894dbdca8b81af69239b574f29d252b61dfedc06f1e161e7a9419eb9fe43d2fa4e062f4bc4fd1c658cfa14b016f871fa47325a8e67d260f0f3cdc40e3c2128b45a20cc47881b823fe418a1e2093559cd7e") [ 800.547498][T23630] XFS (loop4): Invalid superblock magic number [ 800.567879][T23647] JFS: discard option not supported on device [ 800.583158][T23647] JFS: Cannot determine volume size 18:28:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x340, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@remote}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x10, &(0x7f0000000540)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_uid={'access', 0x3d, r2}}, {@cachetag={'cachetag', 0x3d, 'cache=fscache'}}, {@access_uid={'access', 0x3d, r3}}], [{@fsmagic={'fsmagic', 0x3d, 0x1}}, {@fowner_eq={'fowner', 0x3d, r4}}, {@obj_type={'obj_type', 0x3d, '(l\xc2security:.md5sumGvboxnet1mime_type'}}, {@subj_type={'subj_type', 0x3d, 'cache=fscache'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wfdno'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) [ 800.596465][T23647] jfs: Unrecognized mount option "dilcard=0x0000000000000008" or missing value 18:28:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000001440)='/dev/rtc0\x00', 0x1c480, 0x0) mkdirat(r1, &(0x7f0000001400)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x130, r4, 0x0, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x800}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr="8a44c76df0070479f1ea589aa7661720"}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8001}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xffffffffffffffff}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'batadv0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x15}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}]}]}, 0x130}, 0x1, 0x0, 0x0, 0xc041}, 0x20000000) prctl$PR_SET_FP_MODE(0x2d, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB="289a9a48106f59bd3d", @ANYRESHEX=r3, @ANYBLOB=',cache=fscache,\x00']) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r5, 0x6, 0x1, &(0x7f0000001380), &(0x7f00000013c0)=0xc) ioctl$int_in(r5, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r5, 0x800000c0045002, &(0x7f00000000c0)) read$FUSE(r5, &(0x7f0000000380), 0x1000) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c06, r3) 18:28:59 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'diocard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:28:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x308, 0x0) 18:28:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) connect$nfc_llcp(r1, &(0x7f0000000200)={0x27, 0x1, 0x0, 0x5, 0x7, 0x0, "bf40ce40eea6b015767c15fe5e9a4d0f5f08a03624477b7024b796356d969944e58e3f536e78b00533e3cbf9433be7ce847a40f50d1031a00377d71681e3c2", 0x1e}, 0x60) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trano=\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="2c63616368653d667363616368652c00dfa402ef65430a8ae5316fce0900000000b5aea8f3ec739c30"]) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x80, 0x0) connect$nfc_llcp(r4, &(0x7f00000000c0)={0x27, 0x0, 0x2, 0x5, 0x1, 0x70, "1390eea1666d6a48bc64f8f1e241a29d51a696d9d37a48b35b5b191eac017111714dca94a40589fb317becf0f4b3d461ce8cf5978c0b3290bf221251a7f516", 0xc}, 0x60) [ 800.938549][T23778] JFS: Cannot determine volume size 18:29:00 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x24002, 0x0) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x10, r0, 0x180000000) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000240)={'team0\x00', r1}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0xc002, 0x0) ioctl$PPPIOCGFLAGS(r2, 0x8004745a, &(0x7f0000000040)) 18:29:00 executing program 3: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) recvfrom$rose(r0, &(0x7f0000000080)=""/51, 0x33, 0x100, &(0x7f00000000c0)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @bcast}, 0x1c) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) 18:29:00 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x4000, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000040)={0x9, 0x8, 0xfffffffffffffffc, 0x6, 0x9}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 800.959384][T23778] JFS: discard option not supported on device [ 800.985954][T23778] JFS: Cannot determine volume size [ 800.999319][T23778] jfs: Unrecognized mount option "diocard=0x0000000000000008" or missing value [ 801.108049][T23870] XFS (loop4): Invalid superblock magic number 18:29:00 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000003c0)) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000000)={'broute\x00'}, &(0x7f0000000080)=0x78) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1f, 0x602401) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000500)=[@in6={0xa, 0x4e21, 0xbf, @mcast2, 0x100000000}, @in={0x2, 0x4e23, @rand_addr=0xa674}, @in6={0xa, 0x4e22, 0x5, @rand_addr="c14e3dbf10b789806015ff505e635aeb", 0x3}, @in6={0xa, 0x4e20, 0x7, @mcast1, 0x3}, @in6={0xa, 0x4e22, 0x1, @empty, 0x595c}, @in6={0xa, 0x4e21, 0xfffffffffffffb0c, @rand_addr="1736f5c2d192f399000d9772778c39b6"}], 0x9c) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e22, 0xffffffffffff7fff, @mcast1, 0xe}}}, &(0x7f0000000340)=0x84) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x84800) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000380)={r3, 0x1, 0x80000000, 0x9}, 0x10) perf_event_open$cgroup(&(0x7f0000000980)={0x3, 0x70, 0xb1, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x9, 0xff, 0x6, 0x3, 0x8, 0x8000, 0x7, 0x3, 0xfffffffffffffffc, 0x100000000, 0x0, 0x4, 0x2, 0x5, 0x10001, 0xffffffff, 0x70322961, 0x100000000, 0x6, 0x961a, 0x1, 0x9, 0x8001, 0x1, 0x10000, 0x4, 0xffffffffffffff96, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000940), 0x8}, 0x4a, 0xa56, 0xfffffffffffffff8, 0x6, 0x8001, 0x5, 0x1f}, r4, 0xd, r4, 0xf) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000400)={r3, 0x6}, 0x8) syz_read_part_table(0x4, 0x4, &(0x7f00000008c0)=[{&(0x7f00000005c0)="a81976240a553b4e64854a5fab1d88ca7f29a717ebbc04a18f256fb0ad2b9c1093f41ac2ee4e6e0b09bc89a75d9315034417b21d8361902514cb7b4fb79b50f7723a38bff590ee55d832e8d2ece9ec1a6cbd5f6627b4b358b3f0d01755a76e4ea0916fccf0bb80ee3a42e68d701f1d4db47b70f0990d1220c417f77bc1c976a8cd82936fadd01ebaa45fc365e64bbd181f50497c35934a76da7d9b0bfc37966540ff", 0xa2, 0x180000000}, {&(0x7f0000000680)="4ade88aec2cf29abfd67657ec363f8dfd0362cd23ab6201130e454331a950d1c2e04931fca7e3c10dd86aa3ad805bcd352caf92358e76db616bbe1213e3a40020a7ee9995f01d11e57bfc8459f4c116f95a3ddfe2b00e8efca5fa63a2894b5040010d8e59a9deee2becb6c54606f56774879e698eeef27fa130806d9e5159c3e38eda17646506b845ab48eafec7620f313affd", 0x93, 0x8b8}, {&(0x7f0000000740)="45e42d06080bdf9e36e97f44ff3272de625299a7df4bbc8d04d08b7f658ffada202aa9fea98e94743be95a08dbee829405faa25494ebd547f7ef5f4742578e177825406949324fbca3171888f9d4af3a3536ae4a3552c906a8c6fe34095d8bcfa03eedd7601290479b69642bda423a9c5bf4f329611849fcff8e3a6386e7c694c3b456432a21dd949bf6d8ffb6ec1b0afc8f23", 0x93, 0x1}, {&(0x7f0000000800)="7aaacd3a7f7a1eac6d059991ebd69d918ac5a936a09ac26a28c8349b9c0928bffb55507b5e3d642d78baaddad2c1fc92dc88cb6d3ead9f21eeba4aeef2170b74a2e5be94aa9374515ad3c878087bcc3e67053dc02313163feff5da0e139f166ec14423620549d3e410dd2a9a131fa5f229666f47ffa99ea2a97aa9b02555c3413fbb9264b7bd3e0e6f21725f7464a4f08d9020f5b5698bce56460f3d83af372938c913e4aa0b3c63", 0xa8, 0xc}]) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x84cd4a6472f0553d}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r5, 0x70f, 0x70bd2b, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0xffff, 0x8c1, 0x7f, 0x100000000}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x50) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffc01, 0x80080) 18:29:00 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dipcard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:00 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0xd93408f514606617, 0x0, 0x20000000001, 0x0) 18:29:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x300) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xe62e8cefb304e347}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="38010000", @ANYRES16=r1, @ANYBLOB="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"], 0x138}, 0x1, 0x0, 0x0, 0x80}, 0x8000) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x33c, 0x0) 18:29:00 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x200000, 0x0) getsockopt$sock_buf(r0, 0x1, 0x37, &(0x7f00000000c0)=""/174, &(0x7f0000000180)=0xae) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) 18:29:00 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f00000001c0)) syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x301002) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x4, 0x40000) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000200)=""/166) io_setup(0x2, &(0x7f00000002c0)=0x0) io_cancel(r3, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x6, 0x8, r0, &(0x7f0000000300)="b77528a97641f999f7fcef5f9205d200913b59d8247de390d7abaad7404e42185088ca60c825b3f3dba0d025c50aa889fa883b0f12", 0x35, 0x18fa, 0x0, 0x2, r1}, &(0x7f0000000380)) write$P9_RWSTAT(r1, &(0x7f00000003c0)={0x7, 0x7f, 0x1}, 0x7) renameat(r1, &(0x7f0000000040)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00') recvfrom(r2, &(0x7f0000000140)=""/90, 0x5a, 0x2000, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000100)={0x7, 0x7f, 0x1}, 0x7) [ 801.539884][T23917] JFS: Cannot determine volume size [ 801.549451][T23917] JFS: discard option not supported on device [ 801.573855][T23917] JFS: Cannot determine volume size [ 801.591318][T23917] jfs: Unrecognized mount option "dipcard=0x0000000000000008" or missing value 18:29:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x366, 0x0) 18:29:00 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xffffffffffffffe2, 0x200000) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f00000000c0)="ed03ba654c61356aeeedc9dcde6d8ffdf31d6dcd49a66ce7f3436f9eeba30fb13e49c459") lsetxattr$security_capability(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000180)=@v1={0x1000000, [{0x7, 0x2}]}, 0xc, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x0, 0x0, 0x0, 0x0) 18:29:00 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x24100, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f0000000180)={{0x0, @name="b6cd0f7e253a8089d23c3863cd5a531f28754772e04b8ba1ee94522773d6236e"}, 0x8, 0x17, 0x5}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x7, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xffff) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x280a01, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000540)="a19a0d3a56bde3cb4fae469a48a90f2c57849897d279152b62302f1d7a1a1923cf8e26478a6325edef2f21d4edc6eb4a25882c06955f12154a06cb75f06d36ed4d7675f75464f90149801c0faffb657916a8152558f56950a4aa0f471631f3f357067fa22397be650e137df18557ea4731d14a14df787966cb4edfc89ff2474a1857ab1c0baef509811edc6b0eb0e4ef3c70f43a14eb99c3bd8c20dc0ead518caed53ce749c95bbeb4505e1c8f733bda5a92bd8a906973a241acae3b7c3125f8d689a85da12f906f03ad82cb978cee97056f310a3ec616f8136bf90521c852a164753a8ba2d6997fda65bc820496142e30b971536fa655a250cde72d3b804b9b8a1df488bd716426a10d97e2468737b371c5e289ab7b747a00bd44dfdf2e374f80c5fd499c055de025a56c16ecfe955a18dd9e58e78ddafd047013e4b43ca6d822a04e86dc28d18a65ba0bb47b0d96c45b1609f5f38089438dfeb4115e2d9d861723f65a0a0344def2592f63a0001f33fb7d9581e3cd75ed187d392bd718121e94c1b23a81ec4cd52b357918c599619dd3451616f76e026c867188783049fe96d6d9bdd61377eede649a59966b0a1375cbaf5c82ff19fd9cc15d225baabc866023fc60c4b62ba01d7c80506f07da5988ef1e3388c6b51921403c2b738d7478b89629355785c41a5cda7b47a5fd713cbffea7bc13811d8160f9c5856143d23610f3059a32d325746420750768b70ebd84ff577747a7e6e6ab9982582383341c89dae59c06f723991301ca67fdb0586570c798af5a7e6dc6da0ecf76a4814dbcee4992c4fb73c6feecd097b5d4ef8186d526f948486eeccb8088faf134e38e48375f695060b2d64bd9f1d498fdba6d5af40bb0bac8d4202fa60f2177aa7eba23efc121c420e408ba641c3a5227f1c36337a6c1c8479a930297dcf7ab6986fb86ae13483c6b7bf06f4ceca281377495c2143febfe15cb7dc7928874e26fc85ffd6a7c4a517f19bd7f0baf3e4ea7b29404b7316d11403d2f926b6b5c48ef614e2471e09b3b3e37bcbf9b401da83a237264b4298a6349421e87d7e8fb5856524efeeb943b8e05dddddb36b058e114d47eac91a2b0902a9b46c7b510cfb08499dd06930ea8b519763756ea591b4df0b072cc21f90cf0dacc0e1bac7efacf88c602facae60223523118eca140ca527a3b957ceca8bae534a2c8694eb9b7c5f0553b1d10f21a8206b9d3136c8e20dd37bc1b42bafd42f2fcdb27504c9636b3782cf2bddaba08f957ce3201544b7c3764a914143ccd5f7aabaebe05bfd52f1e0663989b85d8f447a46f6b1e6852e7ac26771cc0e2c51d3d2feb0433fd4ba1b3df64111cd938354609190f5cbaecb8d78270e792f8e712cb344d8eaa9789e96a26bfc4b29879e3a8922c8905bea0e5740d88c3ecf7b7f7b132ad3a28450dc896d88321093b8ee66077c131fcec724291c36065c4c99af1bd8d1eda799c93d3b38cd15bded08e037546563b634436613fb75ef365f6b241317ccf90599627858fdb65282a624a2e64759ee76af628c5a0cdfa02c1f972a215a56fb278e667c52c964d72a66ff243ecb859172d8ac3c01f7dff12c01c686a6129eda07facefe743606bd8a51d9f9948ea1f753a5217fe3364d0926385736a6378c5940d0f24c221b9b166035dce925bed72acabd6568a040e87e96dc27f203db6913beca762431c8fb5c0541f4c167df00637dd25d1e39f6e4dbf06278af3fe1b2949b66cdc6463563c94d7531aac32af3d08f3c6d1db105ce923fc5959412b42262f21e1b64c4ffb090f72ff40f3622c231c8715e88e000a6e453648268cfc2cf489c3856154b25a225dd04014ec71d74b9ee629dbe27a6621d513103d9f43b276e9a6cfa07e50a00683644691ed8069398e2c99b4d0bfb24dcadd53ecae78a79426be53f2801bf31bf9ee563400a8f2834ae8293e48d90114fa034920826d87ff21cd3e597445b95a06a6cec41d83d860438ad9c73cd8f4d338f99e29907315f83a22b84ce686fa67ca5c498796bc9490b2364dda773d5d4f2d52ab18b4c6feb6dcfa648d1c7b594aa4fa60dc0126f789a4a87ac73f7ad8aaf77a51613e1259175684745b855bcb600a99c030834acc4e2a9e02e813c80c6a51d0a5b39458e06e43c7c8f6efe273f584a8d44ea0e69bae459773c96273c617c9f2371d7e234e31561ad2b69c6e651b8a1f6e7d6d95163b5043b03e39d62241b456b752df20be65f535701246083a2ad46d8cf4e531703c7ca747b4158bd963f27b1c3d43202da361d439624aa942d456056c3a4d2539d89113309683437b58e0c28848f28ec7cdfce77cfcf2d5aa5cf3ca914c95c9c4c36366039f982ca3acc0fc580ff69a5369badab15e56173d1dfd9b44cc8e0612fc63314a7dedb481fd29c4ceeb9d3c2b4709989d12060d8acff69c45ee046d2015e466be25ad997a6c0ac162ca3e2b1497095097620ba0e6b04f141aeaa92931cf51a99b728fe92c5dc38f0c2b93fb10615b3ac2c409cd79726daf9f370e82ca8c19191e53fbfe695d624728f58b5678d79aecf9b6e6f128866ce83e4e9b6e2a850f7bebb6550abb2422b2a9617b89bf5ff1bc1f14a18f12b719087064858f5ec659bc074c22a2f15d272dc6ce2027589f5d5e5e93031095e8d5f2bb109f70434a2b76bcc8625517880a9e2cf9367919c29c17748548dd66d92920d675b9c9d965b425c25e7758f6806f030731904840ae69320681f039322611068e46905fd3e195548e811e096507fb5187f344359a39bab623ca99e0cf7aeb80f8cf948fbf762f33d7e6ec072284d23fbdc85c8c6c42e222c0336a66f48012d886804e168b5721e218d43aff731eaaee3eaa5ebe216cf10af582f98950f7b90d17a3e7288cc297a8143a02661da6c519c753fe0c38a7877ea73acf55480e58c2232a1b82e01c7f15b33931be9c1f01bd497c60f585800983d77112206bc6bde2e22dac48d7eafdf3a533dcaefa6487bebb05bc65fda18e22b3f72e96987606fb7b67b5bcd69d36d028c006ca285eda0d0f3a33eda19a64fd2d5937c771a2a7781c998e4cb46a064c55ad5b6b1f1b2fe173b695772fcf9b25380867b183caedfcf8ed620084bc56b0e61c0dc99d25a22d44d166bd0235b6cfb6d92a61ddbb0c678bd5187d0e2b4ceb4da70e1539b03d74c8eb5e5b5dbc5dac30c9bb9764164e648b5392214fcfa8e6c2585f0e12b47d6be87c1ba17f4631d3416fec781c71baefbaccb070ba849d3b88e2367a8679bb88f9b4e0136f965a35bb1a488c3613430b08ccc01f211c0d46a454d449c153d0bb8c6155301aea6d1777beda176fec331ca8f3a692c4d72aa5f5665b3e7e2f55ca0e7628bca93224c0b8af015620681327f6ca8787f217bbac75aef597f4fabd2ef007be2d93708930870eb22e519446185baaa85d73b11650b48364f2ec935450da98234eaca6272661f73d6e233924a045f845f43e898ba2715aab590eaaf8b4ca1815baa0e11bb444ea2ca2b173185d3de342aa082dab7298192f42e9e85a3860c24e3240ab43c170958575ee62d014e981b437c012e11f0ba721b217d31a56951b9bd2cfb802af68b292923523bb0cb178dbef82159ac0555f79518018c241e2fe024baa753bc00621c306f472f9b4578d449f899fc9311ba8226b11085200d364582d61043fcd790ebbc8cad32c563cda77e1873bcc86ebb2be4d361ada71c606b2c7feb5e11f27efefac36373c6c6df59fb57e40db38faba151efce682da7bf5d7c02e799563e744033ea64cbde1590c8a9f4913853c6ab8cc4e4e52519095bba02ede7d34edc2c6a4cfb8a976377e86e0fa38a99acc593ea538d2abf8e0a5015e4296ccab3f999ff143d014a6741c7fd4eb58d7b243744bb555018c80279771d1e4446d2bd9cccfe1a0e5906177d2ef0f039c46f8986fcc01a4911d4344ca7ff9e4075b3719287258a47d05cf1243f81c208f2569e9cb757b2fb8d751ffde1836de2438e4519a80c1570d8d7f4e17fb7c1077f76188671536fcb632e6c29fb6e8a15be74cfafad73f8681606dde546586a7fd0aea0126d91dce7d483e14d3577cf727b90f0ef5d82adbbff009953e77776d4c9cf169025d697626f1c036214d090f4cd975975343474c3140f18aa63c14f9dd3bbf39b8bb8ec49176074942af3ca489b72afdfb44cf3c3b826efa843b4e640508222a531d0522ff0e7384aea643892d5c6a537b5b94c5a0e5d2efaa2d88505a517921ed8e37e53e8e43967bdaac675be1083951267a06e948a4dcd240ce45955bbedf5c30c1cd343ae13b0ff53dbbaac46c5990ad3a24deb5bd883d1073386d93fea874d3cc674f75ba9a2a58b3bc02aad9aed3f8182da3d0358ee320c23f0ccfab7d6bc9c2aa3f68c6e011652dbcbcbab9d21eec8b245e8746d04354eda9b43d0657a11c89575a9bb602f9ef385560ffb952b4b86b52f23954f08dae46fe0cc279646d6e2aaaf38232ec9440c322e3875df88ac5635ee820a618c365ed92af160a913f76ae58548440c4effe6976fd1c09384873845998bdcd4324ba90c4e0563d16afb992055616f4350036034c19e628491943c93b5a3c7be17a4e5cc1ca0995640e917990ac23c04de481edb6c9efb46065f0ccdd32fb6f9da3067af67ae11d72f21e75c8593bd83a98726eadc2ca4880a600007a77ab725fc2f0f076654490c69735e50ccfd695628a9b53090419d2974866179c7cf5ead719fe430b94b4ee4df9894d19b923f8cdffb50407ad38a9784c4d6aa83ba0df98cf2068ca03b453289f1f911c42a1cb11503d39f505eb572fcaf9c1075d2aadf9fa160fc87bc9e885c830e8242a43393208c48d6a37f11313e42fc5373772d149e710513a19440fc40dc1c11990cfe245ceac064879fb1005687ffc30b8c162952a75a66780e81e2f12654202a1d6d2a09ba1b1b87def6433eeda9452f660ab32ad78a44fe90b502ba783b9ef2d1a729c2f835da89a40a1e8a855ddabd09dad6689f97acaf289296c1cf4b55e543a45b14ce0aa03aea5de19b7c15ab04ac8365d76e6d773b6e5f59c9eab22ff88eb2f2006057a1ed3cf970c212bfb86f2a2c63f8f12ecad5b7e3abf257f4b552abf8c66b1c6659fec9cee3f74738f37615effcb0dcefa9a626b1705a80e1a9fe21ddbef8e0ddc128e6f0ee3d6d94470d1ff2a0821c375a6880394cb029660107c18c4d752add312735478bc7de05d8bf45fd21d52cb049a3ae36e7edda7d9059ffd53e2ae15cd0df5d2172db199e620a0d69f2699bc56bb858052b121f2d757cb6fc45c8563ca06663a3bd2e87db8343cf6c7604fe1a0be7bf754d2a1188587d4284c3f73719a87d64603dbf10ae1a20fd33336011c150dbea5d1e15e57ae323011629c65f36f78e6fcc271e0a14e4e1b217e6a6cdda48b59ebbb8ed24ac7b1c63ffe36947933f15adf2f0fdf68e77d3b03cdaa6f63c644276834a59e9bbca7a9b2efaac17dc9b59c10dea0b0f25d7e50995d306c2cbde0800a0fe15de93ce9733a99973e7b7bbd64abecbe06a888924a547d9de07f8442571f36a618bbe614476662b4a474cd7abf5a9adc321a32dc0567efded696b967c661a27145cbfa17afec2cd1d257d3b1d2e35bbacb474f14a57f96220317dfd1c248fbb64d43b528c26ce7ef63d2b15ba6ddaf1dabe2f935817969bf72942c46d04fbf0402d1a1e2787528cf25dc4cd7af8e0a39016750bcfaa5713450c4abb3cce50b119cb3247171f21801e208658f08cfaa3a605b8767f492a78c12", 0x1000}, {&(0x7f0000000200)="61042bd4d722a3f025eec1190b1e96227abd1eaa68669cbd117271acaf38c81cfcaa0ad69299581497ada0fc2dcd0c6184c850dcfb7c478d44571979a33c47bc3fc57dfb946651b1b8954ba910162f6b855f23c7a2b89a87b1a9970f7e15ef32a35a478b6929a7117e7a7583a35a9d5711ef2b57d11442d9b60da6f2c7902129f8fa19c05b7d6f5d9c92cda1a53c35a503b5a117e5d5035b76afb73a9fcdf2351ce9e904c9e6e73132816f2530df2a6d40d02bd19091b38627ec7508b3d879395f3ba8b2b30cf3764d4651bb6d45a69f9a480c3de4605d96424a927b9b297687bb1e0de8e0da6cf0ba4d8720491dd2", 0xef}, {&(0x7f0000000300)="13bcaa82d3c5481118b2be39c3eb105b80cb2d38b353d6b9ee2cf0dd12c12a9cd714529057dfe6ec4e10fbabdc1119cf8fc0c3edee70e65eb1e51d4abf9f62ff86fce1733b68e8cbe4a11943dacb0656a9af34aaae779fa6f47f6c13b42eb801375d9ce2b46cd237ffb786b5a2895741edf6116a6961c6afe02c89b1064a11d26927f351a6e3154b24e4e76a9fc5bf4695c9f38ebbec8ba6b7686f9146bd39d79acab3b8fcc0f7f9c239cd621cb5b01396ff0022be77951047f5b61b8b57e109a8f0ac52793185af1f4fa4b422818c7676448c76a6faed8aa11a7c81533993fa17dacc", 0xe3}, {&(0x7f0000001540)="de3c24275226ac6d013dba5209df780c826f1c65d36eda486a17d9d93030ef127051708a3829ef95e9819960005fab95312f017b856f946ac8bf782cae276d34cc407861c01c23e310e9a0dae6f472d0540fbc74ed48838ca02308912814aae816579201aac8fe8b846d1022af06e5ac5a01ccc7a97fd3e29ab1910a0bbb11a30a4633068bc7021533e4d60f803fd2d95b94510bd61dd71d4676ec565cad287ad3385b906451cd02f51ca9fbc04b653e91b54851b1f3cb238d102390453a1cff43a51f5ba4b74d8683b7d22e30046ab55642a3d250fccea215d3da39b79ba96f202d20c50ba54e2eb1289411195463f7acfb32c2aa420c3370", 0xf9}, {&(0x7f0000001640)="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", 0x1000}, {&(0x7f0000002640)="74edb19dd408561ec0664ff9a839c4fa2e4d1516140fcdd7e06e26796c6a002a7fe0eb978f88f65ef7f73cba49c9af1ca4a72486f00312b0018a021d5ea0a9821ca62f8c9c62a983dac01322261a524a61e843bca9c845f48d2945a85c3844e1ee03fe4b7a06ca0ddc4bdd611ef6783a4b3ecafe9c98d2525563eae4c15fee417096de3ab3f136fc1658d8d88ece66c2f5f7b3da859560cc067800198f4b603a1e8c6a8e545942a1a071e935d15480ecfa74ac9000c864e2745df6e045679b01f834c8c78b8a2df5c73223", 0xcb}, {&(0x7f0000002740)="f088ae01830b420b002f4fdcfb70c0962e6f302985ac19d55a179837045b6bebe266574aef267d79817c83ea03744c39200bdfbb47c5993145568baf573ff45ed9697ef505f57988059bb3acad3a512caa5426bd5b88868e77d5a6c93a70691bb75d85860f6d3869c0ca4861bf8bd077d59f820e76d17f064bfb47e6c132a67ed8a64596bc37d3c353b65163dbc1876b878ce46a4695853ff16747a0d323b58075f8b1b12787921fc513fa57538304c8", 0xb0}], 0x7, &(0x7f0000002800)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x4}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x78, 0x117, 0x2, 0x64, "272aa5d94fa65194df274afc27970ed5d7524c8ddcb03d16393cacdcd4f66273ec4c54155a9e92d0662122c927f3d7cb8f801afb3d1cdba196520a3ffa2652f9573afc949b9f1599e5d32d09aedcf8565247430e1dfb186ddc5ea0ef6152a2315fb8bbf8"}, @assoc={0x18, 0x117, 0x4, 0x100000000}, @op={0x18}, @iv={0x110, 0x117, 0x2, 0xf5, "da835f2662a0929e91870048a89e950cdf3dd870cbef2ad1fcec3ac8bc7b47b2081d3cb05349e056ab131067a533e7701c65a693cf41bc3cda24e8cd3f9b138840046776dde454559f6ee31da18126bd5544002815ebf1dc1701fa494c93f634913f2ae2141da15c83fb4c65b6daf9815aa45317d1d56d1a408db5aaf4d99c48b610897dbd0b36119c4cb4e40cb2a9548ce4473fde531968d04da22e0afb93b4c70883d28012a8014d644f71f9f71893fb14d2d13d665ce298e520b6e4657237c65bdf687bdeadc73f1842623f16958e1db2ce8f723e8c7a146a2e3b97e9d892ededcb98b66e71be61fb7070d2f0092dccd96ee902"}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @assoc={0x18, 0x117, 0x4, 0x2e}], 0x1230, 0x40000}], 0x1, 0x10) setns(r3, 0x60000000) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB=',cache=fscache,\x00']) 18:29:00 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'diucard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 801.899112][T23939] JFS: Cannot determine volume size [ 801.913004][T23939] JFS: discard option not supported on device [ 801.929574][T23939] JFS: Cannot determine volume size 18:29:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000000c0)='.dead\x00', 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000180)={0x7, &(0x7f0000000140)=[{0x4, 0x7, 0x2, 0xcbc}, {0x7, 0xa08, 0xffffffff, 0xa9fa}, {0x9a, 0x10000, 0x9, 0x4}, {0x1, 0x7e3b, 0x9, 0x5}, {0x400, 0x0, 0x3, 0x400}, {0x100000001, 0x1, 0x5, 0x1}, {0x755, 0x7, 0x400, 0x2}]}) 18:29:01 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f00000000c0)=""/226) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x7) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='t=\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',cache=fscache,\x00']) [ 801.941301][T23939] jfs: Unrecognized mount option "diucard=0x0000000000000008" or missing value 18:29:01 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x11, 0x3, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000100)={'nat\x00', 0x0, 0x4, 0x44, [], 0x2, &(0x7f0000000040)=[{}, {}], &(0x7f0000000080)=""/68}, &(0x7f0000000180)=0x78) sendmsg$can_bcm(r0, &(0x7f00000002c0)={&(0x7f00000001c0), 0x10, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="06000000080000000000010000000000c66d8a7a74c65c6850d7ab75d130f38577b35549011a9c12434a25e7f09c4adcd70cfd95f386b2ad35ca54fe2a4b0a16e12cd50d8a2d724f01ee8bc332bb5b5a6103209d95d46d5b7083530dd96fefee5086dbc5d34d8de39730d077b86a121f0bff042a98609d2e99c591bf86836af7537021e1c754a4331c", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="0300008001000000040000c027010000a0492ba52456f88ad0dffa77a45f8c0313ccf5888eb78020b8b4e2d4a5947aaa6b30fea78338dd145a8aeacab46dce26fbb4eb5c2520ac9866cfbbc34cb94983"], 0x80}, 0x1, 0x0, 0x0, 0x1}, 0x4048000) 18:29:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x372, 0x0) 18:29:01 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair(0x9, 0x80b, 0x40, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) bind$packet(r4, &(0x7f0000000540)={0x11, 0x1b, r5, 0x1, 0x3, 0x6, @random="a0ff0cdacc6e"}, 0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0xff, r6, 0x1, 0xebc, 0x6, @random="ff6add159eb7"}, 0x14) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) 18:29:01 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dixcard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:01 executing program 0: socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) write$cgroup_type(r0, &(0x7f00000000c0)='threaded\x00', 0x9) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000100)={0x100000001, 0x1, 0x4, 0x4, 0x1, 0x8}) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000040)={0x2d, 0x38, 0xb, 0x10, 0x5, 0x2, 0x0, 0xd3}) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 802.344624][T23965] FAT-fs (loop3): Unrecognized mount option "hash" or missing value 18:29:01 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 802.397294][T23974] JFS: Cannot determine volume size 18:29:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x378, 0x0) [ 802.437902][T23974] JFS: discard option not supported on device [ 802.456874][T23974] JFS: Cannot determine volume size [ 802.493961][T23966] FAT-fs (loop3): Unrecognized mount option "hash" or missing value [ 802.506629][T23974] jfs: Unrecognized mount option "dixcard=0x0000000000000008" or missing value 18:29:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) write$cgroup_type(r0, &(0x7f00000000c0)='threaded\x00', 0x9) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000100)={0x100000001, 0x1, 0x4, 0x4, 0x1, 0x8}) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000040)={0x2d, 0x38, 0xb, 0x10, 0x5, 0x2, 0x0, 0xd3}) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8, 0x0) write$P9_RREMOVE(r0, &(0x7f0000000040)={0x7, 0x7b, 0x1}, 0x7) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:01 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x4, 0xffffffffffffffff) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000100)=0xfffffffffffffff7) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xfff) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="00000000000000006ada53463956c05004c3fc864ff0ebdbde008b49e17d5f6ea2d3b980efdebb6e40ed9a8bc690a4533d90cd833f120d40feaaa6a603abcc0fe1cb20a8f1127e27eb94ac96939ebcfabf86a3d2ec03ef9f1f2f2b42ace93a46f63d944d1f4f765ed53c01"]) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x109000) 18:29:01 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\x02ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x380, 0x0) 18:29:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair(0x9, 0x80b, 0x40, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) bind$packet(r4, &(0x7f0000000540)={0x11, 0x1b, r5, 0x1, 0x3, 0x6, @random="a0ff0cdacc6e"}, 0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0xff, r6, 0x1, 0xebc, 0x6, @random="ff6add159eb7"}, 0x14) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) 18:29:02 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="744f61000000002c7205006e6f3d", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',cache=fscache,\x00']) [ 803.010682][T24000] JFS: Cannot determine volume size [ 803.015943][T24000] JFS: discard option not supported on device 18:29:02 executing program 5: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 803.051540][T24000] JFS: Cannot determine volume size [ 803.075767][T24000] jfs: Unrecognized mount option "disard=0x0000000000000008" or missing value [ 803.079983][T23998] XFS (loop4): Invalid superblock magic number 18:29:02 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1000000, 0x101001) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000180)=0xf7c, &(0x7f00000001c0)=0x2) openat$cgroup_type(r1, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xd}}}, 0x0, 0x8001, 0x0, "50ac4dff8cc361609535de2c13baa3e6b3f0ab6cef6cf7d2fb6895149b9f843f2c7783e153c3d8d2cf6e5beaefba3f934964ef7f6a957db0790a7140bd5523b15bd752473a89f62111a34d5d7cfb6e6c"}, 0xd8) 18:29:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setpipe(r0, 0x407, 0x7) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x880, 0x0) ioctl$TCXONC(r3, 0x540a, 0x1) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000180)) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'veth0_to_team\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @local}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000001b40)={@remote, @local, 0x0}, &(0x7f0000001b80)=0xc) sendmsg$TEAM_CMD_NOOP(r3, &(0x7f0000001e00)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0xa0000}, 0xc, &(0x7f0000001dc0)={&(0x7f0000001bc0)={0x1d4, 0x0, 0x2, 0x70bd2b, 0x25dfdbff, {}, [{{0x8, 0x1, r4}, {0x80, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r6}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xdb}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xee29}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}]}}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x1}, 0x880) write(r2, &(0x7f00000000c0)="0c735bdc320216ea4f5b0b23c4166007ac7b9510c11ba36e8097afcdd4db1554932ca539f9ae44b174d5c4c566fae1a7f806522c3ad0678df3714a79e0a3e1815ecfcf917317d00df1f1f22d5224e8f75f27e4988d404c1deb43d9b59cf71a045cc0643868f4ff9cb79a1b82211f36f0c2fb675e9706bc6c8317d0d8ce254069de08d4f871e1c353908f72839a5e1e69f978", 0x92) [ 803.141011][T24009] FAT-fs (loop2): Unrecognized mount option "hash" or missing value 18:29:02 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\x03ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x3c9, 0x0) 18:29:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair(0x9, 0x80b, 0x40, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) bind$packet(r4, &(0x7f0000000540)={0x11, 0x1b, r5, 0x1, 0x3, 0x6, @random="a0ff0cdacc6e"}, 0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0xff, r6, 0x1, 0xebc, 0x6, @random="ff6add159eb7"}, 0x14) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) [ 803.420540][T24030] JFS: Cannot determine volume size 18:29:02 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e20, 0x3, @mcast2}}, 0x1, 0x3}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={r1, 0x6}, &(0x7f0000000180)=0x8) [ 803.440791][T24030] JFS: discard option not supported on device [ 803.472743][T24030] JFS: Cannot determine volume size [ 803.494934][T24030] jfs: Unrecognized mount option "disard=0x0000000000000008" or missing value 18:29:02 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\x04ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 803.590672][T24139] FAT-fs (loop2): Unrecognized mount option "hash" or missing value [ 803.620187][T24126] XFS (loop4): Invalid superblock magic number 18:29:02 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1000000, 0x101001) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000180)=0xf7c, &(0x7f00000001c0)=0x2) openat$cgroup_type(r1, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xd}}}, 0x0, 0x8001, 0x0, "50ac4dff8cc361609535de2c13baa3e6b3f0ab6cef6cf7d2fb6895149b9f843f2c7783e153c3d8d2cf6e5beaefba3f934964ef7f6a957db0790a7140bd5523b15bd752473a89f62111a34d5d7cfb6e6c"}, 0xd8) 18:29:02 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x40000, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000040)=0x3) 18:29:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x3cc, 0x0) [ 803.825547][T24157] JFS: Cannot determine volume size 18:29:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair(0x9, 0x80b, 0x40, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) bind$packet(r4, &(0x7f0000000540)={0x11, 0x1b, r5, 0x1, 0x3, 0x6, @random="a0ff0cdacc6e"}, 0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0xff, r6, 0x1, 0xebc, 0x6, @random="ff6add159eb7"}, 0x14) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) 18:29:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB='\x00']) [ 803.877227][T24157] JFS: discard option not supported on device [ 803.906393][T24157] JFS: Cannot determine volume size [ 803.912159][T24157] jfs: Unrecognized mount option "disard=0x0000000000000008" or missing value 18:29:03 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10002, 0x0) r1 = getpid() mq_timedsend(r0, &(0x7f00000001c0)="9647f3e1a309d99ea103f84d6f40dc0130c432c0954f", 0x16, 0x4, &(0x7f0000000200)={0x77359400}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x5, 0x6, 0x0, 0x4, 0x200, r1}) fremovexattr(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='btrfs./dev\'ubi_ctrl\x00']) mq_timedsend(r0, &(0x7f0000000100)="8e226669f736d5afe0652aa2bfb0883c63e554ea3f2fb0c112b929e765a545bba016824889d0b5f5ab2a8717b746a26fc534df44302357afd288a893f957e491759bab339ffb7f182f8a611eb1996513ca95d1c859b94e14a87d109852029a4ccff1e1a360ce82c86ccd872f115f5d564f6d10e17e318892cc", 0x79, 0x10001, &(0x7f0000000180)={0x77359400}) 18:29:03 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1000000, 0x101001) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000180)=0xf7c, &(0x7f00000001c0)=0x2) openat$cgroup_type(r1, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xd}}}, 0x0, 0x8001, 0x0, "50ac4dff8cc361609535de2c13baa3e6b3f0ab6cef6cf7d2fb6895149b9f843f2c7783e153c3d8d2cf6e5beaefba3f934964ef7f6a957db0790a7140bd5523b15bd752473a89f62111a34d5d7cfb6e6c"}, 0xd8) 18:29:03 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\x05ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 804.047228][T24259] FAT-fs (loop2): Unrecognized mount option "hash" or missing value [ 804.130769][T24222] XFS (loop4): Invalid superblock magic number 18:29:03 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r1}) ioctl$SIOCAX25ADDFWD(r2, 0x89ea, &(0x7f0000000180)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffff9c}) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000140)=0x0) prctl$PR_SET_PTRACER(0x59616d61, r4) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) 18:29:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000), 0x0) socketpair(0x9, 0x80b, 0x40, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) bind$packet(r2, &(0x7f0000000540)={0x11, 0x1b, r3, 0x1, 0x3, 0x6, @random="a0ff0cdacc6e"}, 0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) bind$packet(r1, &(0x7f0000000100)={0x11, 0xff, r4, 0x1, 0xebc, 0x6, @random="ff6add159eb7"}, 0x14) [ 804.294696][T24391] JFS: Cannot determine volume size [ 804.313873][T24391] JFS: discard option not supported on device [ 804.324278][T24391] JFS: Cannot determine volume size [ 804.331295][T24391] jfs: Unrecognized mount option "disard=0x0000000000000008" or missing value 18:29:03 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8, 0x791b3c04f5d53a00) fdatasync(r0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x7, 0x6fd, 0x3}) setxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) 18:29:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f00000000c0)={0x6, {{0xa, 0x4e23, 0x5, @empty, 0x7fff}}}, 0x88) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) 18:29:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x3e4, 0x0) 18:29:03 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\x06ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="7472616e733d66642c7266646c6f3d6852d12edb5807514ab45eadad0fa2cac6ce1dce02707a37a3d335fd8ad3d0dd0c3c42cbd393127ff99830a522ce9e20740deee6fa74944c46ca56af1d30a3512514590e5145e2f628f9c437f5b8cc4d8dd5f90ca638958b1d2a3c82b0ae6570", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',cache=fscache,\x00']) [ 804.526939][T24459] FAT-fs (loop2): Unrecognized mount option "hash" or missing value 18:29:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000), 0x0) socketpair(0x9, 0x80b, 0x40, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) bind$packet(r1, &(0x7f0000000540)={0x11, 0x1b, r2, 0x1, 0x3, 0x6, @random="a0ff0cdacc6e"}, 0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) [ 804.706167][T24515] JFS: Cannot determine volume size [ 804.717428][T24519] 9pnet: Insufficient options for proto=fd [ 804.724447][T24515] JFS: discard option not supported on device [ 804.725560][T24521] 9pnet: Insufficient options for proto=fd 18:29:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="74e782cfe747c77e3f726601000000", @ANYRESHEX=r1, @ANYBLOB="2c7766646e6f3d7d5bc5de3c870bc6491886579eaa0a37875028546ab4f49a1caa6d81f5959b7b55fc76366fcba03062c9075586702b014beda3d75d2c6948e47adc55f2359097338807084c81d39a8c006fc7c394cb44a80f9b88f342e32651f3485959b5b3a0c55d97db6b", @ANYRESHEX=r2, @ANYBLOB=',cache=fscache,\x00']) [ 804.758910][T24515] JFS: Cannot determine volume size [ 804.769601][T24515] jfs: Unrecognized mount option "disard=0x0000000000000008" or missing value 18:29:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x3fc, 0x0) 18:29:04 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\aard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:04 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x80003, 0x1) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000000)=0x4000000000513, 0x4) sendto$inet6(r5, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) dup2(r4, r5) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) 18:29:04 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x28000, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000100)={'team0\x00', {0x2, 0x4e22, @multicast1}}) r2 = syz_open_dev$sndpcmc(&(0x7f0000000300)='/dev/snd/pcmC#D#c\x00', 0xe7, 0xbfffe) r3 = syz_open_pts(r2, 0x1) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000140)={'mangle\x00'}, &(0x7f00000001c0)=0x54) ioctl$TCGETS(r3, 0x5401, &(0x7f0000000000)) [ 805.080971][T24529] FAT-fs (loop2): Unrecognized mount option "hash" or missing value [ 805.125095][T24535] JFS: Cannot determine volume size 18:29:04 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x404000, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000100)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) 18:29:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80000, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f00000002c0)=0xa5) sendto$rose(r0, &(0x7f0000000040)="6198bd5404c2817cd88b993ea4edc44f873d57cd86e8d72f5ab0b30d618e6d7c9a1194d1ab77c13917a391fcb18faec0b0996ced64e86a797020522f70a8789fac84d0e8eee4704be964c78509e09dde5418e083f5b3f1495c15ce7bb956d0a071c8121ea56d60abbf690a8fb443eadd0f8b532fd2f22ebf0c74873283741ababf3f6640b0ea5d3ec26001f53a9fd84255c17234e874c521ce5f4b82b049b076626a0881a223e3023d9e0324cc9cc84ae276ceeed18edc7b0cc6c09796a87c8a7956493739540c3a646f920dbf6899f0f5019a39a1dd1657adadd149b356f5297039", 0xe2, 0x4000000, &(0x7f0000000140)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) sendto$inet6(r0, &(0x7f0000000180)="31e1c468d673ecca68c8d7e88065b757812fd657501fac4a0185e5007ca1526efd0463d1fa03633ca4177deb52bccd80936af7486c594937e684406b111b510b7de97c06fb52f62cfcdaa10b5c6e937ad1951704e41fa546589ddeab6f065a79302880f44b519c7a6bf4025662394c4c71089dfd03d6facc0c910fad12d4061b801f38b99206c3c1b2debb8638aacb35c1b1650cf1387cc5f2cafd526e23ae42e467f01f298b59f041d55952702e9427a82cad01de1a1d2d36c34670b2034441f39d18faae023322cd7dcf2a9281683fb2a0d9a3", 0xd4, 0x40800, &(0x7f0000000280)={0xa, 0x4e20, 0x2, @mcast1, 0x3ae}, 0x1c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001840)='/dev/hwrng\x00', 0x8000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) 18:29:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000), 0x0) socketpair(0x9, 0x80b, 0x40, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) bind$packet(r1, &(0x7f0000000540)={0x11, 0x1b, r2, 0x1, 0x3, 0x6, @random="a0ff0cdacc6e"}, 0x14) [ 805.146649][T24535] JFS: discard option not supported on device [ 805.173735][T24535] JFS: Cannot determine volume size [ 805.183068][T24535] jfs: Unrecognized mount option "disard=0x0000000000000008" or missing value 18:29:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x3fd, 0x0) 18:29:04 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\bard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:04 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x4375b053, 0x0, 0x0, 0x400, 0x0) socket$xdp(0x2c, 0x3, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f00000000c0)={0x9, 0x1, 0x2}) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x10000, 0x0) syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1fe000, 0x0) [ 805.439991][T24553] FAT-fs (loop2): Unrecognized mount option "hash" or missing value 18:29:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80000, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f00000002c0)=0xa5) sendto$rose(r0, &(0x7f0000000040)="6198bd5404c2817cd88b993ea4edc44f873d57cd86e8d72f5ab0b30d618e6d7c9a1194d1ab77c13917a391fcb18faec0b0996ced64e86a797020522f70a8789fac84d0e8eee4704be964c78509e09dde5418e083f5b3f1495c15ce7bb956d0a071c8121ea56d60abbf690a8fb443eadd0f8b532fd2f22ebf0c74873283741ababf3f6640b0ea5d3ec26001f53a9fd84255c17234e874c521ce5f4b82b049b076626a0881a223e3023d9e0324cc9cc84ae276ceeed18edc7b0cc6c09796a87c8a7956493739540c3a646f920dbf6899f0f5019a39a1dd1657adadd149b356f5297039", 0xe2, 0x4000000, &(0x7f0000000140)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) sendto$inet6(r0, &(0x7f0000000180)="31e1c468d673ecca68c8d7e88065b757812fd657501fac4a0185e5007ca1526efd0463d1fa03633ca4177deb52bccd80936af7486c594937e684406b111b510b7de97c06fb52f62cfcdaa10b5c6e937ad1951704e41fa546589ddeab6f065a79302880f44b519c7a6bf4025662394c4c71089dfd03d6facc0c910fad12d4061b801f38b99206c3c1b2debb8638aacb35c1b1650cf1387cc5f2cafd526e23ae42e467f01f298b59f041d55952702e9427a82cad01de1a1d2d36c34670b2034441f39d18faae023322cd7dcf2a9281683fb2a0d9a3", 0xd4, 0x40800, &(0x7f0000000280)={0xa, 0x4e20, 0x2, @mcast1, 0x3ae}, 0x1c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001840)='/dev/hwrng\x00', 0x8000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) [ 805.540063][T24658] JFS: Cannot determine volume size [ 805.572331][T24658] JFS: discard option not supported on device 18:29:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000), 0x0) socketpair(0x9, 0x80b, 0x40, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in=@empty, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) 18:29:04 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x60040, 0x0) ioctl$sock_ax25_SIOCADDRT(r3, 0x890b, &(0x7f00000000c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x6, [@null, @null, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) [ 805.595808][T24658] JFS: Cannot determine volume size [ 805.609437][T24658] jfs: Unrecognized mount option "disard=0x0000000000000008" or missing value 18:29:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x500, 0x0) 18:29:04 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\tard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 805.721541][T24675] FAT-fs (loop2): Unrecognized mount option "hash" or missing value 18:29:04 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x9ab, 0x40) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000001c0)=0x5) r1 = mq_open(&(0x7f0000000000)='jfs\x00', 0x40, 0x22, &(0x7f0000000040)={0x1, 0x1, 0x1, 0x0, 0xfff, 0x400, 0x1f}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x400, 0x0) fsetxattr$security_evm(r1, &(0x7f0000000080)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="02f52b6bad4307a75d35316f99cab4f6e54562d2b218149f45ff81898acce6e01e0576de30fed6e94a64d8e37337cdbb874d87d15d0fb3da3f3f2035c9ccd8a2954c79396d4bf8f11659565a9356e6e76135dc2ca63fe5"], 0x10, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000200)) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f0000000240)=0x8) 18:29:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000), 0x0) socketpair(0x9, 0x80b, 0x40, &(0x7f0000000080)) [ 805.889161][T24788] JFS: Cannot determine volume size [ 805.908839][T24788] JFS: discard option not supported on device [ 805.930075][T24788] JFS: Cannot determine volume size [ 805.951885][T24788] jfs: Unrecognized mount option "dis ard=0x0000000000000008" or missing value [ 805.969896][T24782] XFS (loop4): Invalid superblock magic number [ 805.977223][T24795] FAT-fs (loop2): Unrecognized mount option "hash" or missing value 18:29:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x600, 0x0) 18:29:05 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = semget(0x2, 0x4, 0x52d) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000080)={{{@in=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f00000005c0), &(0x7f0000000440)=0x0) semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000540)={{0xce49, r3, 0x0, r4, r5, 0x2, 0xffffffff}, 0x6c, 0x4, 0x9f3}) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r7 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x20000, 0x0) ioctl$UI_SET_SWBIT(r7, 0x4004556d, 0x4000000000000005) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYPTR64, @ANYRES16=r6, @ANYBLOB=',wfdno=', @ANYBLOB="4762276bf05f266654c7ee10fcbae28c2ddbb2b453bf3c0e6d9afb2c0fa2eb9e1e0cc2ec02ffa04f4e87ea940f4379dab4e68ba4a756b60fa2ceacc04e5f60b16c40a89750cf7f9231a8a84fcb1f50eb9f1de1b59f3d09aced39eb25a8486f223e0aed0d2d0d72bc131b1b3cf2b47ecec84aa3e82d63e64986a9626fccda53887937418fa52d4254112de351188a336cfd", @ANYBLOB="2c14dd0005"]) 18:29:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80000, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f00000002c0)=0xa5) sendto$rose(r0, &(0x7f0000000040)="6198bd5404c2817cd88b993ea4edc44f873d57cd86e8d72f5ab0b30d618e6d7c9a1194d1ab77c13917a391fcb18faec0b0996ced64e86a797020522f70a8789fac84d0e8eee4704be964c78509e09dde5418e083f5b3f1495c15ce7bb956d0a071c8121ea56d60abbf690a8fb443eadd0f8b532fd2f22ebf0c74873283741ababf3f6640b0ea5d3ec26001f53a9fd84255c17234e874c521ce5f4b82b049b076626a0881a223e3023d9e0324cc9cc84ae276ceeed18edc7b0cc6c09796a87c8a7956493739540c3a646f920dbf6899f0f5019a39a1dd1657adadd149b356f5297039", 0xe2, 0x4000000, &(0x7f0000000140)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) sendto$inet6(r0, &(0x7f0000000180)="31e1c468d673ecca68c8d7e88065b757812fd657501fac4a0185e5007ca1526efd0463d1fa03633ca4177deb52bccd80936af7486c594937e684406b111b510b7de97c06fb52f62cfcdaa10b5c6e937ad1951704e41fa546589ddeab6f065a79302880f44b519c7a6bf4025662394c4c71089dfd03d6facc0c910fad12d4061b801f38b99206c3c1b2debb8638aacb35c1b1650cf1387cc5f2cafd526e23ae42e467f01f298b59f041d55952702e9427a82cad01de1a1d2d36c34670b2034441f39d18faae023322cd7dcf2a9281683fb2a0d9a3", 0xd4, 0x40800, &(0x7f0000000280)={0xa, 0x4e20, 0x2, @mcast1, 0x3ae}, 0x1c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001840)='/dev/hwrng\x00', 0x8000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) 18:29:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000), 0x0) 18:29:05 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\nard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:05 executing program 5: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0xbc50, 0x0, 0x0, 0x0, 0x0) 18:29:05 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000080), 0x800) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c63616368653d667363616368652c005b749261e4e50fe1f7c45ad427c197e3568586bd2c8f7f7f47c9e13ea8f7f732ee59061e3c8bcb11414e3faa23624c69ec6316d52c1bcc0a77976f833a2246910fb5f3cf08ed22844322caf689b1505f7e9b4f32fb75f4ab6f52994bfffad033ade89a967b677007b725bfb3a0b508482e8b0e8c"]) [ 806.383572][T24843] FAT-fs (loop2): Unrecognized mount option "hash" or missing value [ 806.392877][T24854] JFS: Cannot determine volume size [ 806.422009][T24854] JFS: discard option not supported on device [ 806.437999][T24807] XFS (loop4): Invalid superblock magic number [ 806.459511][T24854] JFS: Cannot determine volume size [ 806.494820][T24854] jfs: Unrecognized mount option "dis [ 806.494820][T24854] ard=0x0000000000000008" or missing value 18:29:05 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x2, 0xbc, 0x0, 0x0, 0x0) 18:29:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 18:29:05 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\vard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x700, 0x0) 18:29:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f000000000000, 0x0) 18:29:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fstat(r0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000780)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000880)=0xe8) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000001, 0x6, &(0x7f0000000640)=[{&(0x7f0000000100)="f8ac3609d81e64757322ee5d076ed3e1066006e90c8533d32da211ba4a7eeff0e394de9a68c7cd46d48c38078df8a26272b174ee8d2753aa613c27161eed015174c02c31c4246d98cc0a600610d67eef9e95d26095cba6f49f05228c960ac46c185713817a000ca51209af759ef22b48364de723813a7b8985f4523f68495a6a31349b891d4c1692f35ffdfbf1bd5b978ee6424edffa71e937fdfca790afe00257ae1fed2693ddf1f3515d155381752eca3c93f14a89bb", 0xb7, 0x4}, {&(0x7f00000001c0)="9a92d5600f8fa3f7ed34bb5955300ab8b9715e15e532506fb3d12484213f", 0x1e, 0x9}, {&(0x7f0000000200)="2511fe9d90cba021dfdb8743466eb46f5dbf51a7d9389f32eda6365fb676f6e1ec8a3197210f36b84377d0ff0b7336d9c02e99fb7e593f23dfeef12c5639e4fc3c4ae1e3dc716e07498daba85f3ae89311360a671f442844abcd8a4a80fa19", 0x5f, 0xfffffffffffffffc}, {&(0x7f0000000280)="1d4946543e0d1b8314f12c0331ff6b9f3563adf1b2c01aecaa3572d57d2de70d4815b6481fe2683f72a5b0b81bfe15c11c4bcf043a264b23166e5e133e3858743275a51bb112c00c9011904b8fda692fe4eb6d46a30e8ee242a9efb5c7c11809aab4e3cce6c5944473fa4c3e49c74c67e4bff9389056258f9767180c209fb07d3507e72e9d1ada9f424d389bef2022145f746d9583b3b1ac548f56b2bb1cbe879bf66ca927c0ca33eae36033452e9f8193f0e7c9a9e889907f65e771a20658d3ee65e81c2a0b26c9902dec8501cbcef8d14ebfde4006c398138c60e4a143ade54db0ccf5eabf88fb10b153314b1431", 0xef, 0x9}, {&(0x7f0000000380)="296b6690a7e25eb538a79b0e0d63a0fd652735f9c9b72f745f9c06fad3900c37ba528dec109179a4225afd3dd280d3b92020d6b7baa6a8aacff9c79394a639027646d9db6c7dffef8a4dc9aa447266acd8c011a496b1bea074808b5162a76c26d3ed3d5536fde35be4ca35f5c1eb3541a36043d77596aa66c73a9540bea738ff1ca7c5edfb59e35bd0fcdc83b12581c6a40db218a19495a69302bc9d504198cf4e7528609a4f2ee27f1f105131c92d1199f4fb348ac79cf21aba2e2ba64dab7f6ee92111763d253880fd96e7", 0xcc, 0x7ff}, {&(0x7f0000000540)="a3ca9ab5a28e8d8383af006c35593424d9b9bd242429dc0778509e1ca8cb63fc14b5c5c8cf25da0c8247873ae72022b0f0c116b45255d28e58e4468198c825e24ebc97546b9442446d1917f44714c02a60d83eaa18df7ecad29c7f6d9313bb850b10d3e34639eb2efed70c9e1c5d20999e821a19d742553e3c0574eb0a580fe5d39d4318cef997348ef360c595a3762bcde9228f92c9d2a6a0b588aae7df6a5967fc4ffb1a2de2e774ab4f2e4e96b5adf2c3927310504c89de89a03f8f4d75a51657f91ded47ac87ec4ccdeabb7c102ce0ccee1bc67762b8025458dbdf87b8ac292a9711640b7d98d5d7bcf4dc9d", 0xee, 0x2}], 0x0, &(0x7f00000008c0)={[{@usrjquota='usrjquota'}], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@obj_type={'obj_type', 0x3d, '+#+loselinux,\\trusted'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'em1\'mime_type'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_gt={'uid>', r4}}, {@dont_appraise='dont_appraise'}]}) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',gfdno=', @ANYRESHEX=r2, @ANYBLOB=',cache=fscache,\x00']) 18:29:05 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x4, &(0x7f0000000000)='jfs\x00', 0xffffffffffffffff}, 0x30) ptrace$peek(0x3, r0, &(0x7f0000000080)) [ 806.866782][T24943] FAT-fs (loop2): Unrecognized mount option "hash" or missing value [ 806.875847][T24946] JFS: Cannot determine volume size [ 806.902541][T24946] JFS: discard option not supported on device [ 806.902709][T24953] REISERFS warning (device loop3): super-6504 reiserfs_getopt: the option "usrjquota" requires an argument [ 806.902709][T24953] [ 806.919090][T24946] JFS: Cannot determine volume size [ 806.944380][T24946] jfs: Unrecognized mount option "dis ard=0x0000000000000008" or missing value [ 806.954032][T24962] 9pnet: Insufficient options for proto=fd 18:29:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) [ 807.082746][T24957] XFS (loop4): Invalid superblock magic number 18:29:06 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\fard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x3, 0x2) mkdirat(r1, &(0x7f0000000000)='\x00', 0x1) r2 = accept4(r0, &(0x7f0000000080)=@tipc=@name, &(0x7f0000000100)=0x80, 0x80000) r3 = accept$alg(r2, 0x0, 0x0) ioctl$KVM_GET_REG_LIST(r3, 0xc008aeb0, &(0x7f0000000140)={0x5, [0x6, 0x29ed, 0xfffffffffffffff9, 0x492, 0x99]}) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7472716e733d66702cf266646e6f3d81416ea618da0a252828461934bdb690850e614759cc69cd177a1d37b4138194b851ef92042db9308d2fe889cfdfc7331cd56e7de86eb5a1c95829b6d5262f6ab5d67dd488fab754f0edffc90f1de1fef678fbe2d6ca609f9cc5f547a5c2e9b2ab4b2e7b8f6cde30b2b0fbdc3541bd7b2f9f5f2e2fb59992ac668b58caed53611f0ab7f9d053010e6fe57539b999dafee950cb60576e17acaaf608e3e41d8854ed178dde0c028829a0f84727d07ea113fb6606e5e16cafd75c8ac8a7777d4dafdbdc407ff6227414ec7fa09dbbb9cd0699eb619e145670ff314503eef259fb0ca5ef65e4e4", @ANYRESHEX=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX=r5, @ANYBLOB=',cache=fscache,\x00']) 18:29:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fstat(r0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000780)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000880)=0xe8) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000001, 0x6, &(0x7f0000000640)=[{&(0x7f0000000100)="f8ac3609d81e64757322ee5d076ed3e1066006e90c8533d32da211ba4a7eeff0e394de9a68c7cd46d48c38078df8a26272b174ee8d2753aa613c27161eed015174c02c31c4246d98cc0a600610d67eef9e95d26095cba6f49f05228c960ac46c185713817a000ca51209af759ef22b48364de723813a7b8985f4523f68495a6a31349b891d4c1692f35ffdfbf1bd5b978ee6424edffa71e937fdfca790afe00257ae1fed2693ddf1f3515d155381752eca3c93f14a89bb", 0xb7, 0x4}, {&(0x7f00000001c0)="9a92d5600f8fa3f7ed34bb5955300ab8b9715e15e532506fb3d12484213f", 0x1e, 0x9}, {&(0x7f0000000200)="2511fe9d90cba021dfdb8743466eb46f5dbf51a7d9389f32eda6365fb676f6e1ec8a3197210f36b84377d0ff0b7336d9c02e99fb7e593f23dfeef12c5639e4fc3c4ae1e3dc716e07498daba85f3ae89311360a671f442844abcd8a4a80fa19", 0x5f, 0xfffffffffffffffc}, {&(0x7f0000000280)="1d4946543e0d1b8314f12c0331ff6b9f3563adf1b2c01aecaa3572d57d2de70d4815b6481fe2683f72a5b0b81bfe15c11c4bcf043a264b23166e5e133e3858743275a51bb112c00c9011904b8fda692fe4eb6d46a30e8ee242a9efb5c7c11809aab4e3cce6c5944473fa4c3e49c74c67e4bff9389056258f9767180c209fb07d3507e72e9d1ada9f424d389bef2022145f746d9583b3b1ac548f56b2bb1cbe879bf66ca927c0ca33eae36033452e9f8193f0e7c9a9e889907f65e771a20658d3ee65e81c2a0b26c9902dec8501cbcef8d14ebfde4006c398138c60e4a143ade54db0ccf5eabf88fb10b153314b1431", 0xef, 0x9}, {&(0x7f0000000380)="296b6690a7e25eb538a79b0e0d63a0fd652735f9c9b72f745f9c06fad3900c37ba528dec109179a4225afd3dd280d3b92020d6b7baa6a8aacff9c79394a639027646d9db6c7dffef8a4dc9aa447266acd8c011a496b1bea074808b5162a76c26d3ed3d5536fde35be4ca35f5c1eb3541a36043d77596aa66c73a9540bea738ff1ca7c5edfb59e35bd0fcdc83b12581c6a40db218a19495a69302bc9d504198cf4e7528609a4f2ee27f1f105131c92d1199f4fb348ac79cf21aba2e2ba64dab7f6ee92111763d253880fd96e7", 0xcc, 0x7ff}, {&(0x7f0000000540)="a3ca9ab5a28e8d8383af006c35593424d9b9bd242429dc0778509e1ca8cb63fc14b5c5c8cf25da0c8247873ae72022b0f0c116b45255d28e58e4468198c825e24ebc97546b9442446d1917f44714c02a60d83eaa18df7ecad29c7f6d9313bb850b10d3e34639eb2efed70c9e1c5d20999e821a19d742553e3c0574eb0a580fe5d39d4318cef997348ef360c595a3762bcde9228f92c9d2a6a0b588aae7df6a5967fc4ffb1a2de2e774ab4f2e4e96b5adf2c3927310504c89de89a03f8f4d75a51657f91ded47ac87ec4ccdeabb7c102ce0ccee1bc67762b8025458dbdf87b8ac292a9711640b7d98d5d7bcf4dc9d", 0xee, 0x2}], 0x0, &(0x7f00000008c0)={[{@usrjquota='usrjquota'}], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@obj_type={'obj_type', 0x3d, '+#+loselinux,\\trusted'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'em1\'mime_type'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_gt={'uid>', r4}}, {@dont_appraise='dont_appraise'}]}) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',gfdno=', @ANYRESHEX=r2, @ANYBLOB=',cache=fscache,\x00']) 18:29:06 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x80, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000040)=0x6) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080), 0x10) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000007c0)) [ 807.306429][T24975] JFS: Cannot determine volume size [ 807.313793][T24975] JFS: discard option not supported on device [ 807.336900][T24974] FAT-fs (loop2): Unrecognized mount option "hash" or missing value 18:29:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x80, 0x28c00) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000600)=0xfffffffffffffe48) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f00000008c0)={&(0x7f0000000080), 0xc, &(0x7f0000000880)={&(0x7f0000000100)={0xb4, r2, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0xa0, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xbbee}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffb}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc564}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf95}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x801}, 0x4008014) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in=@multicast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000000300)=0xe8) bind$packet(r1, &(0x7f0000000340)={0x11, 0x1c, r3, 0x1, 0x8, 0x6, @random="147f6031d28a"}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000380)={'filter\x00'}, &(0x7f0000000400)=0x54) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB='trmns=fd,rfdno=', @ANYRESHEX, @ANYBLOB="000000000000dd19134f5eba31728adfab0d10d33879be7abfaed21025838d25b3dffa298f2a4141151d45e2b3ed610545262b6140d1ccbf35ff75f51f2c39c2b52a6f5b016eb313a5c70107fc58d19cf43740fc0cadcccc8781bb470b9608dc06606e9f375b90a193328e147367a70f9d8d87f9f1707692df578501c2edcf041cbe4fb84dafb02310f39ffc96dc37f560708c759f981094f8cb89add3dabbd564f6c9f843aef5674005fad5bac83a7a536f9036ca3b5b1c11a82775c07593ae4a217ca4f045338bc6580e", @ANYRESHEX, @ANYBLOB="66306f1a7831bf36541d0c40672daa41ebe76f617b8972ee3fb5e1f64b371f8a7f0799e5a7b5d45a55b6f0bd95248cca6ff2a751c8b0bc8c8d240c7514026ba67f0d556abbb746dba2983278fd3e108b0521376e5e078fc8c43bcb5c706df3292859427ff7e646ca87b94ff80e7a7b83021bb2b49d265b5eac52e02d21fd979911fff173490014f74419698e69eb2b4d43887a7814de59fc7b2cb5b7acf949f8269618a2d78a8853e08e1ad7b43131600d1682d854299073e5565a11775ce6755f35b97f2ef93e1f6384094f43be57348e32591f5b5e5db81eac29dcfe1acd8ec425"]) getpeername$inet(r1, &(0x7f0000000440)={0x2, 0x0, @remote}, &(0x7f00000004c0)=0x10) r4 = semget(0x0, 0x7, 0x400) semctl$SETVAL(r4, 0x4, 0x10, &(0x7f0000000640)=0x7ff) 18:29:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x803, 0x0) [ 807.367643][T24975] JFS: Cannot determine volume size [ 807.385511][T24975] jfs: Unrecognized mount option "dis ard=0x0000000000000008" or missing value [ 807.446583][T24985] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "usrjquota" requires an argument [ 807.446583][T24985] 18:29:06 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) 18:29:06 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\rard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x7, 0xaa, 0x8000, 0xa, 0x0, 0x5, 0x800, 0x101, r2}, &(0x7f00000001c0)=0x20) r3 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x6, 0x200800) setsockopt$inet_tcp_int(r3, 0x6, 0x1b, &(0x7f00000000c0)=0x3, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) 18:29:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fstat(r0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000780)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000880)=0xe8) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000001, 0x6, &(0x7f0000000640)=[{&(0x7f0000000100)="f8ac3609d81e64757322ee5d076ed3e1066006e90c8533d32da211ba4a7eeff0e394de9a68c7cd46d48c38078df8a26272b174ee8d2753aa613c27161eed015174c02c31c4246d98cc0a600610d67eef9e95d26095cba6f49f05228c960ac46c185713817a000ca51209af759ef22b48364de723813a7b8985f4523f68495a6a31349b891d4c1692f35ffdfbf1bd5b978ee6424edffa71e937fdfca790afe00257ae1fed2693ddf1f3515d155381752eca3c93f14a89bb", 0xb7, 0x4}, {&(0x7f00000001c0)="9a92d5600f8fa3f7ed34bb5955300ab8b9715e15e532506fb3d12484213f", 0x1e, 0x9}, {&(0x7f0000000200)="2511fe9d90cba021dfdb8743466eb46f5dbf51a7d9389f32eda6365fb676f6e1ec8a3197210f36b84377d0ff0b7336d9c02e99fb7e593f23dfeef12c5639e4fc3c4ae1e3dc716e07498daba85f3ae89311360a671f442844abcd8a4a80fa19", 0x5f, 0xfffffffffffffffc}, {&(0x7f0000000280)="1d4946543e0d1b8314f12c0331ff6b9f3563adf1b2c01aecaa3572d57d2de70d4815b6481fe2683f72a5b0b81bfe15c11c4bcf043a264b23166e5e133e3858743275a51bb112c00c9011904b8fda692fe4eb6d46a30e8ee242a9efb5c7c11809aab4e3cce6c5944473fa4c3e49c74c67e4bff9389056258f9767180c209fb07d3507e72e9d1ada9f424d389bef2022145f746d9583b3b1ac548f56b2bb1cbe879bf66ca927c0ca33eae36033452e9f8193f0e7c9a9e889907f65e771a20658d3ee65e81c2a0b26c9902dec8501cbcef8d14ebfde4006c398138c60e4a143ade54db0ccf5eabf88fb10b153314b1431", 0xef, 0x9}, {&(0x7f0000000380)="296b6690a7e25eb538a79b0e0d63a0fd652735f9c9b72f745f9c06fad3900c37ba528dec109179a4225afd3dd280d3b92020d6b7baa6a8aacff9c79394a639027646d9db6c7dffef8a4dc9aa447266acd8c011a496b1bea074808b5162a76c26d3ed3d5536fde35be4ca35f5c1eb3541a36043d77596aa66c73a9540bea738ff1ca7c5edfb59e35bd0fcdc83b12581c6a40db218a19495a69302bc9d504198cf4e7528609a4f2ee27f1f105131c92d1199f4fb348ac79cf21aba2e2ba64dab7f6ee92111763d253880fd96e7", 0xcc, 0x7ff}, {&(0x7f0000000540)="a3ca9ab5a28e8d8383af006c35593424d9b9bd242429dc0778509e1ca8cb63fc14b5c5c8cf25da0c8247873ae72022b0f0c116b45255d28e58e4468198c825e24ebc97546b9442446d1917f44714c02a60d83eaa18df7ecad29c7f6d9313bb850b10d3e34639eb2efed70c9e1c5d20999e821a19d742553e3c0574eb0a580fe5d39d4318cef997348ef360c595a3762bcde9228f92c9d2a6a0b588aae7df6a5967fc4ffb1a2de2e774ab4f2e4e96b5adf2c3927310504c89de89a03f8f4d75a51657f91ded47ac87ec4ccdeabb7c102ce0ccee1bc67762b8025458dbdf87b8ac292a9711640b7d98d5d7bcf4dc9d", 0xee, 0x2}], 0x0, &(0x7f00000008c0)={[{@usrjquota='usrjquota'}], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@obj_type={'obj_type', 0x3d, '+#+loselinux,\\trusted'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'em1\'mime_type'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_gt={'uid>', r4}}, {@dont_appraise='dont_appraise'}]}) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',gfdno=', @ANYRESHEX=r2, @ANYBLOB=',cache=fscache,\x00']) 18:29:06 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000000000, 0x0) 18:29:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) [ 807.726906][T25101] FAT-fs (loop2): Unrecognized mount option "hash" or missing value [ 807.737310][T25104] JFS: Cannot determine volume size [ 807.776751][T25104] JFS: discard option not supported on device [ 807.786574][T25104] JFS: Cannot determine volume size [ 807.792505][T25104] jfs: Unrecognized mount option "dis ard=0x0000000000000008" or missing value 18:29:06 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) 18:29:06 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\x0eard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 807.833289][T25096] XFS (loop4): Invalid superblock magic number [ 807.840031][T25112] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "usrjquota" requires an argument [ 807.840031][T25112] [ 807.867065][T25122] 9pnet: Insufficient options for proto=fd 18:29:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="7472616e733d66642c72070000003dd22546061550907deaad466bc21449db09f5021e4c81437daa60e6ce8c13b7b0cc813353fc4925d1a1190897c6762fbcada070f3cb13e602448900bafa71709c550e28e25b", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',cache=fscache,\x00']) getsockopt$inet_mreqsrc(r0, 0x0, 0x2e, &(0x7f00000001c0)={@multicast2, @dev, @broadcast}, &(0x7f0000000180)=0xc) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140), 0x10) sync() 18:29:07 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000001440)='/dev/input/mouse#\x00', 0x3f, 0x1ffff) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x8001, 0x40000) sendmsg$nfc_llcp(r1, &(0x7f00000013c0)={&(0x7f0000000040)={0x27, 0x1, 0x1, 0x4, 0x1f, 0x18, "0c3693e2073a1ea53caa203f24d6b20b2741fcbe2aca5197fda851f9653392df1fd10d7f8b57167615d46fdcc191ffd39157e187a72f106c4c5d79f744e65c", 0x22}, 0x60, &(0x7f0000001280)=[{&(0x7f00000000c0)="55c98e", 0x3}, {&(0x7f0000000100)="c3d6e56a7c112ec3010dd11680009b05d20681a1def0e6245c76c5a9763970b85b672245007eb1d4c0fef6a32c27e6d6d778762a3912e28b0ed18c18ec0482d740f3def925739af20c71279857e874e5cb9e077d96e2a62640cc72efb54f64c1b33a24855388ab0cddbcdf48e59e3b161bc054a353441620c95c8efdc631b2b4b0713fdb4772670e38a1d82f0d499712d06ce77bccb21762366939f82f068033767dabbd281239ff4abcea4db310d6ed33407184739c2f23b019b1257708f1ca905b1636e485e14e2500343f09dd126b924777", 0xd3}, {&(0x7f0000000200)="d0cbf4dd8c291207e26f20aa549b90f766d3e3f74b20055d1b3f794361c8167b3b85e73f4c20f93955b78ca455fdc39106f2dc1d24e3539cb6742fde193092a9bdab69373bc52c685967e9cba7fb2cf513bf2762e52147575d99e3c6fd1cd379ee", 0x61}, {&(0x7f0000000280)="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", 0x1000}], 0x4, &(0x7f00000012c0)={0xe8, 0x117, 0xf8c, "1ded72a81f5c380f47d4350c285617ecb81b4fd760c8a79919ad713049b492e23bb8d35a4e41f0cabdc1a51895f0b349799abe064af1c539bc519752c676cfbb0a6d98dc04e36e1b1b65569d412d510016429325e47df6b6fcbdf360d9989b62e5e8effc0aebf6aace67c62bdd1a84ef5d198a69b36145a31118f998f89c7f1eddff6b2df9fd45cfcb7cb82865655addadef83ce2e13769d0c1fec60f1d2e98be41724ce10607e47f0a9243c461c3a745ad12a8c97fe756d7ce65597dda20c45f31ae6141de9ccbdd09d303c44992517a53917d9341e"}, 0xe8, 0x800}, 0x48000) [ 807.994734][T25228] FAT-fs (loop2): Unrecognized mount option "hash" or missing value [ 808.030088][T25235] 9pnet: Insufficient options for proto=fd 18:29:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x900, 0x0) 18:29:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) getpriority(0x2, r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) 18:29:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fstat(r0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000780)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000880)=0xe8) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000001, 0x6, &(0x7f0000000640)=[{&(0x7f0000000100)="f8ac3609d81e64757322ee5d076ed3e1066006e90c8533d32da211ba4a7eeff0e394de9a68c7cd46d48c38078df8a26272b174ee8d2753aa613c27161eed015174c02c31c4246d98cc0a600610d67eef9e95d26095cba6f49f05228c960ac46c185713817a000ca51209af759ef22b48364de723813a7b8985f4523f68495a6a31349b891d4c1692f35ffdfbf1bd5b978ee6424edffa71e937fdfca790afe00257ae1fed2693ddf1f3515d155381752eca3c93f14a89bb", 0xb7, 0x4}, {&(0x7f00000001c0)="9a92d5600f8fa3f7ed34bb5955300ab8b9715e15e532506fb3d12484213f", 0x1e, 0x9}, {&(0x7f0000000200)="2511fe9d90cba021dfdb8743466eb46f5dbf51a7d9389f32eda6365fb676f6e1ec8a3197210f36b84377d0ff0b7336d9c02e99fb7e593f23dfeef12c5639e4fc3c4ae1e3dc716e07498daba85f3ae89311360a671f442844abcd8a4a80fa19", 0x5f, 0xfffffffffffffffc}, {&(0x7f0000000280)="1d4946543e0d1b8314f12c0331ff6b9f3563adf1b2c01aecaa3572d57d2de70d4815b6481fe2683f72a5b0b81bfe15c11c4bcf043a264b23166e5e133e3858743275a51bb112c00c9011904b8fda692fe4eb6d46a30e8ee242a9efb5c7c11809aab4e3cce6c5944473fa4c3e49c74c67e4bff9389056258f9767180c209fb07d3507e72e9d1ada9f424d389bef2022145f746d9583b3b1ac548f56b2bb1cbe879bf66ca927c0ca33eae36033452e9f8193f0e7c9a9e889907f65e771a20658d3ee65e81c2a0b26c9902dec8501cbcef8d14ebfde4006c398138c60e4a143ade54db0ccf5eabf88fb10b153314b1431", 0xef, 0x9}, {&(0x7f0000000380)="296b6690a7e25eb538a79b0e0d63a0fd652735f9c9b72f745f9c06fad3900c37ba528dec109179a4225afd3dd280d3b92020d6b7baa6a8aacff9c79394a639027646d9db6c7dffef8a4dc9aa447266acd8c011a496b1bea074808b5162a76c26d3ed3d5536fde35be4ca35f5c1eb3541a36043d77596aa66c73a9540bea738ff1ca7c5edfb59e35bd0fcdc83b12581c6a40db218a19495a69302bc9d504198cf4e7528609a4f2ee27f1f105131c92d1199f4fb348ac79cf21aba2e2ba64dab7f6ee92111763d253880fd96e7", 0xcc, 0x7ff}, {&(0x7f0000000540)="a3ca9ab5a28e8d8383af006c35593424d9b9bd242429dc0778509e1ca8cb63fc14b5c5c8cf25da0c8247873ae72022b0f0c116b45255d28e58e4468198c825e24ebc97546b9442446d1917f44714c02a60d83eaa18df7ecad29c7f6d9313bb850b10d3e34639eb2efed70c9e1c5d20999e821a19d742553e3c0574eb0a580fe5d39d4318cef997348ef360c595a3762bcde9228f92c9d2a6a0b588aae7df6a5967fc4ffb1a2de2e774ab4f2e4e96b5adf2c3927310504c89de89a03f8f4d75a51657f91ded47ac87ec4ccdeabb7c102ce0ccee1bc67762b8025458dbdf87b8ac292a9711640b7d98d5d7bcf4dc9d", 0xee, 0x2}], 0x0, &(0x7f00000008c0)={[{@usrjquota='usrjquota'}], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@obj_type={'obj_type', 0x3d, '+#+loselinux,\\trusted'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'em1\'mime_type'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_gt={'uid>', r4}}, {@dont_appraise='dont_appraise'}]}) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',gfdno=', @ANYRESHEX=r2, @ANYBLOB=',cache=fscache,\x00']) 18:29:07 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1ae, 0x0, 0x2000000000, 0x0) [ 808.092222][T25241] 9pnet: Insufficient options for proto=fd [ 808.130522][T25232] JFS: Cannot determine volume size [ 808.139428][T25232] JFS: discard option not supported on device [ 808.149632][T25232] JFS: Cannot determine volume size [ 808.155918][T25232] jfs: Unrecognized mount option "disard=0x0000000000000008" or missing value 18:29:07 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) 18:29:07 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101000, 0x2) renameat2(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:07 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\x0fard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 808.335800][T25249] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "usrjquota" requires an argument [ 808.335800][T25249] 18:29:07 executing program 5: getrusage(0x3, &(0x7f0000000000)) r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x8, 0x1) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_procs(r0, &(0x7f0000000240)='V\xde\xd5\x91P\x99\x13\xa8\x90\t0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="7472616e733d66642c72070000003dd22546061550907deaad466bc21449db09f5021e4c81437daa60e6ce8c13b7b0cc813353fc4925d1a1190897c6762fbcada070f3cb13e602448900bafa71709c550e28e25b", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',cache=fscache,\x00']) getsockopt$inet_mreqsrc(r0, 0x0, 0x2e, &(0x7f00000001c0)={@multicast2, @dev, @broadcast}, &(0x7f0000000180)=0xc) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140), 0x10) sync() 18:29:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) fcntl$addseals(r2, 0x409, 0x2) [ 808.547095][T25349] JFS: Cannot determine volume size [ 808.559023][T25349] JFS: discard option not supported on device [ 808.569478][T25349] JFS: Cannot determine volume size [ 808.579552][T25349] jfs: Unrecognized mount option "disard=0x0000000000000008" or missing value [ 808.609657][T25379] 9pnet: Insufficient options for proto=fd 18:29:07 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getitimer(0x2, &(0x7f0000000000)) [ 808.676322][T25377] FAT-fs (loop2): Unrecognized mount option "hash" or missing value 18:29:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xa00, 0x0) 18:29:07 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\x10ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000000, 0x0) 18:29:07 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) [ 808.951394][T25396] JFS: Cannot determine volume size 18:29:08 executing program 5: r0 = getpid() syz_open_procfs(r0, &(0x7f0000000100)='net/tcp6\x00') syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) timerfd_create(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000005c0)='syz0\x00') semctl$SEM_STAT(0x0, 0x2, 0x12, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000140)=0xe8) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000380)={0xa0, 0xfffffffffffffff5, 0x6, {{0x5, 0x3, 0xfffffffffffffff7, 0x484f, 0x2, 0x0, {0x3, 0x7f, 0x3, 0x0, 0xbd3c31a, 0x1f, 0x9, 0xfffffffffffff000, 0x400, 0x0, 0x7ff, r2, 0x0, 0x81, 0x8}}}}, 0xa0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x98, 0x801) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfffffffffffffffe, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getdents64(r3, &(0x7f00000000c0)=""/11, 0xeb) r4 = accept4(0xffffffffffffff9c, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x80, 0x80000) setsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f00000000c0)=0x5, 0x4) [ 808.979584][T25396] JFS: discard option not supported on device [ 808.990329][T25396] JFS: Cannot determine volume size 18:29:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000, 0x0) 18:29:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) [ 809.019212][T25406] FAT-fs (loop2): Unrecognized mount option "hash" or missing value [ 809.030844][T25396] jfs: Unrecognized mount option "disard=0x0000000000000008" or missing value [ 809.071237][T25400] XFS (loop4): Invalid superblock magic number 18:29:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff, 0x0) 18:29:08 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\x11ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:08 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) 18:29:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xd00, 0x0) [ 809.490236][T25431] JFS: Cannot determine volume size 18:29:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfeffffff, 0x0) [ 809.529002][T25431] JFS: discard option not supported on device [ 809.564974][T25435] FAT-fs (loop2): Unrecognized mount option "hash" or missing value [ 809.582066][T25431] JFS: Cannot determine volume size [ 809.613477][T25431] jfs: Unrecognized mount option "disard=0x0000000000000008" or missing value 18:29:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x20d00) setsockopt$CAIFSO_REQ_PARAM(r1, 0x116, 0x80, &(0x7f0000000300)="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", 0xffea) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) 18:29:08 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) 18:29:08 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\x12ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0xc0ed0000, 0x0) [ 809.798521][T25453] FAT-fs (loop2): Unrecognized mount option "hash" or missing value [ 809.820860][T25438] XFS (loop4): Invalid superblock magic number [ 809.961030][T25457] JFS: Cannot determine volume size [ 809.974270][T25457] JFS: discard option not supported on device [ 810.045472][T25457] JFS: Cannot determine volume size [ 810.059482][T25457] jfs: Unrecognized mount option "disard=0x0000000000000008" or missing value 18:29:10 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x8000, 0xfffffffffffffd1c, 0x0, 0x28000, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x7fff, 0x0) 18:29:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7a000000, 0x0) 18:29:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xe00, 0x0) 18:29:10 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) 18:29:10 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fstat(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000100)=0x0, &(0x7f0000000140), &(0x7f0000000180)) fchown(r1, r3, r4) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) 18:29:10 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\x13ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:10 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x1c, 0x800) write$binfmt_misc(r0, &(0x7f0000000080)={'syz1', "40a81779dc8ef2ce7dfdf1850d0ab07b5a42cebab4fdc63b188e66"}, 0x1f) [ 811.673354][T25478] FAT-fs (loop2): Unrecognized mount option "hash" or missing value [ 811.682211][T25474] JFS: Cannot determine volume size [ 811.694631][T25474] JFS: discard option not supported on device [ 811.714057][T25474] JFS: Cannot determine volume size 18:29:10 executing program 0: r0 = getpid() syz_open_procfs(r0, &(0x7f0000000100)='net/tcp6\x00') syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) timerfd_create(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000005c0)='syz0\x00') semctl$SEM_STAT(0x0, 0x2, 0x12, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000140)=0xe8) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000380)={0xa0, 0xfffffffffffffff5, 0x6, {{0x5, 0x3, 0xfffffffffffffff7, 0x484f, 0x2, 0x0, {0x3, 0x7f, 0x3, 0x0, 0xbd3c31a, 0x1f, 0x9, 0xfffffffffffff000, 0x400, 0x0, 0x7ff, r2, 0x0, 0x81, 0x8}}}}, 0xa0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x98, 0x801) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfffffffffffffffe, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getdents64(r3, &(0x7f00000000c0)=""/11, 0xeb) r4 = accept4(0xffffffffffffff9c, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x80, 0x80000) setsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f00000000c0)=0x5, 0x4) [ 811.728502][T25474] jfs: Unrecognized mount option "disard=0x0000000000000008" or missing value [ 811.755211][T25480] XFS (loop4): Invalid superblock magic number 18:29:10 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) 18:29:10 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) 18:29:11 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\x14ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 811.944965][T25526] 9pnet: Insufficient options for proto=fd [ 811.958388][T25529] FAT-fs (loop2): Unrecognized mount option "hash" or missing value 18:29:11 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) connect(r0, &(0x7f0000000080)=@llc={0x1a, 0xfffe, 0x5, 0x0, 0x3, 0x7f, @random="8b289869c156"}, 0x80) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) 18:29:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xf21, 0x0) 18:29:11 executing program 0: r0 = getpid() syz_open_procfs(r0, &(0x7f0000000100)='net/tcp6\x00') syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) timerfd_create(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000005c0)='syz0\x00') semctl$SEM_STAT(0x0, 0x2, 0x12, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000140)=0xe8) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000380)={0xa0, 0xfffffffffffffff5, 0x6, {{0x5, 0x3, 0xfffffffffffffff7, 0x484f, 0x2, 0x0, {0x3, 0x7f, 0x3, 0x0, 0xbd3c31a, 0x1f, 0x9, 0xfffffffffffff000, 0x400, 0x0, 0x7ff, r2, 0x0, 0x81, 0x8}}}}, 0xa0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x98, 0x801) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfffffffffffffffe, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getdents64(r3, &(0x7f00000000c0)=""/11, 0xeb) r4 = accept4(0xffffffffffffff9c, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x80, 0x80000) setsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f00000000c0)=0x5, 0x4) [ 812.092618][T25609] JFS: Cannot determine volume size 18:29:11 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TIOCCONS(r0, 0x541d) [ 812.117782][T25609] JFS: discard option not supported on device [ 812.135194][T25609] JFS: Cannot determine volume size [ 812.143902][T25609] jfs: Unrecognized mount option "disard=0x0000000000000008" or missing value 18:29:11 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) 18:29:11 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\x15ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:11 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000080)=0x1, &(0x7f00000000c0)=0x4) 18:29:11 executing program 0: r0 = getpid() syz_open_procfs(r0, &(0x7f0000000100)='net/tcp6\x00') syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) timerfd_create(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000005c0)='syz0\x00') semctl$SEM_STAT(0x0, 0x2, 0x12, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000140)=0xe8) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000380)={0xa0, 0xfffffffffffffff5, 0x6, {{0x5, 0x3, 0xfffffffffffffff7, 0x484f, 0x2, 0x0, {0x3, 0x7f, 0x3, 0x0, 0xbd3c31a, 0x1f, 0x9, 0xfffffffffffff000, 0x400, 0x0, 0x7ff, r2, 0x0, 0x81, 0x8}}}}, 0xa0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x98, 0x801) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfffffffffffffffe, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getdents64(r3, &(0x7f00000000c0)=""/11, 0xeb) r4 = accept4(0xffffffffffffff9c, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x80, 0x80000) setsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f00000000c0)=0x5, 0x4) [ 812.382979][T25726] FAT-fs (loop2): Unrecognized mount option "hash" or missing value 18:29:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, 0x0) 18:29:11 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x1, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) [ 812.610972][T25734] JFS: Cannot determine volume size [ 812.627972][T25734] JFS: discard option not supported on device [ 812.650055][T25734] JFS: Cannot determine volume size 18:29:11 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) [ 812.655437][T25734] jfs: Unrecognized mount option "disard=0x0000000000000008" or missing value 18:29:11 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x9, 0xb4, 0x0, 0x0, 0x0) 18:29:11 executing program 0: ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) geteuid() write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r1) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r1, 0x0, 0x8, 0x4000000}) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0x2) 18:29:11 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x9, 0x204000) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x30, 0x0, 0x2, 0x293}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000180)={0x9f97, r1, 0x1, 0xfffb}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000080)=0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x4000000000, 0x9, 0x7fffffff, 0x2, 0x0, 0x7, 0x32212, 0x3, 0x1ff, 0x7, 0x3ff, 0x7ff, 0x100, 0x4, 0x20000000000000, 0x10000, 0x1, 0x3, 0x7, 0x4, 0x7, 0x8, 0x1000, 0x9, 0x9, 0xffffffff, 0x6, 0x9, 0xae1, 0x7fff, 0x7, 0x6, 0x1, 0x1f2c, 0x6, 0xffffffffffffffff, 0x0, 0x229, 0x0, @perf_config_ext={0x9, 0x1}, 0x28200, 0x7fff, 0x0, 0x7, 0x0, 0x3, 0x2}, r2, 0x4, r3, 0xa) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:11 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\x16ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 812.833447][T25850] FAT-fs (loop2): Unrecognized mount option "hash" or missing value 18:29:12 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x4000, 0x0) sendto$rxrpc(r1, &(0x7f00000000c0)="98d18b2d6f4e96d29c071b629b3818ed743e08dfcd2531b066a75e508507f2db7dbfbecbc085037f948bc0183c7a014d13cf8ec42808dddf54acfe1bce6a816358bd1e3d317c8bb8d1a67bb53a7e240b0bc7e457e9d822a41ff9fe96eddc0b5e7a0310f01885f6d19db7d14594f7dd539d79d8b107d40c8ebea5a5b05f44e1a3b173c0f9ee6869fdb27baa89c9aa98c386587ce9ecd3342694838d36652f802c167fb8ef6506d607dff6e6835fe68715aaf7185e2e7bc109aba8b8a414f7ec3a688d2137862e4c71cd1661acd4ccc59c4263f173d50e1d2fdd2b7366878ef7ced749fd222b", 0xe5, 0x4004005, 0xfffffffffffffffe, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) 18:29:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x1200, 0x0) 18:29:12 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) [ 812.990568][T25863] JFS: Cannot determine volume size [ 812.995815][T25863] JFS: discard option not supported on device [ 813.002099][T25863] JFS: Cannot determine volume size [ 813.007388][T25863] jfs: Unrecognized mount option "disard=0x0000000000000008" or missing value 18:29:12 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\x17ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:12 executing program 5: syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x415, 0x0, 0x1000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000180)=0x883a) r1 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x400000004, 0xfffffffffffffff6) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000080)={0x0, 0x400, 0x100000005}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000000)={0x800100d, 0x8, 0x3}) [ 813.135507][T25870] FAT-fs (loop2): Unrecognized mount option "hash" or missing value 18:29:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x1400, 0x0) 18:29:12 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(0x0, &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) [ 813.303472][T25979] JFS: Cannot determine volume size [ 813.308728][T25979] JFS: discard option not supported on device [ 813.308735][T25979] JFS: Cannot determine volume size [ 813.308744][T25979] jfs: Unrecognized mount option "disard=0x0000000000000008" or missing value 18:29:12 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\x18ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:12 executing program 5: setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x3, 0x4) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xff, "2d84ec96aafc2e54c18c9c1d53625b2ee3cfc72b9db260492d19a14e1525966b", 0x3, 0x1}) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) close(r0) accept4(r1, 0x0, 0x0, 0x0) dup2(r1, r0) 18:29:12 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) r3 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x7fff, 0x8000) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f00000000c0)={0x7, 0x3e}) [ 813.594041][T25996] JFS: Cannot determine volume size 18:29:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x1f00, 0x0) 18:29:12 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(0x0, &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) [ 813.619804][T25996] JFS: discard option not supported on device [ 813.646037][T25996] JFS: Cannot determine volume size [ 813.659841][T25996] jfs: Unrecognized mount option "disard=0x0000000000000008" or missing value 18:29:12 executing program 5: geteuid() r0 = getuid() syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x0, &(0x7f0000000180), 0x200000, &(0x7f0000000300)={[{@dots='dots'}, {@fat=@debug='debug'}, {@dots='dots'}, {@nodots='nodots'}, {@fat=@sys_immutable='sys_immutable'}, {@dots='dots'}, {@nodots='nodots'}], [{@smackfsroot={'smackfsroot', 0x3d, 'jfs\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@context={'context', 0x3d, 'system_u'}}, {@pcr={'pcr', 0x3d, 0x2d}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@dont_measure='dont_measure'}, {@appraise='appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x35, 0x7f, 0x37, 0x32, 0x67, 0x39], 0x2d, [0x34, 0x63, 0x66, 0x35], 0x2d, [0x77, 0x30, 0x36, 0x37], 0x2d, [0x36, 0x33, 0x7b], 0x2d, [0x38, 0x77, 0x62, 0x3d, 0x35, 0x33, 0x30, 0x7f]}}}]}) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) listen(r0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 18:29:12 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\x19ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:12 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_udp(0x2, 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000), 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)=ANY=[]) 18:29:13 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(0x0, &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) [ 813.908896][T26116] FAT-fs (loop5): Unrecognized mount option "smackfsroot=jfs" or missing value 18:29:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, 0x0) 18:29:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = getpgrp(0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x4c5, 0x0, 0x4, 0x0, 0x0, 0xffff, 0x2801, 0x4, 0x58, 0x4, 0xef94, 0xfffffffffffffffa, 0x4, 0x1b, 0x0, 0x5, 0x100000001, 0xffffffffffffc6b6, 0x3, 0x1f, 0x8000, 0x400, 0x2cd, 0x8, 0x7, 0x3, 0x10001, 0x8, 0xe6, 0xffffffff, 0x9, 0x2, 0x10000, 0x5, 0x0, 0x9, 0x0, 0x6, 0x6, @perf_config_ext={0x1, 0x1}, 0x4004, 0xd5b, 0x401, 0x6, 0x8e40, 0xfffffffffffffffe, 0x7}, r1, 0x9, r0, 0x1) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x40, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r4, &(0x7f00000002c0)={0x28, 0x2, 0x0, {0x4, 0x5, 0x10000}}, 0x28) r5 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x41, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r5, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10200800}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r6, 0x300, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0xdd9e}}}, 0x24}, 0x1, 0x0, 0x0, 0x4040000}, 0x20004000) [ 813.960045][T26123] JFS: Cannot determine volume size [ 813.968042][T26123] JFS: discard option not supported on device [ 813.981138][T26123] JFS: Cannot determine volume size [ 813.986861][T26123] jfs: Unrecognized mount option "disard=0x0000000000000008" or missing value 18:29:13 executing program 0: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0x20000700) open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) 18:29:13 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\x1aard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:13 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7, 0x200) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000040)) ioctl$KVM_TRANSLATE(r0, 0xc018ae85, &(0x7f0000000340)={0x0, 0x100000, 0x7fff, 0xfffffffffffffffa, 0x4}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r1, 0x8, 0x70bd27, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80802050}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, r2, 0x800, 0xc6, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x581}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x92}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x51) 18:29:13 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', 0x0, 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) 18:29:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) listen(r0, 0x0) connect$netlink(r0, &(0x7f0000000680)=@unspec, 0xc) [ 814.296972][T26346] JFS: Cannot determine volume size [ 814.318131][T26346] JFS: discard option not supported on device [ 814.337456][T26346] JFS: Cannot determine volume size [ 814.350652][T26346] jfs: Unrecognized mount option "disard=0x0000000000000008" or missing value 18:29:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x2010, 0x0) 18:29:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@random={'user.', 'cpusetwlan0\x00'}, &(0x7f0000000240)=""/156, 0x9c) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63030000003d667363616368652cdc4e713c3fe81d390b000ca05531bf0b741cc964d08da0364964b2bc1b421f944850822a42e4385209d1718dcd1ef8bdfe872cc0929e342398e1be3f3d9971af1db833ece3f5722f3cc9ab4c11ad25daff07a9236a5e3b5f010f2e88da69ae69b419d2b4c954427c63d2a1efa783944ade6c335d7f1d4f7cbb9b3d3563"]) fcntl$addseals(r1, 0x409, 0x4) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x10080, 0x0) 18:29:13 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', 0x0, 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) 18:29:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000026000)='/dev/snd/timer\x00', 0x0, 0x0) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 18:29:13 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\x1bard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:13 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x19, 0x0, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000080)) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) 18:29:13 executing program 0: request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) 18:29:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x2, 0x80000) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) 18:29:13 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', 0x0, 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) 18:29:13 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='.\x00', 0x0, 0xe7, 0x0, 0x80000, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00') r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x101002, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f0000000000)={0x4000, 0x1, 0x96b, 0x8000, 0x1}) 18:29:13 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) 18:29:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x210f, 0x0) [ 814.760976][T26575] JFS: Cannot determine volume size [ 814.766293][T26575] JFS: discard option not supported on device 18:29:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) recvmmsg(r0, &(0x7f0000001a80)=[{{&(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/129, 0x81}], 0x1, &(0x7f00000003c0)=""/78, 0x4e}, 0x2}, {{&(0x7f0000000540)=@un=@abs, 0x80, &(0x7f0000000440)=[{&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/96, 0x60}], 0x2, &(0x7f0000000740)=""/3, 0x3}, 0x5}, {{&(0x7f0000000780)=@isdn, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000800)=""/218, 0xda}, {&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000001900)=""/161, 0xa1}, {&(0x7f00000019c0)=""/9, 0x9}], 0x4, &(0x7f0000001a40)=""/49, 0x31}, 0xffffffffffffffe1}], 0x3, 0x40000040, &(0x7f0000001b40)={0x77359400}) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000001b80)={0x3800000000}, 0x4) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) r4 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x100000001, 0x100) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f0000000200)={0xc4, 0x5, 0xfffffffffffffffa, "bfd68253cc0ee7c0ade93a11602c728346a392569a8200ec1f8de89d3b4c823bfd527ecb35635db64f89f77b4adce37bd5dbd34ce8166d18fdeffbfec63e353fe290c765b00e461f05fc681a24d923a6010622a08fe1a1b47742cab36be1fffde97472735c7525b728b7cc4131527161f308948b756a85e71f9b6100c2bbc16f66c2f884c2a10a76cd105721d1ab84a646cbb5eda816a44c38220f0b4d7e10f361bd6c791e77c2094c46218fbf58a64701219d54b876b82a619d1ff53ab80e42aad0f3e7"}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000100)='posix_acl_access\x00') socket$inet6_tcp(0xa, 0x1, 0x0) 18:29:13 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = semget(0x0, 0x3, 0x2) r1 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f0000000940)={'syz', 0x0}, &(0x7f0000000980)="58ab377c", 0x4, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_QUERY(0x18, r1, 0x0, &(0x7f00000009c0)='system\x00', &(0x7f0000000a00)) semctl$SEM_INFO(r0, 0x3, 0x13, &(0x7f00000000c0)=""/100) r2 = syz_open_dev$mice(&(0x7f0000000740)='/dev/input/mice\x00', 0x0, 0x900) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f0000000080)='./file0\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000200)={{{@in=@multicast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@empty}}, &(0x7f0000000300)=0xe8) mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x3200800, &(0x7f0000000780)=ANY=[@ANYBLOB="7472616e733d6a6e69782c64656275673d3078303030303030303030303030306635302c6d6d61702c76657273406f6e3d3901013030302e4c2c6163636573733d636c69656e742c616669643d307830303030303030303030303072742c66736d616769633d3078303030303030303030303030303430312c6673757569643d667776003b6131392d76763f372d313177772d003c37322d7734393200777f662c7569643c2ed1cfbacbcadb1059a224fbd055cefffd23d31bfb210cd925bd011f86afff600452fa0b157799e761bf2ffd7722325151edb77114afd03c6fbc9510e1d3fb8d6b4b584338f867781af761954c952aa198f80c0ea7fd0872f06182b5aa31251da6e0850000000000000000dbfbc4206be3650e7381fbaa0305736ea27196b5419be986c280d6c45d8ba3c69753baafd687a3c281", @ANYRESDEC=r3, @ANYBLOB="2c6673757569643d367b36007e7f363f2d61636477eab06d72002d663438672d7d7b36337f3277392c00"]) r4 = request_key(&(0x7f00000003c0)='cifs.spnego\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f00000006c0)='system\x00', 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000900)={'syz', 0x2}, 0x0, 0x0, r4) r5 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)="4ebc371161a0d366be2d3c6c875dee5e422ecfcce37553290ebdb777042b0c4b5fa76f0bcf7040b32d175ceddd34431d57babb35c7fe347dda16abf75e5a6e61d93a38df53f2eca76df3576d922ba9aac6b686a05b49762f3978b30c383bf1ddaebdc87ebe3b5c8e2be445cb3831dd11824c51c19c13b9dc59192e5868dabe24895ee5914e3bd1eafd1dc4cf40c5c3891867698610f621acefdef8c084e4e9e8acd9d893e218cd66f90a1f2a1ac16837520f9be8d0a61cc465a83d2d30a45f9f254dd05926d1f9a2550f03f6138e", 0xce, 0xfffffffffffffffc) r6 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000700)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$search(0xa, r5, &(0x7f0000000640)='ceph\x00', &(0x7f0000000680)={'syz', 0x1}, r6) [ 814.819604][T26575] JFS: Cannot determine volume size [ 814.825906][T26575] jfs: Unrecognized mount option "disard=0x0000000000000008" or missing value 18:29:14 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="492162ddb7e1334bf40eebbc2b0c626b6899b8ecc4921247608333acfa09983c960922b46374119c0a262ca425e63ca3e236b5326d6539419a133dc77d8b6e5716e80f0898f98e51d975c73f1ffad1bce64c6e9fadd1c21561b5debc134b2c3c615a5d5471576461548cd7ffa28cb9e5bbca96f07b5600dd700fa015c2091fc29abdcebfb60101e1a58ce0a6355ff819dafdef4fff21ae1eec2dacb11e2af59f711dcb2230c492a06c55e9fcff540e1c04968df374748a72217702d098a177098e0936cb", 0xc4, 0x1}], 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) 18:29:14 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\x1card', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 814.943525][T26660] 9pnet: Could not find request transport: jnix 18:29:14 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='bdev\x00', 0x0, 0x0) [ 815.038735][T26660] 9pnet: Could not find request transport: jnix [ 815.104368][T26703] FAT-fs (loop2): Unrecognized mount option "hash" or missing value [ 815.114992][T26707] JFS: Cannot determine volume size [ 815.137935][T26707] JFS: discard option not supported on device 18:29:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x10000, 0x0) r2 = getuid() r3 = getegid() write$P9_RGETATTR(r1, &(0x7f0000000140)={0xa0, 0x19, 0x2, {0x20, {0x1, 0x2, 0x1}, 0x2, r2, r3, 0x6, 0x0, 0x0, 0x846a, 0x1, 0x3, 0x31dc, 0x180, 0x8, 0xffffffffffffff01, 0x2d6, 0x2, 0x3, 0x6, 0x9}}, 0xa0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB="2caa1f996f99922aa749591a1f586361641ae706000000e568e2fe000b86fc"]) 18:29:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x2300, 0x0) [ 815.169082][T26707] JFS: Cannot determine volume size 18:29:14 executing program 5: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffff81, 0x0, 0x800000, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8001, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f00000000c0)={0x0, 0x6, 0x8aaa}) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x8b, 0x4) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000100)) 18:29:14 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) [ 815.192862][T26707] jfs: Unrecognized mount option "disard=0x0000000000000008" or missing value 18:29:14 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\x1dard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:14 executing program 0: keyctl$update(0x2, 0x0, &(0x7f00000000c0)='l', 0x1) 18:29:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000340)={0x0, 0x401}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000300)={r3, 0xfab}, 0x8) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="a75f2d75", @ANYRESHEX=r2, @ANYBLOB=',cache=fscache,\x00']) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x400, 0x0) ioctl$VIDIOC_G_JPEGCOMP(r4, 0x808c563d, &(0x7f0000000540)) syz_mount_image$bfs(&(0x7f0000000080)='bfs\x00', &(0x7f00000000c0)='./file0\x00', 0xd16a, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="3cb8b78a1ecfcffbcec83b6d58cce2c1d48e3b4eb171544cf30fe2044e675f2024c252f93b7d9ddb9ea9cde24c2a428bde080c6b8b", 0x35, 0x4e4a}], 0x222002, 0x0) 18:29:14 executing program 5: ptrace$setsig(0x4203, 0x0, 0x5210, &(0x7f0000000280)={0x21, 0x7f, 0x400}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) write$P9_RRENAMEAT(r1, &(0x7f0000000200)={0x7, 0x4b, 0x2}, 0x7) pread64(r0, &(0x7f0000000100)=""/195, 0xc3, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-control\x00', 0x400001, 0x0) getsockopt$inet_dccp_int(r2, 0x21, 0xfffffffffffffffc, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f0000000240)={0x1, 0x0, {0x0, 0x40, 0x8000, 0x7}}) 18:29:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x3c03, 0x0) [ 815.385838][T26824] FAT-fs (loop2): Unrecognized mount option "hash" or missing value [ 815.432839][T26829] JFS: Cannot determine volume size 18:29:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @multicast2}, @in6}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f00000000c0)=0x16) getresuid(&(0x7f0000000100), 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) getpid() getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) syz_open_procfs(0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0xfffffffffffffd97) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getgid() 18:29:14 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@shortname_mixed='shortname=mixed'}], [{@hash='hash'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) 18:29:14 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x301000, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) [ 815.457028][T26829] JFS: discard option not supported on device [ 815.470218][T26835] 9pnet: Insufficient options for proto=fd [ 815.476256][T26829] JFS: Cannot determine volume size [ 815.483969][T26829] jfs: Unrecognized mount option "disard=0x0000000000000008" or missing value [ 815.574359][T26843] 9pnet: Insufficient options for proto=fd 18:29:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x2, 0x0) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000000140)={[], 0x4, 0x2, 0x6, 0x0, 0x0, 0x4000, 0x0, [], 0x64bfdbc7}) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="dc830fa0d551dcad7bdab7e1345f0081ff6e733d66642c720000000000", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',cache=fscache,\x00']) 18:29:14 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\x1eard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 815.650413][T26861] FAT-fs (loop2): Unrecognized mount option "hash" or missing value 18:29:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00, 0x0) 18:29:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x1f, 0x201) ioctl$sock_bt_cmtp_CMTPCONNDEL(r3, 0x400443c9, &(0x7f00000000c0)={{0x7, 0x2, 0x0, 0x6, 0x24ad, 0x5}, 0x80000001}) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1, @ANYBLOB="0000000000d3cc97ce91439ae2f6411d97b97e25547883262cf90943dbb1adf9b68974570561112a4c82586cf55f72ca6b8de434dafba155461a25dcbd89b98f164fa274e6bf4542c7e03ece4b3934c5", @ANYRESHEX=r2, @ANYBLOB=',cache=fscache,\x00']) 18:29:14 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 815.848877][T26945] JFS: Cannot determine volume size 18:29:14 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x80001, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000080)=0x10) [ 815.879391][T26945] JFS: discard option not supported on device [ 815.908922][T26945] JFS: Cannot determine volume size 18:29:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7472616e733d020067ba66646e6f3d", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c6361638ca4be8bdde50b000000000000cf639701919bc399fd0f4297524a167fbb880c6bdad4b2c77fcc593ab24b31e3cb5fcbf1362a1e6748a43756032cd6d9d9897ecd90a6eb399923ee6e52663a69272506014d0415c03f8e4a686fa8d74315d8dbcb17055b951bfa42ffef9bb34c4630806526aacd9ceb90d84113300e576ef8941657ff83a4281b6080003a3c7072759da357162b430b2e1c2c8d338290c1ff96cac000e749d17d53f1919c090f2b5d1a1cedfd44b507aaa5f94268d31f387b4e19a71131489c3f34d664c2d8a21256038b9aa73f1a394838935a694b3bdf149c7b783a5c7fd20cae0b0e597c8d3262df8d683caf2b"]) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, &(0x7f00000000c0)={0x58, 0x1, 0x4, 0xfff, 0x9, 0x1}) [ 815.930378][T26965] FAT-fs (loop2): bogus number of reserved sectors [ 815.953379][T26945] jfs: Unrecognized mount option "disard=0x0000000000000008" or missing value [ 815.982019][T26965] FAT-fs (loop2): Can't find a valid FAT filesystem 18:29:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x4000, 0x0) [ 816.032904][T26972] 9pnet: Could not find request transport:  [ 816.072051][T26975] 9pnet: Could not find request transport:  18:29:15 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 816.253248][T26983] FAT-fs (loop2): bogus number of reserved sectors [ 816.267258][T26983] FAT-fs (loop2): Can't find a valid FAT filesystem 18:29:15 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syncfs(r0) setsockopt$inet_tcp_int(r0, 0x6, 0x1, &(0x7f0000000300)=0x1, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e27, @rand_addr=0x5}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1}, 0xfffffdd3) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x31, &(0x7f0000000040)=0x9, 0x4) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) close(r1) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r3 = memfd_create(&(0x7f0000000140)=',!\x00', 0x0) pwritev(r3, &(0x7f0000000400)=[{&(0x7f0000000340)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) socketpair$unix(0x1, 0xfffffffffffffffd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) read(r3, &(0x7f0000001440)=""/184, 0xb8) fcntl$setstatus(r2, 0x4, 0x1000000000042800) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0x526987c9) read(r4, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r2, r3, 0x0, 0x80003) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000000)) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000100)={0x1ad, 0x6}) getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)) 18:29:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x80000) getrandom(&(0x7f0000000100)=""/35, 0x23, 0x2) write$eventfd(r1, &(0x7f00000000c0)=0x1ee6, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) 18:29:15 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2000, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000040)) 18:29:15 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis!ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:15 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 816.304607][T26978] XFS (loop4): Invalid superblock magic number [ 816.422675][T26999] JFS: Cannot determine volume size [ 816.440704][T26999] JFS: discard option not supported on device [ 816.458424][T26999] JFS: Cannot determine volume size [ 816.468274][T26999] jfs: Unrecognized mount option "dis!ard=0x0000000000000008" or missing value 18:29:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',Zache=fscache,\x00']) 18:29:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x4800, 0x0) [ 816.527251][T27009] FAT-fs (loop2): bogus number of reserved sectors [ 816.543109][T27009] FAT-fs (loop2): Can't find a valid FAT filesystem 18:29:15 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\"ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:15 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x20000, 0x0) renameat(r0, &(0x7f0000000140)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') r2 = fcntl$getown(r1, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000040)=0x0) kcmp(r2, r3, 0x5, r0, r1) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:15 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000340)={0x30, 0x5, 0x0, {0x0, 0x1, 0x8}}, 0x30) read$FUSE(r0, &(0x7f0000003000), 0x10e6) write$FUSE_INIT(r0, &(0x7f00000001c0)={0x50, 0x0, 0x1}, 0x50) [ 816.765939][T27118] JFS: Cannot determine volume size [ 816.784759][T27118] JFS: discard option not supported on device [ 816.793584][T27118] JFS: Cannot determine volume size 18:29:15 executing program 2: [ 816.825198][T27118] jfs: Unrecognized mount option "dis"ard=0x0000000000000008" or missing value 18:29:16 executing program 3: r0 = semget(0x2, 0x0, 0x80) semctl$IPC_INFO(r0, 0x4000000100003, 0x3, &(0x7f0000000080)=""/205) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mknodat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x8024, 0x6) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file1\x00', 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x2000000000000, @ipv4={[], [], @loopback}, 0x2}, 0xffbb) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00000004c0)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0xfffffffffffffe9b) r3 = open(&(0x7f0000000500)='./file0\x00', 0x1, 0x0) r4 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10200}, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000040)={0x84, @remote, 0x0, 0x2000000000, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffff8) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r3, 0x28, 0x2, &(0x7f0000000380)=0x80000000010001, 0x8) r6 = fcntl$dupfd(r4, 0x406, r4) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r6, 0x84, 0x12, &(0x7f0000000300)=0x8, 0x4) linkat(r3, &(0x7f00000003c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x400) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x9) sendfile(r4, r4, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x2, 0xd75c, 0x100}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) signalfd4(r6, &(0x7f0000000480)={0x4}, 0x132, 0x80000) openat$ppp(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ppp\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x8000, 0x0) ioctl$EVIOCGABS2F(r6, 0x8018456f, &(0x7f0000000680)=""/179) r7 = socket(0x80000000000018, 0x1, 0x1) ioctl(r7, 0x8912, &(0x7f0000000780)="c626262c8523bf012cf6c80740fa338d95ec5d7923e70a5136dc328450c1bbc3d014a6b6f1b921f2ab9e895069a3db83c6bdce915a8301fca2367a466dd3ab2d4c5b296e3f7ed2f6fea17e") openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x400000, 0x0) 18:29:16 executing program 2: [ 816.879196][T27122] XFS (loop4): Invalid superblock magic number 18:29:16 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffee5, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)="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", 0xfb}], 0x1, &(0x7f00000001c0)=[{0x68, 0xff, 0x3, "fa28d479bdcb8ae1f9dc91305ae820328157428fb8b403c5b73e0335c81d61f8e763e582e047840b13a8528eba2fdd9639274b33f94428a9b971578dc10892786365f4ab28c53b824b000e04dde8f00510440ce67893"}, {0x90, 0xff, 0x2, "9611757bea226cfa594eb98f2004269fc8c87e0579522de964621c67db176287adc50ca774131a694b41a3c3364ae91564621c830586c30b4de11acaaa6bf278aacdf22bffe41f1ede06d6fc5864e92d7c6b532f64bcca0070ea23c3e1395ce1b84f33a18a9b06d85600abebc02c213dd84463af365984f68e"}, {0x100, 0x139, 0x2, "54ec11a2ba5fcc3cef2c2197c8717c447d5168e2837894251baffffc50cca3ad03625ef354674f85fb55b2b8d763af1b143994c94d0e9b1bf22a5e85a878a4224a62dde6133396cec4669c3b07b1269a5ef7f499ffb68c1de02863998b610b9e0e99a197e09742b495685fcd361c17e8ae4beeff5b21a919726b8f2a44472c029ff66c64980017701384027a304026c6d95b901763a05cae3e570d8d5b34482bf8ffa4109ec27e7a3369c5d0866a98b36c20b4f9ae00fdb3fa3f951490b12b16bc8cc603343c35f88fe1daf9cc77d518a29e5dedf661e4ed4763467c2fba177c99c061841ffc6cb043d222"}], 0x1f8}, 0x44000) syz_open_dev$usb(&(0x7f0000000440)='/dev/bus/usb/00#/00#\x00', 0x2, 0x400) 18:29:16 executing program 2: 18:29:16 executing program 0: 18:29:16 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis#ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:16 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0x7, &(0x7f0000000000)={0x0, 0x3c, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(r0, 0x0, &(0x7f00000000c0)={{r1, r2+10000000}, {0x77359400}}, 0x0) 18:29:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x4c00, 0x0) 18:29:16 executing program 2: 18:29:16 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) sendmsg$nfc_llcp(r3, &(0x7f0000000440)={&(0x7f00000000c0)={0x27, 0x1, 0x0, 0x7, 0x2, 0x1ff, "c15090ef022f5a891b9194f18f2cb94071e2db6401fa7230c5a0df05147dbe3535943558b4a5f87e768aedd4934eac44b1d148ccad3281e3c9f7fd4d2089ee", 0x28}, 0x60, &(0x7f00000003c0)=[{&(0x7f0000000140)="d87f55841d81706116296121887798f674921f0057e681cc3f38236544297669282a46a7fe56e4371ff8b09cb323825206da4e21cd", 0x35}, {&(0x7f0000000180)="8931857cf897d7e7db33344e925c0c", 0xf}, {&(0x7f00000001c0)="1007e2f5e3cdc85618de36fa4233b2af9ffa0ac520dbc4b4d405207a2f3b4b6acc3b4f1e8dfbad236f0fabcc50d8228f14aa54de146d80e550b56feb188b3409490ad27e59e9e6719f445228643a38419bf0355991bc484f594a429e0294e43e3f2dd9266a59369a8246c97f97b7eb4b3032bbe4ed4fc2b9e733b0827c86377340ca03beda0f9e98c763cbd954c091c23c2b227641c33c9ffe0f511def46b736466669d0c4e50ed122b499adeb603082e1622d0fdd02734ffd97e37c34dcc1dbe1619d4337e08ab888efd4ed6d8b23e4352acf9d71b2", 0xd6}, {&(0x7f00000002c0)="d458d14f09d740256de2c14cdfa2abde62e67807d659e958e429d3c428866c9d165eaeb6bf17fe754153302ba135b5abbd7b8b9f15e6f60f6ef8c6382e508a7a27fc3f60d944c2f13ed5ccae30e9237b978fee4dec0dd381744667c8e877c141330161d9f32b3ca81e18ff0a1c9cf8eb5f16756220cb2f3dd79fbfdbd30dcd7bf07a2f5be88afafd5ec14a0047ad01714bf6e02853fe871ac3f496f4fcb3b99b7fe900f9de25bff75e7e170e5b8e408cde31510098013836f1fc22163e94f6a80cdc28fda4f7", 0xc6}], 0x4, &(0x7f0000000400)={0x40, 0x0, 0x4, "58c00de29de1ed9c50aa1bb0b6c7e3e28df0326538c9aa1cada92c194de2104d27d37e63364af672f68ed36499"}, 0x40}, 0x0) 18:29:16 executing program 0: 18:29:16 executing program 2: 18:29:16 executing program 0: [ 817.225320][T27256] JFS: Cannot determine volume size [ 817.236996][T27256] JFS: discard option not supported on device [ 817.254067][T27256] JFS: Cannot determine volume size [ 817.265168][T27256] jfs: Unrecognized mount option "dis#ard=0x0000000000000008" or missing value 18:29:16 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis$ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:16 executing program 0: 18:29:16 executing program 2: 18:29:16 executing program 5: r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x9, 0x4000) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000180), &(0x7f00000001c0)=0x4) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000040)={0xa, [0x5, 0x3, 0x2, 0xe032, 0x5, 0x6, 0x20, 0x8000, 0x5, 0x7]}, &(0x7f0000000080)=0x18) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f00000000c0), &(0x7f0000000100)=0x4) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 817.449861][T27261] XFS (loop4): Invalid superblock magic number 18:29:16 executing program 2: 18:29:16 executing program 0: [ 817.545997][T27282] JFS: Cannot determine volume size [ 817.571450][T27282] JFS: discard option not supported on device [ 817.577726][T27282] JFS: Cannot determine volume size [ 817.594980][T27282] jfs: Unrecognized mount option "dis$ard=0x0000000000000008" or missing value 18:29:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x5001, 0x0) 18:29:16 executing program 2: 18:29:16 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) accept(r0, &(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x80) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bond0\x00', r3}) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e6f3dedb63f481798e690bdacc0708ad10e7d0ba011672736684b36d65b30cb7aee74256ce4be6f3497c8bacfc3c6e20e0300706325b0b9a1b6f0e6e54fd1477ebb2233b3f6dc371fcc838ca42925abb1eabd620e9729f40724e125c4fc820792c5251c73beca", @ANYRESHEX=r2, @ANYBLOB="2c63616368653d6673d91b6e39694b3c92848e41df63616368652c08dc35a24b42096f550cfcb0333afa34416235e592ec49de85ca3bde134828cb5b54f120dd0fc6c2bb04524b390ead6225a81eb069fb66019af8eed33515c0cf"]) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x101000, 0x0) dup2(r2, r0) ioctl$EVIOCGRAB(r4, 0x40044590, &(0x7f00000001c0)=0x8) 18:29:16 executing program 0: 18:29:16 executing program 2: 18:29:16 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis%ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:16 executing program 0: 18:29:16 executing program 2: 18:29:16 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1000010, 0x0) 18:29:16 executing program 0: [ 817.827259][T27300] 9pnet: Insufficient options for proto=fd 18:29:17 executing program 2: [ 817.890272][T27308] 9pnet: Insufficient options for proto=fd 18:29:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) [ 817.970724][T27303] JFS: Cannot determine volume size [ 817.986955][T27303] JFS: discard option not supported on device 18:29:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x6000, 0x0) 18:29:17 executing program 2: 18:29:17 executing program 0: [ 818.016432][T27303] JFS: Cannot determine volume size [ 818.040894][T27303] jfs: Unrecognized mount option "dis%ard=0x0000000000000008" or missing value 18:29:17 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x206000, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000040)={0x1000}) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:17 executing program 2: 18:29:17 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis&ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:17 executing program 0: 18:29:17 executing program 0: 18:29:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) listen(r0, 0x0) 18:29:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x6603, 0x0) 18:29:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',cacscache,\x00\x00\x00\x00\x00']) 18:29:17 executing program 0: [ 818.340334][T27335] JFS: Cannot determine volume size 18:29:17 executing program 5: fstat(0xffffffffffffff9c, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000400)=0xe8) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x8000, 0x3, &(0x7f0000000280)=[{&(0x7f0000000080)="46b7769ddfc2b5482802e17eff56e0a2f8524ee45d9ec412836ff74fd163e509e24d9189d67cb6980a6ad35b886614ce58d407b69a7628964e83248e04ff4e0878584a930cd22cce283a55f941367c9a501a487e8af08f767cbd5ee28f67112419caa4752fc182d660b82f1cce566331ac16cd86a596c4a9a46b97e2cbab01ec9610bfb474f1ac76a137dddca8ccb90a1c0b18526c9a6f8d9873b3b5b94b9202c6db64346f27e97e556cdcb20d7f4ebcb7a00af48e49a2ed014268943b612f76f434871aec9ee938da0623e96e68baff4e11a7aebf1532878476", 0xda, 0x10000}, {&(0x7f0000000180)="ccd575fb1f08f4a4d57be2bbf883b563bb790ab5c36490e8e24e3c5ed22e08fd57c2c964c8f7b9a60f415177c85776728d19788216cd47fe4e2f4229036ccf1a858a359a7ed4e6f5572d3a01d38df8b89fbc8c6d70cdb54a5e28bdbe7b3124f5f6264cd483942621e4e07b893c7ea64de98572c0d2ceeeeb77385993c90fde773c57dc47dd2ff34a5e1862efd9bf149b0a4aad9aee0bfdcf4ab0bcf77e04bdc5efc22a428d6d65", 0xa7, 0x1a6}, {&(0x7f0000000240)="8fda3764520754f8a942208387f8e8057f8422", 0x13}], 0x8000, &(0x7f0000000600)=ANY=[@ANYBLOB='usrquota,integrity,integrity,gid=', @ANYRESHEX=r0, @ANYBLOB=',uid=', @ANYRESHEX=r1, @ANYBLOB=',nodiscard,fowner=', @ANYRESDEC=r2, @ANYBLOB="6a65ca0cd92c6d6561737572652c666f", @ANYRESDEC=r3, @ANYBLOB=',dont_appraise,dont_hash,seclabel,\x00']) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x200000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0xffffffffffffff35, 0x0, 0x0, 0x0) 18:29:17 executing program 2: [ 818.388261][T27335] JFS: discard option not supported on device [ 818.402122][T27335] JFS: Cannot determine volume size [ 818.407525][T27335] jfs: Unrecognized mount option "dis&ard=0x0000000000000008" or missing value 18:29:17 executing program 2: 18:29:17 executing program 0: 18:29:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x6800, 0x0) 18:29:17 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis\'ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:17 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8000, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000040)=0x7f, 0x4) 18:29:17 executing program 2: 18:29:17 executing program 0: 18:29:17 executing program 2: 18:29:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000000c0)={0x7, 0x79, 0x1}, 0x7) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) 18:29:17 executing program 0: 18:29:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x6c00, 0x0) [ 818.779113][T27367] JFS: Cannot determine volume size 18:29:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) [ 818.802806][T27367] JFS: discard option not supported on device [ 818.816870][T27367] JFS: Cannot determine volume size [ 818.830057][T27367] jfs: Unrecognized mount option "dis'ard=0x0000000000000008" or missing value 18:29:17 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg(r0, &(0x7f00000092c0), 0x41, 0x0) 18:29:18 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x10, 0x224, 0x0, 0x40000, 0x0) 18:29:18 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis(ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:18 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x200, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='memory.events\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xfffffffffffffee1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000100)={{{@in=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r1, r2, r3) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3d8, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0xa100, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x48c, &(0x7f0000000340)={0x0, 'irlan0\x00', 0x4}, 0x18) [ 819.000857][T27383] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 18:29:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x6c02, 0x0) [ 819.137875][T27411] JFS: Cannot determine volume size 18:29:18 executing program 2: sched_getparam(0x0, &(0x7f0000000000)) [ 819.165454][T27411] JFS: discard option not supported on device 18:29:18 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x4fdd, 0x2000) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 819.208335][T27411] JFS: Cannot determine volume size 18:29:18 executing program 0: r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @multicast2}, @in6}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f00000000c0)=0x16) getresuid(&(0x7f0000000100), &(0x7f0000000340), &(0x7f0000000440)) socket$netlink(0x10, 0x3, 0xa) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r2, &(0x7f00000017c0), 0x1fe, 0x400000000000) getpid() getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) syz_open_procfs(0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0xfffffffffffffd97) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(r3, &(0x7f0000000480), 0x1000000000000237, 0x0) getgid() 18:29:18 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f00000001c0)=0xfffffffff23c686f) [ 819.233892][T27411] jfs: Unrecognized mount option "dis(ard=0x0000000000000008" or missing value 18:29:18 executing program 2: r0 = semget(0x2, 0x0, 0x80) semctl$IPC_INFO(r0, 0x4000000100003, 0x3, &(0x7f0000000080)=""/205) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mknodat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x8024, 0x6) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file1\x00', 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x2000000000000, @ipv4={[], [], @loopback}, 0x2}, 0xffbb) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00000004c0)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0xfffffffffffffe9b) r3 = open(&(0x7f0000000500)='./file0\x00', 0x1, 0x0) r4 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10200}, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000040)={0x84, @remote, 0x0, 0x2000000000, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffff8) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r3, 0x28, 0x2, &(0x7f0000000380)=0x80000000010001, 0x8) r6 = fcntl$dupfd(r4, 0x406, r4) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r6, 0x84, 0x12, &(0x7f0000000300)=0x8, 0x4) linkat(r3, &(0x7f00000003c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x400) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x9) sendfile(r4, r4, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x2, 0xd75c, 0x100}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) signalfd4(r6, &(0x7f0000000480)={0x4}, 0x132, 0x80000) openat$ppp(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ppp\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x8000, 0x0) ioctl$EVIOCGABS2F(r6, 0x8018456f, &(0x7f0000000680)=""/179) r7 = socket(0x80000000000018, 0x1, 0x1) ioctl(r7, 0x8912, &(0x7f0000000780)="c626262c8523bf012cf6c80740fa338d95ec5d7923e70a5136dc328450c1bbc3d014a6b6f1b921f2ab9e895069a3db83c6bdce915a8301fca2367a466dd3ab2d4c5b296e3f7ed2f6fea17e") openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x400000, 0x0) 18:29:18 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis)ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x7203, 0x0) 18:29:18 executing program 0: r0 = semget(0x2, 0x0, 0x80) semctl$IPC_INFO(r0, 0x4000000100003, 0x3, &(0x7f0000000080)=""/205) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mknodat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x8024, 0x6) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file1\x00', 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x2000000000000, @ipv4={[], [], @loopback}, 0x2}, 0xffbb) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00000004c0)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0xfffffffffffffe9b) r3 = open(&(0x7f0000000500)='./file0\x00', 0x1, 0x0) r4 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10200}, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000040)={0x84, @remote, 0x0, 0x2000000000, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffff8) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r3, 0x28, 0x2, &(0x7f0000000380)=0x80000000010001, 0x8) r6 = fcntl$dupfd(r4, 0x406, r4) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r6, 0x84, 0x12, &(0x7f0000000300)=0x8, 0x4) linkat(r3, &(0x7f00000003c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x400) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x9) sendfile(r4, r4, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x2, 0xd75c, 0x100}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) signalfd4(r6, &(0x7f0000000480)={0x4}, 0x132, 0x80000) openat$ppp(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ppp\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x8000, 0x0) ioctl$EVIOCGABS2F(r6, 0x8018456f, &(0x7f0000000680)=""/179) r7 = socket(0x80000000000018, 0x1, 0x1) ioctl(r7, 0x8912, &(0x7f0000000780)="c626262c8523bf012cf6c80740fa338d95ec5d7923e70a5136dc328450c1bbc3d014a6b6f1b921f2ab9e895069a3db83c6bdce915a8301fca2367a466dd3ab2d4c5b296e3f7ed2f6fea17e") openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x400000, 0x0) 18:29:18 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8, 0xc0d02) connect$x25(r0, &(0x7f0000000040)={0x9, @null=' \x00'}, 0x12) 18:29:18 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x101001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f00000000c0)=0x7) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) [ 819.601314][T27614] JFS: Cannot determine volume size [ 819.620269][T27614] JFS: discard option not supported on device [ 819.658862][T27614] JFS: Cannot determine volume size 18:29:18 executing program 2: r0 = semget(0x2, 0x0, 0x80) semctl$IPC_INFO(r0, 0x4000000100003, 0x3, &(0x7f0000000080)=""/205) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mknodat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x8024, 0x6) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file1\x00', 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x2000000000000, @ipv4={[], [], @loopback}, 0x2}, 0xffbb) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00000004c0)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0xfffffffffffffe9b) r3 = open(&(0x7f0000000500)='./file0\x00', 0x1, 0x0) r4 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10200}, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000040)={0x84, @remote, 0x0, 0x2000000000, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffff8) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r3, 0x28, 0x2, &(0x7f0000000380)=0x80000000010001, 0x8) r6 = fcntl$dupfd(r4, 0x406, r4) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r6, 0x84, 0x12, &(0x7f0000000300)=0x8, 0x4) linkat(r3, &(0x7f00000003c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x400) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x9) sendfile(r4, r4, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x2, 0xd75c, 0x100}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) signalfd4(r6, &(0x7f0000000480)={0x4}, 0x132, 0x80000) openat$ppp(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ppp\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x8000, 0x0) ioctl$EVIOCGABS2F(r6, 0x8018456f, &(0x7f0000000680)=""/179) r7 = socket(0x80000000000018, 0x1, 0x1) ioctl(r7, 0x8912, &(0x7f0000000780)="c626262c8523bf012cf6c80740fa338d95ec5d7923e70a5136dc328450c1bbc3d014a6b6f1b921f2ab9e895069a3db83c6bdce915a8301fca2367a466dd3ab2d4c5b296e3f7ed2f6fea17e") openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x400000, 0x0) 18:29:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x7400, 0x0) [ 819.679430][T27614] jfs: Unrecognized mount option "dis)ard=0x0000000000000008" or missing value 18:29:18 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@rc, &(0x7f0000000080)=0x80, 0x80800) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x1, 0x9, 0x4, 0x81, 0x4, 0xfff, 0xb63, {0x0, @in={{0x2, 0x4e20, @broadcast}}, 0x2, 0x7, 0x4, 0x6, 0x4}}, &(0x7f0000000180)=0xb0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000001c0)={r1, 0x80000001, 0x4, [0x80000000, 0x51b5, 0xf09, 0x80000000]}, 0x10) 18:29:18 executing program 0: geteuid() r0 = getuid() syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x0, &(0x7f0000000180), 0x200000, &(0x7f0000000300)={[{@dots='dots'}, {@fat=@debug='debug'}, {@dots='dots'}, {@nodots='nodots'}, {@fat=@sys_immutable='sys_immutable'}, {@dots='dots'}, {@nodots='nodots'}], [{@smackfsroot={'smackfsroot', 0x3d, 'jfs\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@context={'context', 0x3d, 'system_u'}}, {@pcr={'pcr', 0x3d, 0x2d}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@dont_measure='dont_measure'}, {@appraise='appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x35, 0x7f, 0x37, 0x32, 0x67, 0x39], 0x2d, [0x34, 0x63, 0x66, 0x35], 0x2d, [0x77, 0x30, 0x36, 0x37], 0x2d, [0x36, 0x33, 0x7b], 0x2d, [0x38, 0x77, 0x62, 0x3d, 0x35, 0x33, 0x30, 0x7f]}}}]}) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:18 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0xb81, 0x80000) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x5, 0x80) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000540)=""/4096) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x5, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x7b) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',Vidno=', @ANYRESHEX=r3, @ANYBLOB=',cache=fscache,\x00']) 18:29:18 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis*ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3f000000, 0x0) [ 819.966360][T27647] 9pnet: Insufficient options for proto=fd [ 819.977230][T27680] 9pnet: Insufficient options for proto=fd [ 820.001421][T27640] FAT-fs (loop0): Unrecognized mount option "smackfsroot=jfs" or missing value 18:29:19 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',cache=fscach\x00,\x00']) 18:29:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x7803, 0x0) [ 820.033857][T27652] JFS: Cannot determine volume size [ 820.040807][T27652] JFS: discard option not supported on device [ 820.054295][T27652] JFS: Cannot determine volume size [ 820.090290][T27652] jfs: Unrecognized mount option "dis*ard=0x0000000000000008" or missing value 18:29:19 executing program 5: r0 = getuid() lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000002c0)={{}, {0x1, 0x2}, [{0x2, 0x2, r0}], {0x4, 0x1}, [{0x8, 0x7, r1}, {0x8, 0x2, r2}, {0x8, 0x1, r3}], {0x10, 0x6}, {0x20, 0x6}}, 0x44, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 820.163419][T27761] 9p: Unknown Cache mode fscach 18:29:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f, 0x0) 18:29:19 executing program 0: geteuid() r0 = getuid() syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x0, &(0x7f0000000180), 0x200000, &(0x7f0000000300)={[{@dots='dots'}, {@fat=@debug='debug'}, {@dots='dots'}, {@nodots='nodots'}, {@fat=@sys_immutable='sys_immutable'}, {@dots='dots'}, {@nodots='nodots'}], [{@smackfsroot={'smackfsroot', 0x3d, 'jfs\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@context={'context', 0x3d, 'system_u'}}, {@pcr={'pcr', 0x3d, 0x2d}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@dont_measure='dont_measure'}, {@appraise='appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x35, 0x7f, 0x37, 0x32, 0x67, 0x39], 0x2d, [0x34, 0x63, 0x66, 0x35], 0x2d, [0x77, 0x30, 0x36, 0x37], 0x2d, [0x36, 0x33, 0x7b], 0x2d, [0x38, 0x77, 0x62, 0x3d, 0x35, 0x33, 0x30, 0x7f]}}}]}) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 820.184841][T27763] 9p: Unknown Cache mode fscach 18:29:19 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis+ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 820.407859][T27769] FAT-fs (loop0): Unrecognized mount option "smackfsroot=jfs" or missing value 18:29:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x7a00, 0x0) 18:29:19 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x200, 0x20000) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000040)={0x4, "012fd468cff0cdbfd8b5771f6134cd314251dd551606a784f599f5b0d5d6c474", 0x3, 0x0, 0x4, 0x20c000c, 0x22}) 18:29:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6c00, 0x0) 18:29:19 executing program 0: geteuid() r0 = getuid() syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x0, &(0x7f0000000180), 0x200000, &(0x7f0000000300)={[{@dots='dots'}, {@fat=@debug='debug'}, {@dots='dots'}, {@nodots='nodots'}, {@fat=@sys_immutable='sys_immutable'}, {@dots='dots'}, {@nodots='nodots'}], [{@smackfsroot={'smackfsroot', 0x3d, 'jfs\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@context={'context', 0x3d, 'system_u'}}, {@pcr={'pcr', 0x3d, 0x2d}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@dont_measure='dont_measure'}, {@appraise='appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x35, 0x7f, 0x37, 0x32, 0x67, 0x39], 0x2d, [0x34, 0x63, 0x66, 0x35], 0x2d, [0x77, 0x30, 0x36, 0x37], 0x2d, [0x36, 0x33, 0x7b], 0x2d, [0x38, 0x77, 0x62, 0x3d, 0x35, 0x33, 0x30, 0x7f]}}}]}) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 820.500508][T27838] JFS: Cannot determine volume size [ 820.516827][T27838] JFS: discard option not supported on device [ 820.528525][T27838] JFS: Cannot determine volume size [ 820.536518][T27838] jfs: Unrecognized mount option "dis+ard=0x0000000000000008" or missing value 18:29:19 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache='cache=fscache'}], [], 0x11e7a}}) 18:29:19 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis,ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 820.650438][T27888] FAT-fs (loop0): Unrecognized mount option "smackfsroot=jfs" or missing value 18:29:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00, 0x0) 18:29:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010, 0x0) [ 820.846105][T27995] JFS: Cannot determine volume size [ 820.852653][T27995] JFS: discard option not supported on device [ 820.879421][T27995] JFS: Cannot determine volume size [ 820.884853][T27995] jfs: Unrecognized mount option "dis" or missing value 18:29:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x8002, 0x0) 18:29:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x48, 0x0) 18:29:20 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_crypto(0x10, 0x3, 0x15) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_DBG_G_REGISTER(r3, 0xc0385650, &(0x7f0000000100)={{}, 0x8, 0x5, 0x5}) r4 = getegid() fchown(r0, r2, r4) r5 = open$dir(&(0x7f0000000140)='./file1\x00', 0x40400, 0xff) write$P9_RREMOVE(r3, &(0x7f0000000180)={0x7, 0x7b, 0x2}, 0x7) openat(r5, &(0x7f0000000040)='./file0\x00', 0x2, 0x80) 18:29:20 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis-ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8, 0x0) [ 821.253658][T28010] JFS: Cannot determine volume size [ 821.264731][T28010] JFS: discard option not supported on device [ 821.283976][T28010] JFS: Cannot determine volume size [ 821.302947][T28010] jfs: Unrecognized mount option "dis-ard=0x0000000000000008" or missing value 18:29:20 executing program 0: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0xf9fdffff00000000, 0x0, 0x0, 0x0, 0x0) 18:29:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x48, 0x0) 18:29:20 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis.ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:20 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8012, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0)='iso9660\x00', &(0x7f0000000200)='./file0\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f00000004c0)="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", 0x1000, 0x2}], 0x100040, &(0x7f0000000280)={[{@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@block={'block', 0x3d, 0x800}}, {@utf8='utf8'}, {@session={'session', 0x3d, 0x11}}, {@sbsector={'sbsector'}}, {@utf8='utf8'}, {@session={'session', 0x3d, 0x56}}], [{@obj_type={'obj_type', 0x3d, '#-'}}]}) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) connect$unix(r0, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e20}, 0x6e) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) 18:29:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x8003, 0x0) 18:29:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache='cache=f*cache'}]}}) 18:29:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0xfbffffff00000000, 0x0, 0x0, 0x0, 0x0) [ 821.844700][T28049] 9p: Unknown Cache mode f*cache [ 821.851665][T28042] JFS: Cannot determine volume size [ 821.860485][T28042] JFS: discard option not supported on device 18:29:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x0, 0x0) 18:29:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0xf5ffffff00000000, 0x0, 0x0, 0x0, 0x0) [ 821.884950][T28042] JFS: Cannot determine volume size [ 821.900467][T28042] jfs: Unrecognized mount option "dis.ard=0x0000000000000008" or missing value 18:29:21 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis/ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:21 executing program 5: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xe4, r1, 0x324, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfd8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x20}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x240000000}]}, @TIPC_NLA_MEDIA={0x6c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfb71}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x40000}, 0x1) 18:29:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xae01, 0x0) 18:29:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x2300000000000000, 0x0, 0x0, 0x0, 0x0) 18:29:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, 0x0) [ 822.349147][T28074] JFS: Cannot determine volume size 18:29:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, 0x0) [ 822.371866][T28074] JFS: discard option not supported on device [ 822.391454][T28074] JFS: Cannot determine volume size 18:29:21 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3a9, 0x0, 0x18000, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xfffffffffffff800, 0x10000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x148, r1, 0x0, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xbf}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5e}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}, @IPVS_CMD_ATTR_DAEMON={0x70, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xf283}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xe}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2a, 0x10}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5d}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x1c}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x1}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2d0}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x1}, 0x20008840) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x9) [ 822.420849][T28074] jfs: Unrecognized mount option "dis/ard=0x0000000000000008" or missing value 18:29:21 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x101000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000380), 0x4) 18:29:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xbe01, 0x0) 18:29:21 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis0ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, 0x0) 18:29:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, 0x0) 18:29:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, 0x0) [ 822.812169][T28103] JFS: Cannot determine volume size [ 822.818072][T28103] JFS: discard option not supported on device [ 822.839360][T28103] JFS: Cannot determine volume size [ 822.844685][T28103] jfs: Unrecognized mount option "dis0ard=0x0000000000000008" or missing value 18:29:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xc400, 0x0) 18:29:22 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x400000000, 0x0) 18:29:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x74000000, 0x0, 0x0, 0x0, 0x0) 18:29:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, 0x0) 18:29:22 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis1ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x9000000, 0x0, 0x0, 0x0, 0x0) [ 823.320522][T28127] JFS: Cannot determine volume size [ 823.328381][T28127] JFS: discard option not supported on device [ 823.339639][T28127] JFS: Cannot determine volume size [ 823.345008][T28127] jfs: Unrecognized mount option "dis1ard=0x0000000000000008" or missing value 18:29:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6c00, 0x0, 0x0, 0x0, 0x0) 18:29:22 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis2ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6800, 0x0, 0x0, 0x0, 0x0) 18:29:22 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x5b, "108b10e647c0e668be787429a1d63be32835c9110380fde1e24009427a70545a513aadc62eea6274dc7a0c24b629767e269842caac70936596c0c0c2e17f33da7057301f98e0396e5a29e0ffe14a17cd99ecdffe2ba3d8aaf55330"}, &(0x7f0000000080)=0x63) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={r1, 0xfff}, &(0x7f0000000100)=0x8) 18:29:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xc903, 0x0) 18:29:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, 0x0) [ 823.817748][T28153] JFS: Cannot determine volume size [ 823.853690][T28153] JFS: discard option not supported on device [ 823.870627][T28153] JFS: Cannot determine volume size [ 823.877635][T28153] jfs: Unrecognized mount option "dis2ard=0x0000000000000008" or missing value 18:29:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) 18:29:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6800, 0x0, 0x0, 0x0, 0x0) 18:29:23 executing program 5: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x121000, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x3477) 18:29:23 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis3ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x74, 0x0, 0x0, 0x0, 0x0) 18:29:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xcc03, 0x0) [ 824.396829][T28189] JFS: Cannot determine volume size [ 824.404060][T28189] JFS: discard option not supported on device [ 824.417364][T28189] JFS: Cannot determine volume size [ 824.423404][T28189] jfs: Unrecognized mount option "dis3ard=0x0000000000000008" or missing value 18:29:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x600, 0x0, 0x0, 0x0, 0x0) 18:29:23 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis4ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6c, 0x0, 0x0, 0x0, 0x0) 18:29:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x48, 0x0, 0x0, 0x0, 0x0) 18:29:23 executing program 5: r0 = semget$private(0x0, 0x2, 0x288) getresuid(&(0x7f00000001c0)=0x0, &(0x7f0000000200), &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) mount$9p_virtio(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x402, &(0x7f0000000300)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}, {@posixacl='posixacl'}, {@posixacl='posixacl'}, {@access_any='access=any'}, {@noextend='noextend'}, {@posixacl='posixacl'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'jfs\x00'}}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'jfs\x00'}}, {@obj_user={'obj_user', 0x3d, 'eth0)'}}, {@uid_eq={'uid', 0x3d, r1}}, {@uid_lt={'uid<', r2}}, {@hash='hash'}, {@measure='measure'}]}}) semctl$GETNCNT(r0, 0x0, 0xe, &(0x7f0000000000)=""/212) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 824.888522][T28217] JFS: Cannot determine volume size [ 824.907537][T28217] JFS: discard option not supported on device [ 824.917382][T28217] JFS: Cannot determine volume size [ 824.926902][T28217] jfs: Unrecognized mount option "dis4ard=0x0000000000000008" or missing value 18:29:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xe403, 0x0) [ 825.193720][T28218] 9pnet_virtio: no channels available for device jfs 18:29:24 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis5ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 825.415739][T28237] JFS: Cannot determine volume size [ 825.431542][T28237] JFS: discard option not supported on device [ 825.467088][T28237] JFS: Cannot determine volume size [ 825.480189][T28237] jfs: Unrecognized mount option "dis5ard=0x0000000000000008" or missing value 18:29:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x8c', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\xff', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xedc0, 0x0) 18:29:24 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis6ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 825.781057][T28259] JFS: Cannot determine volume size [ 825.786338][T28259] JFS: discard option not supported on device [ 825.839546][T28259] JFS: Cannot determine volume size [ 825.860191][T28259] jfs: Unrecognized mount option "dis6ard=0x0000000000000008" or missing value 18:29:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xf400, 0x0) 18:29:25 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis7ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:25 executing program 2 (fault-call:2 fault-nth:0): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 826.396934][T28294] FAULT_INJECTION: forcing a failure. [ 826.396934][T28294] name failslab, interval 1, probability 0, space 0, times 0 [ 826.429572][T28294] CPU: 1 PID: 28294 Comm: syz-executor.2 Not tainted 5.0.0-rc7-next-20190220 #39 [ 826.439156][T28294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 826.449221][T28294] Call Trace: [ 826.449253][T28294] dump_stack+0x172/0x1f0 [ 826.449285][T28294] should_fail.cold+0xa/0x15 [ 826.449308][T28294] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 826.449330][T28294] ? ___might_sleep+0x163/0x280 [ 826.449354][T28294] __should_failslab+0x121/0x190 [ 826.449375][T28294] should_failslab+0x9/0x14 [ 826.449394][T28294] __kmalloc+0x2dc/0x740 [ 826.449413][T28294] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 826.449429][T28294] ? fput_many+0x12c/0x1a0 [ 826.449448][T28294] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 826.449464][T28294] ? strnlen_user+0x1f0/0x280 [ 826.449481][T28294] ? __x64_sys_memfd_create+0x13c/0x470 [ 826.449502][T28294] __x64_sys_memfd_create+0x13c/0x470 [ 826.449531][T28294] ? memfd_fcntl+0x1550/0x1550 [ 826.449549][T28294] ? do_syscall_64+0x26/0x610 [ 826.449567][T28294] ? lockdep_hardirqs_on+0x418/0x5d0 [ 826.449585][T28294] ? trace_hardirqs_on+0x67/0x230 [ 826.449606][T28294] do_syscall_64+0x103/0x610 [ 826.449627][T28294] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 826.449641][T28294] RIP: 0033:0x457e29 [ 826.449659][T28294] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 826.449668][T28294] RSP: 002b:00007f3b00d88a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 826.449685][T28294] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 826.449694][T28294] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 18:29:25 executing program 2 (fault-call:2 fault-nth:1): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 826.449705][T28294] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 826.449715][T28294] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b00d896d4 [ 826.449733][T28294] R13: 00000000004c6799 R14: 00000000004dbcb0 R15: 0000000000000004 [ 826.586824][T28284] JFS: Cannot determine volume size [ 826.643432][T28284] JFS: discard option not supported on device [ 826.649979][T28284] JFS: Cannot determine volume size [ 826.655490][T28284] jfs: Unrecognized mount option "dis7ard=0x0000000000000008" or missing value [ 826.674712][T28296] FAULT_INJECTION: forcing a failure. [ 826.674712][T28296] name failslab, interval 1, probability 0, space 0, times 0 [ 826.687767][T28296] CPU: 0 PID: 28296 Comm: syz-executor.2 Not tainted 5.0.0-rc7-next-20190220 #39 [ 826.696900][T28296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 826.696907][T28296] Call Trace: [ 826.696936][T28296] dump_stack+0x172/0x1f0 [ 826.696959][T28296] should_fail.cold+0xa/0x15 [ 826.696980][T28296] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 826.697003][T28296] ? ___might_sleep+0x163/0x280 [ 826.697024][T28296] __should_failslab+0x121/0x190 [ 826.697043][T28296] should_failslab+0x9/0x14 [ 826.697071][T28296] kmem_cache_alloc+0x2be/0x710 [ 826.744284][T28296] ? __alloc_fd+0x430/0x530 [ 826.748811][T28296] ? shmem_destroy_callback+0xc0/0xc0 [ 826.754188][T28296] shmem_alloc_inode+0x1c/0x50 [ 826.758958][T28296] alloc_inode+0x66/0x190 [ 826.763291][T28296] new_inode_pseudo+0x19/0xf0 [ 826.767990][T28296] new_inode+0x1f/0x40 [ 826.772072][T28296] shmem_get_inode+0x84/0x780 [ 826.776785][T28296] __shmem_file_setup.part.0+0x7e/0x2b0 [ 826.782363][T28296] shmem_file_setup+0x66/0x90 [ 826.787074][T28296] __x64_sys_memfd_create+0x2a2/0x470 [ 826.792474][T28296] ? memfd_fcntl+0x1550/0x1550 [ 826.797262][T28296] ? do_syscall_64+0x26/0x610 [ 826.801947][T28296] ? lockdep_hardirqs_on+0x418/0x5d0 [ 826.807240][T28296] ? trace_hardirqs_on+0x67/0x230 [ 826.812277][T28296] do_syscall_64+0x103/0x610 [ 826.816881][T28296] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 826.822788][T28296] RIP: 0033:0x457e29 [ 826.826720][T28296] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 18:29:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xf401, 0x0) [ 826.846337][T28296] RSP: 002b:00007f3b00d88a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 826.854760][T28296] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 826.862745][T28296] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 826.870735][T28296] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 826.878734][T28296] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b00d896d4 [ 826.886812][T28296] R13: 00000000004c6799 R14: 00000000004dbcb0 R15: 0000000000000004 18:29:26 executing program 2 (fault-call:2 fault-nth:2): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:26 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:26 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis8ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:26 executing program 0 (fault-call:10 fault-nth:0): clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:26 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x10) listen(r0, 0x0) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000140)=0x2, 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) [ 827.148577][T28301] FAULT_INJECTION: forcing a failure. [ 827.148577][T28301] name failslab, interval 1, probability 0, space 0, times 0 [ 827.172287][T28301] CPU: 1 PID: 28301 Comm: syz-executor.2 Not tainted 5.0.0-rc7-next-20190220 #39 [ 827.181460][T28301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 827.181469][T28301] Call Trace: [ 827.181502][T28301] dump_stack+0x172/0x1f0 [ 827.181543][T28301] should_fail.cold+0xa/0x15 [ 827.203802][T28301] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 827.209620][T28301] ? ___might_sleep+0x163/0x280 [ 827.214489][T28301] __should_failslab+0x121/0x190 [ 827.219458][T28301] should_failslab+0x9/0x14 [ 827.223984][T28301] kmem_cache_alloc+0x2be/0x710 [ 827.228856][T28301] ? current_time+0x6b/0x140 [ 827.233479][T28301] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 827.239323][T28301] ? lockdep_hardirqs_on+0x418/0x5d0 [ 827.244630][T28301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 827.250889][T28301] ? timespec64_trunc+0xf0/0x180 [ 827.255836][T28301] __d_alloc+0x2e/0x8c0 [ 827.260003][T28301] d_alloc_pseudo+0x1e/0x30 [ 827.264524][T28301] alloc_file_pseudo+0xe2/0x280 [ 827.269397][T28301] ? alloc_file+0x4d0/0x4d0 [ 827.273923][T28301] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 827.280200][T28301] __shmem_file_setup.part.0+0x108/0x2b0 [ 827.285875][T28301] shmem_file_setup+0x66/0x90 [ 827.290575][T28301] __x64_sys_memfd_create+0x2a2/0x470 [ 827.295966][T28301] ? memfd_fcntl+0x1550/0x1550 [ 827.300746][T28301] ? do_syscall_64+0x26/0x610 [ 827.305431][T28301] ? lockdep_hardirqs_on+0x418/0x5d0 [ 827.310724][T28301] ? trace_hardirqs_on+0x67/0x230 [ 827.315768][T28301] do_syscall_64+0x103/0x610 [ 827.320383][T28301] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 827.326301][T28301] RIP: 0033:0x457e29 [ 827.330209][T28301] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 827.349822][T28301] RSP: 002b:00007f3b00d88a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 827.358249][T28301] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 827.366239][T28301] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 827.374232][T28301] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 827.382223][T28301] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b00d896d4 [ 827.390212][T28301] R13: 00000000004c6799 R14: 00000000004dbcb0 R15: 0000000000000004 18:29:26 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 827.462373][T28309] FAULT_INJECTION: forcing a failure. [ 827.462373][T28309] name failslab, interval 1, probability 0, space 0, times 0 18:29:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xf600, 0x0) 18:29:26 executing program 2 (fault-call:2 fault-nth:3): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 827.507123][T28310] JFS: Cannot determine volume size [ 827.521835][T28310] JFS: discard option not supported on device [ 827.522775][T28309] CPU: 0 PID: 28309 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 827.537096][T28309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 827.544413][T28310] JFS: Cannot determine volume size [ 827.547158][T28309] Call Trace: [ 827.547182][T28309] dump_stack+0x172/0x1f0 [ 827.547204][T28309] should_fail.cold+0xa/0x15 [ 827.547222][T28309] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 827.547247][T28309] ? ___might_sleep+0x163/0x280 [ 827.570989][T28310] jfs: Unrecognized mount option "dis8ard=0x0000000000000008" or missing value [ 827.575680][T28309] __should_failslab+0x121/0x190 [ 827.575702][T28309] should_failslab+0x9/0x14 [ 827.575718][T28309] __kmalloc+0x2dc/0x740 [ 827.575735][T28309] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 827.575756][T28309] ? fput_many+0x12c/0x1a0 [ 827.604037][T28320] FAULT_INJECTION: forcing a failure. [ 827.604037][T28320] name failslab, interval 1, probability 0, space 0, times 0 [ 827.604620][T28309] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 827.627870][T28309] ? strnlen_user+0x1f0/0x280 [ 827.632576][T28309] ? __x64_sys_memfd_create+0x13c/0x470 [ 827.638158][T28309] __x64_sys_memfd_create+0x13c/0x470 [ 827.643564][T28309] ? memfd_fcntl+0x1550/0x1550 [ 827.648347][T28309] ? do_syscall_64+0x26/0x610 [ 827.653038][T28309] ? lockdep_hardirqs_on+0x418/0x5d0 [ 827.658336][T28309] ? trace_hardirqs_on+0x67/0x230 [ 827.663379][T28309] do_syscall_64+0x103/0x610 [ 827.667993][T28309] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 827.673897][T28309] RIP: 0033:0x457e29 [ 827.677814][T28309] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 827.697428][T28309] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 827.705849][T28309] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 827.713829][T28309] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 827.721815][T28309] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 827.729809][T28309] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fedcf4bf6d4 [ 827.737803][T28309] R13: 00000000004c66ec R14: 00000000004dbbf0 R15: 0000000000000003 [ 827.745822][T28320] CPU: 1 PID: 28320 Comm: syz-executor.2 Not tainted 5.0.0-rc7-next-20190220 #39 [ 827.754953][T28320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 827.765011][T28320] Call Trace: [ 827.765035][T28320] dump_stack+0x172/0x1f0 [ 827.765061][T28320] should_fail.cold+0xa/0x15 [ 827.777286][T28320] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 827.783130][T28320] ? ___might_sleep+0x163/0x280 [ 827.783152][T28320] __should_failslab+0x121/0x190 [ 827.783174][T28320] should_failslab+0x9/0x14 [ 827.797483][T28320] kmem_cache_alloc+0x2be/0x710 [ 827.797521][T28320] __alloc_file+0x27/0x300 [ 827.806776][T28320] alloc_empty_file+0x72/0x170 [ 827.811561][T28320] alloc_file+0x5e/0x4d0 [ 827.815830][T28320] alloc_file_pseudo+0x189/0x280 [ 827.820780][T28320] ? alloc_file+0x4d0/0x4d0 [ 827.820801][T28320] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 827.820824][T28320] __shmem_file_setup.part.0+0x108/0x2b0 [ 827.820841][T28320] shmem_file_setup+0x66/0x90 [ 827.820859][T28320] __x64_sys_memfd_create+0x2a2/0x470 [ 827.820873][T28320] ? memfd_fcntl+0x1550/0x1550 [ 827.820888][T28320] ? do_syscall_64+0x26/0x610 [ 827.820905][T28320] ? lockdep_hardirqs_on+0x418/0x5d0 [ 827.820921][T28320] ? trace_hardirqs_on+0x67/0x230 [ 827.820943][T28320] do_syscall_64+0x103/0x610 [ 827.871631][T28320] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 827.877545][T28320] RIP: 0033:0x457e29 [ 827.881458][T28320] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 18:29:27 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0xffffffffffffffff) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sched_setaffinity(r0, 0x8, &(0x7f0000000340)=0x7e) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000240)={{{@in=@rand_addr=0xfffffffffffffc00, @in6=@dev={0xfe, 0x80, [], 0xc}, 0x4e22, 0x0, 0x4e23, 0xc0, 0xa, 0xa0, 0x20, 0x7f, r3, r4}, {0x8000, 0x6862, 0xaaba, 0x1f, 0x1, 0x1, 0x400, 0x7}, {0x2, 0x28, 0xe5, 0xf}, 0x1, 0x6e6bc0, 0x0, 0x1, 0x2}, {{@in=@broadcast, 0x4d5, 0xff}, 0xa, @in6=@remote, 0x0, 0x7, 0x3, 0x4, 0x3, 0x6, 0x7715}}, 0xe8) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 827.901078][T28320] RSP: 002b:00007f3b00d88a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 827.909498][T28320] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 827.917492][T28320] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 827.925487][T28320] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 827.933485][T28320] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b00d896d4 [ 827.941487][T28320] R13: 00000000004c6799 R14: 00000000004dbcb0 R15: 0000000000000004 18:29:27 executing program 5: socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x8, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x1b, &(0x7f00000000c0), &(0x7f0000000100)=0x4) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$BLKALIGNOFF(r2, 0x1267, &(0x7f0000000000)) 18:29:27 executing program 2 (fault-call:2 fault-nth:4): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:27 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis9ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xfc03, 0x0) [ 828.203829][T28341] FAULT_INJECTION: forcing a failure. [ 828.203829][T28341] name failslab, interval 1, probability 0, space 0, times 0 [ 828.241331][T28339] JFS: Cannot determine volume size 18:29:27 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:27 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000040)=0xb2) ptrace$cont(0x18, r0, 0x0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x3) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000080)={{0x32, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x4, 'dh\x00', 0x23, 0x7, 0x39}, {@multicast1, 0x4e24, 0x3, 0x6, 0x4, 0x1}}, 0x44) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000180)="304f0513a6529ec05adcd002f628432fb3a5e870629bcaa238d7b6fc29a332d41c3a9532071c640967304457ffb0ea5592ede04491b0e6f7a99c093dc3be3665bee1a58517fdab585c42165aabf6cfa315036e86c060fe4cca08236f41d76f3b6555057e183533f3b7c5504f0e82700746e8000c3ecd26e1af2953460292", 0x7e, 0x20000000, 0x0, 0x0) 18:29:27 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x100000000000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) r3 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x2, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x100000000, 0x6, 0x10000, 0x8, 0x0, 0x7, 0x400, 0x2, 0x7, 0x2, 0x80000000, 0x271, 0x5, 0x8, 0x3, 0x10000000000, 0x200000000000000, 0x1, 0x2, 0x1, 0xffffffff, 0x3, 0x0, 0x6, 0x8, 0x6, 0x8, 0x8, 0xd982, 0x1b14, 0x400, 0xfffffffffffffffc, 0xcd7, 0xf64c, 0x8, 0x7, 0x0, 0x71a75cf, 0x5, @perf_bp={&(0x7f0000000040), 0x4}, 0x4, 0xac, 0x5, 0x7, 0x7fff, 0x60da, 0x89}, r2, 0x1, r3, 0x8) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x600000000000000, [0x40000071], [0xc2]}) [ 828.259323][T28339] JFS: discard option not supported on device [ 828.279325][T28339] JFS: Cannot determine volume size [ 828.284732][T28341] CPU: 0 PID: 28341 Comm: syz-executor.2 Not tainted 5.0.0-rc7-next-20190220 #39 [ 828.284752][T28341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 828.303930][T28341] Call Trace: [ 828.307230][T28341] dump_stack+0x172/0x1f0 [ 828.311576][T28341] should_fail.cold+0xa/0x15 [ 828.316179][T28341] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 828.322003][T28341] ? ___might_sleep+0x163/0x280 [ 828.326886][T28341] __should_failslab+0x121/0x190 [ 828.331852][T28341] should_failslab+0x9/0x14 [ 828.336380][T28341] kmem_cache_alloc+0x2be/0x710 [ 828.341259][T28341] ? rcu_read_lock_sched_held+0x110/0x130 [ 828.346996][T28341] ? kmem_cache_alloc+0x341/0x710 [ 828.352041][T28341] security_file_alloc+0x39/0x170 [ 828.357076][T28341] __alloc_file+0xac/0x300 [ 828.361518][T28341] alloc_empty_file+0x72/0x170 [ 828.366299][T28341] alloc_file+0x5e/0x4d0 [ 828.370531][T28350] FAULT_INJECTION: forcing a failure. [ 828.370531][T28350] name failslab, interval 1, probability 0, space 0, times 0 [ 828.370565][T28341] alloc_file_pseudo+0x189/0x280 [ 828.388815][T28341] ? alloc_file+0x4d0/0x4d0 [ 828.393337][T28341] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 828.399598][T28341] __shmem_file_setup.part.0+0x108/0x2b0 [ 828.405245][T28341] shmem_file_setup+0x66/0x90 18:29:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xfd03, 0x0) 18:29:27 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000200)="5e592ea7bf4b699c4bef37a16936a63d9560c1dc7dbcdb96792cca782378278ab0fee60f9a186e8169ac335f439992600375c5a190731b6a4b919b514d4a8a8fc50b0d51c4dc46487501900c734c48407bbf6b71dc663a89b2db8f8d1a579ebb96412dbab1f4e1b085b94f05d9972447a6341cb7cfbf6f44bd35f6f2a08887216e1f764cbce84ea78a30d201fa23") ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 828.409932][T28341] __x64_sys_memfd_create+0x2a2/0x470 [ 828.415311][T28341] ? memfd_fcntl+0x1550/0x1550 [ 828.420091][T28341] ? do_syscall_64+0x26/0x610 [ 828.424799][T28341] ? lockdep_hardirqs_on+0x418/0x5d0 [ 828.430117][T28341] ? trace_hardirqs_on+0x67/0x230 [ 828.435674][T28341] do_syscall_64+0x103/0x610 [ 828.440293][T28341] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 828.446198][T28341] RIP: 0033:0x457e29 [ 828.450100][T28341] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 828.469715][T28341] RSP: 002b:00007f3b00d67a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 828.478151][T28341] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 828.486165][T28341] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 828.494150][T28341] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 00000000fbad8001 [ 828.502135][T28341] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b00d686d4 [ 828.510112][T28341] R13: 00000000004c6799 R14: 00000000004dbcb0 R15: 0000000000000003 [ 828.519079][T28350] CPU: 1 PID: 28350 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 828.528220][T28350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 828.538304][T28350] Call Trace: [ 828.539381][T28339] jfs: Unrecognized mount option "dis9ard=0x0000000000000008" or missing value [ 828.541650][T28350] dump_stack+0x172/0x1f0 [ 828.541670][T28350] should_fail.cold+0xa/0x15 [ 828.541697][T28350] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 828.554961][T28350] ? ___might_sleep+0x163/0x280 [ 828.570171][T28350] __should_failslab+0x121/0x190 [ 828.575126][T28350] should_failslab+0x9/0x14 [ 828.575143][T28350] kmem_cache_alloc+0x2be/0x710 [ 828.575159][T28350] ? __alloc_fd+0x430/0x530 [ 828.575181][T28350] ? shmem_destroy_callback+0xc0/0xc0 [ 828.589066][T28350] shmem_alloc_inode+0x1c/0x50 [ 828.599189][T28350] alloc_inode+0x66/0x190 [ 828.603534][T28350] new_inode_pseudo+0x19/0xf0 [ 828.603552][T28350] new_inode+0x1f/0x40 [ 828.603569][T28350] shmem_get_inode+0x84/0x780 [ 828.603589][T28350] __shmem_file_setup.part.0+0x7e/0x2b0 [ 828.617014][T28350] shmem_file_setup+0x66/0x90 [ 828.617035][T28350] __x64_sys_memfd_create+0x2a2/0x470 [ 828.617054][T28350] ? memfd_fcntl+0x1550/0x1550 [ 828.637480][T28350] ? do_syscall_64+0x26/0x610 [ 828.642183][T28350] ? lockdep_hardirqs_on+0x418/0x5d0 [ 828.647484][T28350] ? trace_hardirqs_on+0x67/0x230 [ 828.652545][T28350] do_syscall_64+0x103/0x610 [ 828.657154][T28350] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 828.663042][T28350] RIP: 0033:0x457e29 [ 828.666940][T28350] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 828.686556][T28350] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 828.694986][T28350] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 828.702968][T28350] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 18:29:27 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000000)) wait4(r0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:27 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x1, &(0x7f00000000c0)=0x80000001, 0x4) r1 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(r1, &(0x7f0000cb8fe4)={0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}}, 0x47) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r0) listen(r0, 0x0) [ 828.710951][T28350] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 828.718935][T28350] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fedcf4bf6d4 [ 828.726925][T28350] R13: 00000000004c66ec R14: 00000000004dbbf0 R15: 0000000000000003 18:29:27 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:28 executing program 2 (fault-call:2 fault-nth:5): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:28 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis:ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 828.894681][T28367] FAULT_INJECTION: forcing a failure. [ 828.894681][T28367] name failslab, interval 1, probability 0, space 0, times 0 [ 828.983817][T28367] CPU: 0 PID: 28367 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 828.992999][T28367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 829.003068][T28367] Call Trace: [ 829.006381][T28367] dump_stack+0x172/0x1f0 [ 829.010732][T28367] should_fail.cold+0xa/0x15 [ 829.015346][T28367] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 829.021185][T28367] ? ___might_sleep+0x163/0x280 [ 829.026068][T28367] __should_failslab+0x121/0x190 [ 829.031058][T28367] should_failslab+0x9/0x14 [ 829.035592][T28367] kmem_cache_alloc+0x2be/0x710 [ 829.040477][T28367] ? current_time+0x6b/0x140 [ 829.045087][T28367] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 829.050905][T28367] ? lockdep_hardirqs_on+0x418/0x5d0 [ 829.056195][T28367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 829.062442][T28367] ? timespec64_trunc+0xf0/0x180 [ 829.067397][T28367] __d_alloc+0x2e/0x8c0 [ 829.071571][T28367] d_alloc_pseudo+0x1e/0x30 [ 829.076086][T28367] alloc_file_pseudo+0xe2/0x280 [ 829.080960][T28367] ? alloc_file+0x4d0/0x4d0 [ 829.085486][T28367] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 829.091767][T28367] __shmem_file_setup.part.0+0x108/0x2b0 [ 829.097419][T28367] shmem_file_setup+0x66/0x90 [ 829.102102][T28367] __x64_sys_memfd_create+0x2a2/0x470 [ 829.107474][T28367] ? memfd_fcntl+0x1550/0x1550 [ 829.112246][T28367] ? do_syscall_64+0x26/0x610 [ 829.116941][T28367] ? lockdep_hardirqs_on+0x418/0x5d0 [ 829.122239][T28367] ? trace_hardirqs_on+0x67/0x230 [ 829.127288][T28367] do_syscall_64+0x103/0x610 [ 829.131908][T28367] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 829.137820][T28367] RIP: 0033:0x457e29 [ 829.141728][T28367] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 829.161342][T28367] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 829.169770][T28367] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 18:29:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f, 0x0) 18:29:28 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(r0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4200, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0x11, r0, 0xfffffffffffffffc, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:28 executing program 5: r0 = socket$inet6(0x10, 0x100000003, 0x0) sendmsg(r0, &(0x7f0000000040), 0xfffffffffffffffd) recvmsg(r0, &(0x7f0000000080)={&(0x7f0000000100)=@xdp, 0x80, 0x0}, 0x0) [ 829.177793][T28367] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 829.185779][T28367] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 829.193770][T28367] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fedcf4bf6d4 [ 829.201753][T28367] R13: 00000000004c66ec R14: 00000000004dbbf0 R15: 0000000000000003 [ 829.279790][T28372] JFS: Cannot determine volume size 18:29:28 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 829.313104][T28372] JFS: discard option not supported on device [ 829.339492][T28372] JFS: Cannot determine volume size 18:29:28 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000000)={0xc, 0x1ff, 0x3}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20000, 0x0) [ 829.387089][T28372] jfs: Unrecognized mount option "dis:ard=0x0000000000000008" or missing value 18:29:28 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis;ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:28 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 829.515238][T28384] FAULT_INJECTION: forcing a failure. [ 829.515238][T28384] name failslab, interval 1, probability 0, space 0, times 0 [ 829.544293][T28384] CPU: 0 PID: 28384 Comm: syz-executor.2 Not tainted 5.0.0-rc7-next-20190220 #39 [ 829.553452][T28384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 829.563527][T28384] Call Trace: [ 829.567171][T28384] dump_stack+0x172/0x1f0 [ 829.571555][T28384] should_fail.cold+0xa/0x15 [ 829.576174][T28384] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 829.582014][T28384] ? ___might_sleep+0x163/0x280 [ 829.586898][T28384] __should_failslab+0x121/0x190 [ 829.591855][T28384] should_failslab+0x9/0x14 [ 829.596370][T28384] kmem_cache_alloc+0x2be/0x710 [ 829.601225][T28384] ? notify_change+0x6d5/0xfb0 [ 829.606000][T28384] ? do_sys_ftruncate+0x41e/0x550 [ 829.611034][T28384] getname_flags+0xd6/0x5b0 18:29:28 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpgid(0x0) capset(&(0x7f0000000000)={0x0, r0}, &(0x7f0000000040)={0x1, 0x1000, 0x1, 0x61, 0xffffffff, 0x6}) r1 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000140)=@v1={0x1000000, [{0x10001, 0x7af7}]}, 0xc, 0x2) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 829.615571][T28384] getname+0x1a/0x20 [ 829.619494][T28384] do_sys_open+0x2c9/0x5d0 [ 829.623931][T28384] ? filp_open+0x80/0x80 [ 829.628186][T28384] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 829.634446][T28384] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 829.634464][T28384] ? do_syscall_64+0x26/0x610 [ 829.634484][T28384] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 829.634499][T28384] ? do_syscall_64+0x26/0x610 [ 829.634532][T28384] __x64_sys_open+0x7e/0xc0 [ 829.634550][T28384] do_syscall_64+0x103/0x610 [ 829.634573][T28384] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 829.644729][T28384] RIP: 0033:0x411f11 [ 829.644747][T28384] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 829.644755][T28384] RSP: 002b:00007f3b00d46a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 829.644771][T28384] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 829.644788][T28384] RDX: 00007f3b00d46afa RSI: 0000000000000002 RDI: 00007f3b00d46af0 [ 829.644798][T28384] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 829.644807][T28384] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 829.644816][T28384] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000004 [ 829.647805][T28399] FAULT_INJECTION: forcing a failure. [ 829.647805][T28399] name failslab, interval 1, probability 0, space 0, times 0 [ 829.656145][T28399] CPU: 0 PID: 28399 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 829.670641][T28399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 829.670647][T28399] Call Trace: [ 829.670669][T28399] dump_stack+0x172/0x1f0 [ 829.670691][T28399] should_fail.cold+0xa/0x15 [ 829.670710][T28399] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 829.670730][T28399] ? ___might_sleep+0x163/0x280 [ 829.670749][T28399] __should_failslab+0x121/0x190 [ 829.670767][T28399] should_failslab+0x9/0x14 [ 829.670791][T28399] kmem_cache_alloc+0x2be/0x710 [ 829.670805][T28399] ? current_time+0x6b/0x140 [ 829.670820][T28399] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 829.670836][T28399] ? lockdep_hardirqs_on+0x418/0x5d0 [ 829.670852][T28399] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 829.670865][T28399] ? timespec64_trunc+0xf0/0x180 [ 829.670881][T28399] __d_alloc+0x2e/0x8c0 [ 829.670897][T28399] d_alloc_pseudo+0x1e/0x30 [ 829.670912][T28399] alloc_file_pseudo+0xe2/0x280 [ 829.670927][T28399] ? alloc_file+0x4d0/0x4d0 [ 829.670948][T28399] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 829.862679][T28399] __shmem_file_setup.part.0+0x108/0x2b0 [ 829.868343][T28399] shmem_file_setup+0x66/0x90 [ 829.873042][T28399] __x64_sys_memfd_create+0x2a2/0x470 [ 829.878426][T28399] ? memfd_fcntl+0x1550/0x1550 [ 829.883223][T28399] ? do_syscall_64+0x26/0x610 [ 829.887935][T28399] ? lockdep_hardirqs_on+0x418/0x5d0 [ 829.893269][T28399] ? trace_hardirqs_on+0x67/0x230 [ 829.898311][T28399] do_syscall_64+0x103/0x610 [ 829.902915][T28399] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 829.908808][T28399] RIP: 0033:0x457e29 [ 829.912710][T28399] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 829.932330][T28399] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 829.940885][T28399] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 829.948869][T28399] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 829.956854][T28399] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 829.964851][T28399] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fedcf4bf6d4 [ 829.972830][T28399] R13: 00000000004c66ec R14: 00000000004dbbf0 R15: 0000000000000003 [ 830.000910][T28394] JFS: Cannot determine volume size 18:29:29 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:29 executing program 2 (fault-call:2 fault-nth:6): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:29 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x21000200}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="000100004000200a26bd7000febf566f70ade637947cf8fa", @ANYRES32=r1, @ANYBLOB="44003700529cf829b6d8f0e3919f669f06c3c11ce9caf1df4baca42f82f66e17c9763caea9c1b21962e89a6371702361b9640b8744200f54cbbdb03d856cab4feaef00009c000d00080085000100000008000e00000000000800180000000000de96ee4da7fa6b077dada4024d474896c85f5e6718d6705addcc5ff30e565d576be2d0865257e71c1b9708ea360a36b8618d796cdd5eb6b49bb0c4737cb3dbc3ff8ce44c50ddb125dbf9007238fec680ab5a01ab2be81b6121ed64b8de540002bee723164f922e655101348e5e8197704095c75f4c5281f3dd1213d2686fc60004008900"], 0x100}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) ptrace$cont(0x1f, r0, 0x0, 0x0) pwrite64(r2, &(0x7f00000000c0)="4ed55d92a64c483e57e9682b0894f2d70d274018c399b3b84e39ba666a430b88de35614ba4bd494c", 0x28, 0x13) [ 830.019415][T28394] JFS: discard option not supported on device [ 830.048912][T28394] JFS: Cannot determine volume size [ 830.057317][T28394] jfs: Unrecognized mount option "dis;ard=0x0000000000000008" or missing value [ 830.112397][T28413] FAULT_INJECTION: forcing a failure. [ 830.112397][T28413] name failslab, interval 1, probability 0, space 0, times 0 [ 830.136578][T28413] CPU: 0 PID: 28413 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 830.145755][T28413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 830.155823][T28413] Call Trace: [ 830.159135][T28413] dump_stack+0x172/0x1f0 [ 830.163484][T28413] should_fail.cold+0xa/0x15 [ 830.168106][T28413] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 830.173940][T28413] ? ___might_sleep+0x163/0x280 [ 830.178829][T28413] __should_failslab+0x121/0x190 [ 830.183807][T28413] should_failslab+0x9/0x14 [ 830.188335][T28413] kmem_cache_alloc+0x2be/0x710 [ 830.193207][T28413] ? rcu_read_lock_sched_held+0x110/0x130 [ 830.198943][T28413] ? kmem_cache_alloc+0x341/0x710 [ 830.203985][T28413] security_file_alloc+0x39/0x170 [ 830.209018][T28413] __alloc_file+0xac/0x300 [ 830.213447][T28413] alloc_empty_file+0x72/0x170 [ 830.218241][T28413] alloc_file+0x5e/0x4d0 [ 830.222495][T28413] alloc_file_pseudo+0x189/0x280 [ 830.227460][T28413] ? alloc_file+0x4d0/0x4d0 [ 830.231992][T28413] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 830.238265][T28413] __shmem_file_setup.part.0+0x108/0x2b0 [ 830.243920][T28413] shmem_file_setup+0x66/0x90 [ 830.248612][T28413] __x64_sys_memfd_create+0x2a2/0x470 [ 830.253993][T28413] ? memfd_fcntl+0x1550/0x1550 [ 830.258780][T28413] ? do_syscall_64+0x26/0x610 [ 830.263468][T28413] ? lockdep_hardirqs_on+0x418/0x5d0 [ 830.268761][T28413] ? trace_hardirqs_on+0x67/0x230 [ 830.273827][T28413] do_syscall_64+0x103/0x610 [ 830.278441][T28413] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 830.284352][T28413] RIP: 0033:0x457e29 [ 830.288263][T28413] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 830.307871][T28413] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 830.316294][T28413] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 830.324279][T28413] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 830.332279][T28413] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 830.340275][T28413] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fedcf4bf6d4 [ 830.348253][T28413] R13: 00000000004c66ec R14: 00000000004dbbf0 R15: 0000000000000003 [ 830.358276][T28414] FAULT_INJECTION: forcing a failure. [ 830.358276][T28414] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 830.371529][T28414] CPU: 1 PID: 28414 Comm: syz-executor.2 Not tainted 5.0.0-rc7-next-20190220 #39 [ 830.380646][T28414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 830.390729][T28414] Call Trace: [ 830.390761][T28414] dump_stack+0x172/0x1f0 [ 830.390784][T28414] should_fail.cold+0xa/0x15 [ 830.390805][T28414] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 830.390826][T28414] ? mark_held_locks+0xf0/0xf0 [ 830.390853][T28414] should_fail_alloc_page+0x50/0x60 [ 830.418773][T28414] __alloc_pages_nodemask+0x1a1/0x7e0 [ 830.424167][T28414] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 830.429902][T28414] ? find_held_lock+0x35/0x130 [ 830.435121][T28414] ? do_truncate+0x187/0x220 [ 830.439735][T28414] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 830.445558][T28414] cache_grow_begin+0x9c/0x850 [ 830.450326][T28414] ? getname_flags+0xd6/0x5b0 [ 830.450345][T28414] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 830.450364][T28414] kmem_cache_alloc+0x645/0x710 [ 830.450378][T28414] ? notify_change+0x6d5/0xfb0 [ 830.450393][T28414] ? do_sys_ftruncate+0x41e/0x550 [ 830.450410][T28414] getname_flags+0xd6/0x5b0 [ 830.450427][T28414] getname+0x1a/0x20 [ 830.450441][T28414] do_sys_open+0x2c9/0x5d0 [ 830.450460][T28414] ? filp_open+0x80/0x80 [ 830.450474][T28414] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 830.450497][T28414] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 830.504728][T28414] ? do_syscall_64+0x26/0x610 [ 830.509412][T28414] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 830.515482][T28414] ? do_syscall_64+0x26/0x610 [ 830.520184][T28414] __x64_sys_open+0x7e/0xc0 [ 830.524702][T28414] do_syscall_64+0x103/0x610 [ 830.529321][T28414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 830.535403][T28414] RIP: 0033:0x411f11 [ 830.539331][T28414] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 18:29:29 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0xffffffffffffffff, 0x3c7) setsockopt$sock_int(r0, 0x1, 0x4000000200000002, &(0x7f00000002c0)=0x3ff, 0x4) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000040)=@routing={0x23, 0x4, 0x0, 0x7f, 0x0, [@local, @mcast1]}, 0x28) bind$inet6(r0, &(0x7f0000f65000)={0xa, 0x4e20, 0x0, @loopback}, 0x17e) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 18:29:29 executing program 3 (fault-call:0 fault-nth:5): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:29 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000000)={0x6, 0xff2, 0x2}, 0xc) shmget$private(0x0, 0x3000, 0x200, &(0x7f0000ffa000/0x3000)=nil) 18:29:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x30000, 0x0) [ 830.558943][T28414] RSP: 002b:00007f3b00d88a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 830.567368][T28414] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 830.575547][T28414] RDX: 00007f3b00d88afa RSI: 0000000000000002 RDI: 00007f3b00d88af0 [ 830.583541][T28414] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 830.591531][T28414] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 830.599508][T28414] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000004 18:29:29 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 830.679331][T28414] FAT-fs (loop2): bogus number of reserved sectors [ 830.718246][T28426] FAULT_INJECTION: forcing a failure. 18:29:29 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000000)=@caif=@util={0x25, "1930af84fbfd18b9e78c05782938e272"}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000080)="65f39045ef84ba0177e7ded9393f252ad725e4f1ff814661901ff6bb472d9052d845902ffe703b25de5d39791fc973f500cce06ac8bcc691487800b82af7919410f385a638eca4a2d0df6c13473c6935474e08202a72f9c12024021ea6e02a87b29d0dcaa2f9238fcc6bc0587940e4d9", 0x70}, {&(0x7f0000000140)="4d1a416d678871bf64a5225500b4b8a54d0675c36030081f45cc1ba0ba290aab72a0f5edc0d49dbd7899395906076be8fdee50a88d4aeab3d49e6631d1ae5fbd0e7771a8547d47ead9128eb9fb97a1ac12fb43e7290ccd165100f7b9a8787d4aa4b8edd51041b5e004f095005813d66c1b34890a49b420e9e03431353e06aea9b43b43ab07fbf5402d076025aebb35721edd8880ddec5c795a04a49d7529611578eadb", 0xa3}], 0x2, &(0x7f0000000240)=[{0x90, 0x101, 0x5, "27323848170fc0ee860e92b7886e1f38389f855bc8a607afe38cd107e68e8c09b61775fe75271fc2e5dd17e0ac2d44d466025913afa42fb52bbdf1f8624492415401219dabf7870507149f523b2b33de85292cc3e78847aabfc05bb2de04971c15ba9dac6fd2b889a54ec326bac540497f059959f6b63d431bf2ae3b"}], 0x90}, 0x80) ptrace$cont(0x18, r0, 0x0, 0x0) pwrite64(r1, &(0x7f0000000340)="2aba2ccf308f4f2641351242bcc7b423fe91fafd341aa01dbdf192d53052041b23acd2a4c9ed2abfdd9ae15a07d0b76b3ac53156b3acef5daa1e5cdca41dde815b61ebc367635c838259045f077721224ef494751f579b73d82800f5bc2342d275d0ecb6673fc958eb8d4124fa877949abaa9c6c619e4173d86369478a0cd7ee32b063a5c6c15e2851489f69c8306c448011dd9181351a55ed3c9d1ec9143c5502e3a746f1431dee28ae0991492a3a50511120d41a56861315278b0e8e65fc1623396a7732548267fe3c177dc04f422fa41371c30d839a67e8c6e58124df8acea7dfd17887dd76633eb84bb942d04555bbcab9c5f0b8", 0xf6, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 830.718246][T28426] name failslab, interval 1, probability 0, space 0, times 0 [ 830.732794][T28414] FAT-fs (loop2): Can't find a valid FAT filesystem [ 830.775702][T28426] CPU: 1 PID: 28426 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 830.784873][T28426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 830.794932][T28426] Call Trace: [ 830.798241][T28426] dump_stack+0x172/0x1f0 [ 830.802586][T28426] should_fail.cold+0xa/0x15 [ 830.807188][T28426] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 830.813006][T28426] ? ___might_sleep+0x163/0x280 [ 830.817877][T28426] __should_failslab+0x121/0x190 [ 830.822830][T28426] should_failslab+0x9/0x14 [ 830.827343][T28426] kmem_cache_alloc+0x2be/0x710 [ 830.832218][T28426] ? rcu_read_lock_sched_held+0x110/0x130 [ 830.837964][T28426] ? kmem_cache_alloc+0x341/0x710 [ 830.843009][T28426] security_file_alloc+0x39/0x170 [ 830.848045][T28426] __alloc_file+0xac/0x300 [ 830.852468][T28426] alloc_empty_file+0x72/0x170 [ 830.857236][T28426] alloc_file+0x5e/0x4d0 [ 830.861484][T28426] alloc_file_pseudo+0x189/0x280 [ 830.866435][T28426] ? alloc_file+0x4d0/0x4d0 [ 830.870948][T28426] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 830.877203][T28426] __shmem_file_setup.part.0+0x108/0x2b0 [ 830.882854][T28426] shmem_file_setup+0x66/0x90 [ 830.887572][T28426] __x64_sys_memfd_create+0x2a2/0x470 [ 830.892977][T28426] ? memfd_fcntl+0x1550/0x1550 [ 830.897743][T28426] ? do_syscall_64+0x26/0x610 [ 830.902436][T28426] ? lockdep_hardirqs_on+0x418/0x5d0 [ 830.907724][T28426] ? trace_hardirqs_on+0x67/0x230 [ 830.912758][T28426] do_syscall_64+0x103/0x610 [ 830.917392][T28426] entry_SYSCALL_64_after_hwframe+0x49/0xbe 18:29:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/tcp\x00') ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f00000000c0)={0x3}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)=0x0) syz_open_procfs(r2, &(0x7f00000001c0)='attr/current\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000120007241dfffd946fa2830020200a00090000e8001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 830.923292][T28426] RIP: 0033:0x457e29 [ 830.927714][T28426] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 830.947412][T28426] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 830.947428][T28426] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 830.947435][T28426] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 18:29:30 executing program 3 (fault-call:0 fault-nth:6): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 830.947443][T28426] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 830.947452][T28426] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fedcf4bf6d4 [ 830.947461][T28426] R13: 00000000004c66ec R14: 00000000004dbbf0 R15: 0000000000000003 18:29:30 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 831.062429][T28429] JFS: Cannot determine volume size [ 831.096710][T28429] JFS: discard option not supported on device [ 831.103865][T28440] FAULT_INJECTION: forcing a failure. [ 831.103865][T28440] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 831.117081][T28440] CPU: 1 PID: 28440 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 831.126198][T28440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 831.136266][T28440] Call Trace: [ 831.139583][T28440] dump_stack+0x172/0x1f0 [ 831.143937][T28440] should_fail.cold+0xa/0x15 [ 831.148555][T28440] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 831.154373][T28440] ? mark_held_locks+0xf0/0xf0 [ 831.159146][T28440] should_fail_alloc_page+0x50/0x60 [ 831.164354][T28440] __alloc_pages_nodemask+0x1a1/0x7e0 [ 831.169746][T28440] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 831.175472][T28440] ? find_held_lock+0x35/0x130 [ 831.180266][T28440] ? do_truncate+0x187/0x220 [ 831.184880][T28440] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 831.190703][T28440] cache_grow_begin+0x9c/0x850 [ 831.195473][T28440] ? getname_flags+0xd6/0x5b0 [ 831.200162][T28440] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 831.206406][T28440] kmem_cache_alloc+0x645/0x710 18:29:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xfffffffffffffdac, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c00000010000707000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c000100697036746e6c00000c1e02000800040000000000"], 0x3c}}, 0x0) 18:29:30 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x804206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r2, 0xb39, 0x8}, 0xc) ptrace$cont(0x1f, r0, 0x0, 0x0) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f00000000c0)) [ 831.211289][T28440] ? notify_change+0x6d5/0xfb0 [ 831.216061][T28440] ? do_sys_ftruncate+0x41e/0x550 [ 831.221100][T28440] getname_flags+0xd6/0x5b0 [ 831.225623][T28440] getname+0x1a/0x20 [ 831.229557][T28440] do_sys_open+0x2c9/0x5d0 [ 831.234022][T28440] ? filp_open+0x80/0x80 [ 831.238274][T28440] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 831.244550][T28440] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 831.250021][T28440] ? do_syscall_64+0x26/0x610 [ 831.254706][T28440] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.260864][T28440] ? do_syscall_64+0x26/0x610 [ 831.265563][T28440] __x64_sys_open+0x7e/0xc0 [ 831.270079][T28440] do_syscall_64+0x103/0x610 [ 831.274690][T28440] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.280597][T28440] RIP: 0033:0x411f11 [ 831.284532][T28440] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 831.304238][T28440] RSP: 002b:00007fedcf4bea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 831.311080][T28429] JFS: Cannot determine volume size [ 831.312665][T28440] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 831.312675][T28440] RDX: 00007fedcf4beafa RSI: 0000000000000002 RDI: 00007fedcf4beaf0 [ 831.312684][T28440] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 831.312693][T28440] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 831.312702][T28440] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 [ 831.322478][T28429] jfs: Unrecognized mount option "dis0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) [ 831.405808][T28442] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 18:29:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x335) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xa405aabc269f1417, &(0x7f0000000080)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x707, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0xf, 0x2}]]}}}]}, 0x86}}, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) bind$tipc(r1, 0x0, 0x0) ioctl$IMGETCOUNT(r1, 0x80044943, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0xb0, &(0x7f00000001c0)=[@in6={0xa, 0x4e21, 0x7ff, @local, 0x4}, @in6={0xa, 0x4e20, 0x0, @rand_addr="df99f86ae14fa5eb112e47c7b1f81fd3", 0x7f}, @in6={0xa, 0x4e24, 0xffffffffffffff31, @empty, 0x5}, @in={0x2, 0x4e23, @remote}, @in6={0xa, 0x4e20, 0x6, @ipv4={[], [], @local}}, @in={0x2, 0x4e23, @rand_addr=0xfffffffffffffffe}, @in={0x2, 0x4e22, @remote}, @in={0x2, 0x4e23, @loopback}]}, &(0x7f0000000140)=0x10) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x400, 0x0) accept4$nfc_llcp(r1, &(0x7f00000003c0), &(0x7f0000000440)=0x60, 0x7fffc) write$FUSE_INIT(r3, &(0x7f0000000340)={0x50, 0x0, 0x5, {0x7, 0x1c, 0x8, 0x4000, 0x10000, 0x6, 0x2, 0x7f}}, 0x50) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000280)={r2, 0x100, 0xd1d}, &(0x7f00000002c0)=0x8) 18:29:30 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:30 executing program 3 (fault-call:0 fault-nth:7): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:30 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis=ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 831.602379][T28448] FAT-fs (loop2): bogus number of reserved sectors [ 831.634883][T28456] netlink: 'syz-executor.5': attribute type 15 has an invalid length. [ 831.649351][T28448] FAT-fs (loop2): Can't find a valid FAT filesystem [ 831.662560][T28460] FAULT_INJECTION: forcing a failure. [ 831.662560][T28460] name failslab, interval 1, probability 0, space 0, times 0 [ 831.671853][T28461] netlink: 'syz-executor.5': attribute type 15 has an invalid length. [ 831.706483][T28460] CPU: 1 PID: 28460 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 831.715653][T28460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 831.725727][T28460] Call Trace: [ 831.729045][T28460] dump_stack+0x172/0x1f0 [ 831.733411][T28460] should_fail.cold+0xa/0x15 [ 831.738030][T28460] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 831.743854][T28460] ? ___might_sleep+0x163/0x280 [ 831.748718][T28460] __should_failslab+0x121/0x190 [ 831.753664][T28460] should_failslab+0x9/0x14 [ 831.758171][T28460] kmem_cache_alloc+0x2be/0x710 [ 831.763036][T28460] ? __save_stack_trace+0x8a/0xf0 [ 831.768086][T28460] __alloc_file+0x27/0x300 [ 831.772529][T28460] alloc_empty_file+0x72/0x170 [ 831.777321][T28460] path_openat+0xef/0x46e0 [ 831.781756][T28460] ? __lock_acquire+0x55d/0x4710 [ 831.786714][T28460] ? getname+0x1a/0x20 [ 831.791506][T28460] ? do_sys_open+0x2c9/0x5d0 [ 831.796114][T28460] ? __x64_sys_open+0x7e/0xc0 [ 831.800795][T28460] ? do_syscall_64+0x103/0x610 [ 831.805567][T28460] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.811651][T28460] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 831.817489][T28460] ? cache_grow_end+0xa4/0x190 [ 831.822372][T28460] ? __alloc_fd+0x430/0x530 [ 831.826901][T28460] do_filp_open+0x1a1/0x280 [ 831.831429][T28460] ? may_open_dev+0x100/0x100 [ 831.836136][T28460] ? lock_downgrade+0x880/0x880 [ 831.841023][T28460] ? kasan_check_read+0x11/0x20 [ 831.845888][T28460] ? do_raw_spin_unlock+0x57/0x270 [ 831.851007][T28460] ? _raw_spin_unlock+0x2d/0x50 [ 831.855859][T28460] ? __alloc_fd+0x430/0x530 [ 831.860376][T28460] do_sys_open+0x3fe/0x5d0 [ 831.864796][T28460] ? filp_open+0x80/0x80 [ 831.869051][T28460] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 831.875330][T28460] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 831.880812][T28460] ? do_syscall_64+0x26/0x610 [ 831.885528][T28460] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.891618][T28460] ? do_syscall_64+0x26/0x610 [ 831.896310][T28460] __x64_sys_open+0x7e/0xc0 [ 831.900838][T28460] do_syscall_64+0x103/0x610 [ 831.905436][T28460] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.911323][T28460] RIP: 0033:0x411f11 [ 831.915222][T28460] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 831.934857][T28460] RSP: 002b:00007fedcf4bea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 831.943301][T28460] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 18:29:31 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x5, 0x40) ioctl$SIOCAX25DELFWD(r2, 0x89eb, &(0x7f0000000480)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000240)=0x7) ioctl$VIDIOC_S_JPEGCOMP(r2, 0x408c563e, &(0x7f00000003c0)={0x1, 0x6, 0x37, "2c6ea1ee278e9e048983ce86db28e1a35b775cdf9b6bf9c884d7dfbbe13fa18c6a9a605af69279e1234cd31052c68955ea873345fd74b053bef501de", 0x7, "4ad3b4ad927c7ed80ac4e7546cd45f42f511c7cdc74e7b0dc90bf29d1ac63b2abb5ada8554c3663b5bc38f240823bbee5ab736026d5ac0be78d44615", 0x8}) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000280)={0x15, 0x110, 0xfa00, {r1, 0x10000, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @multicast2}, @in={0x2, 0x4e21, @remote}}}, 0x118) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x2000000, 0x2) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r1, 0x0, 0x3, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000100), r1, 0x0, 0x2, 0x4}}, 0x20) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000540)=ANY=[@ANYBLOB="030000000000000001000000020000d298401625b473ad1814000101000006000000080000f7bf3fff3bc77dfa00000000000c000080070000ea3d6824000100000009000000040000000000000000000000050000000000000200000000"]) 18:29:31 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) acct(0x0) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 831.951275][T28460] RDX: 00007fedcf4beafa RSI: 0000000000000002 RDI: 00007fedcf4beaf0 [ 831.959248][T28460] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 831.967234][T28460] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 831.975239][T28460] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:31 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='\nfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) [ 832.043122][T28465] JFS: Cannot determine volume size [ 832.048388][T28465] JFS: discard option not supported on device 18:29:31 executing program 5: ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x40186f40, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x4e21, @multicast2}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000040)={@rand_addr=0x10001, @multicast2}, 0x8) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTAT(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="560000007d010000004f000000000000000102000000000000000100010000000000050000000000000000000080000000000b0a2f6465762f617564696f000b002f6465762f617564696f000100f7050077"], 0x52) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$capi20_data(r0, &(0x7f00000000c0)={{0x10, 0x0, 0x82, 0x82, 0xfffffffffffeffff, 0x3}, 0x48, "62863c2cbf44ae4e8ebd70a5b26a36f4d2e48d312abc2b142bcbf312e0a52367492087cde1434fe1fa41ae4d34424d61241fc06db294c5000172099f76084be9d96ffc793b5bd7ef"}, 0x5a) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) setresuid(0x0, r3, 0x0) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x10, 0x0) sendto$inet(r1, 0x0, 0x1f9, 0xffeffffffffffffa, 0x0, 0x2cb) 18:29:31 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) prctl$PR_GET_KEEPCAPS(0x7) ioctl$SIOCRSSL2CALL(r1, 0x89e2, &(0x7f0000000000)=@default) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) 18:29:31 executing program 3 (fault-call:0 fault-nth:8): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 832.115819][T28465] JFS: Cannot determine volume size [ 832.128819][T28465] jfs: Unrecognized mount option "dis=ard=0x0000000000000008" or missing value [ 832.244116][T28483] ptrace attach of "/root/syz-executor.5"[7759] was attempted by "/root/syz-executor.5"[28483] [ 832.267782][T28490] FAULT_INJECTION: forcing a failure. [ 832.267782][T28490] name failslab, interval 1, probability 0, space 0, times 0 18:29:31 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dis>ard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:31 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xdc7c, 0x20842) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x3, @dev={[], 0x3}, 'bond0\x00'}}) r2 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(r2, 0x40000000000000, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 832.297610][T28486] ptrace attach of "/root/syz-executor.5"[7759] was attempted by "/root/syz-executor.5"[28486] [ 832.320356][T28490] CPU: 1 PID: 28490 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 832.329558][T28490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 832.329566][T28490] Call Trace: [ 832.329595][T28490] dump_stack+0x172/0x1f0 [ 832.329619][T28490] should_fail.cold+0xa/0x15 [ 832.329639][T28490] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 832.329661][T28490] ? ___might_sleep+0x163/0x280 [ 832.329682][T28490] __should_failslab+0x121/0x190 [ 832.329702][T28490] should_failslab+0x9/0x14 [ 832.329720][T28490] kmem_cache_alloc+0x2be/0x710 [ 832.329739][T28490] ? rcu_read_lock_sched_held+0x110/0x130 [ 832.329767][T28490] ? kmem_cache_alloc+0x341/0x710 [ 832.352160][T28490] security_file_alloc+0x39/0x170 [ 832.362785][T28490] __alloc_file+0xac/0x300 18:29:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x400000, 0x0) [ 832.362800][T28490] alloc_empty_file+0x72/0x170 [ 832.362819][T28490] path_openat+0xef/0x46e0 [ 832.362835][T28490] ? __lock_acquire+0x55d/0x4710 [ 832.362846][T28490] ? getname+0x1a/0x20 [ 832.362859][T28490] ? do_sys_open+0x2c9/0x5d0 [ 832.362872][T28490] ? __x64_sys_open+0x7e/0xc0 [ 832.362887][T28490] ? do_syscall_64+0x103/0x610 [ 832.362904][T28490] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.362927][T28490] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 832.362951][T28490] ? __alloc_fd+0x430/0x530 [ 832.362966][T28490] do_filp_open+0x1a1/0x280 [ 832.362980][T28490] ? may_open_dev+0x100/0x100 [ 832.362997][T28490] ? lock_downgrade+0x880/0x880 [ 832.363017][T28490] ? kasan_check_read+0x11/0x20 [ 832.363031][T28490] ? do_raw_spin_unlock+0x57/0x270 [ 832.363047][T28490] ? _raw_spin_unlock+0x2d/0x50 [ 832.363061][T28490] ? __alloc_fd+0x430/0x530 [ 832.363086][T28490] do_sys_open+0x3fe/0x5d0 [ 832.363102][T28490] ? filp_open+0x80/0x80 [ 832.363117][T28490] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 832.363135][T28490] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 832.363157][T28490] ? do_syscall_64+0x26/0x610 [ 832.372604][T28490] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.372623][T28490] ? do_syscall_64+0x26/0x610 [ 832.372646][T28490] __x64_sys_open+0x7e/0xc0 [ 832.372667][T28490] do_syscall_64+0x103/0x610 [ 832.383277][T28490] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.383298][T28490] RIP: 0033:0x411f11 [ 832.383315][T28490] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 832.383323][T28490] RSP: 002b:00007fedcf4bea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 832.383336][T28490] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 832.383344][T28490] RDX: 00007fedcf4beafa RSI: 0000000000000002 RDI: 00007fedcf4beaf0 [ 832.383351][T28490] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 832.383359][T28490] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 18:29:31 executing program 5: ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x40186f40, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x4e21, @multicast2}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000040)={@rand_addr=0x10001, @multicast2}, 0x8) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTAT(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="560000007d010000004f000000000000000102000000000000000100010000000000050000000000000000000080000000000b0a2f6465762f617564696f000b002f6465762f617564696f000100f7050077"], 0x52) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$capi20_data(r0, &(0x7f00000000c0)={{0x10, 0x0, 0x82, 0x82, 0xfffffffffffeffff, 0x3}, 0x48, "62863c2cbf44ae4e8ebd70a5b26a36f4d2e48d312abc2b142bcbf312e0a52367492087cde1434fe1fa41ae4d34424d61241fc06db294c5000172099f76084be9d96ffc793b5bd7ef"}, 0x5a) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) setresuid(0x0, r3, 0x0) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x10, 0x0) sendto$inet(r1, 0x0, 0x1f9, 0xffeffffffffffffa, 0x0, 0x2cb) 18:29:31 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x410000, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f00000000c0)=0x4) r1 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) acct(&(0x7f0000000040)='./file0\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) pipe(&(0x7f0000000000)) 18:29:31 executing program 3 (fault-call:0 fault-nth:9): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 832.383366][T28490] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 [ 832.502151][T28495] JFS: Cannot determine volume size [ 832.610970][T28495] JFS: discard option not supported on device [ 832.629332][T28495] JFS: Cannot determine volume size [ 832.638222][T28495] jfs: Unrecognized mount option "dis>ard=0x0000000000000008" or missing value 18:29:31 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='%fat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:31 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'disXard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:31 executing program 5: ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x40186f40, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x4e21, @multicast2}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000040)={@rand_addr=0x10001, @multicast2}, 0x8) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTAT(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="560000007d010000004f000000000000000102000000000000000100010000000000050000000000000000000080000000000b0a2f6465762f617564696f000b002f6465762f617564696f000100f7050077"], 0x52) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$capi20_data(r0, &(0x7f00000000c0)={{0x10, 0x0, 0x82, 0x82, 0xfffffffffffeffff, 0x3}, 0x48, "62863c2cbf44ae4e8ebd70a5b26a36f4d2e48d312abc2b142bcbf312e0a52367492087cde1434fe1fa41ae4d34424d61241fc06db294c5000172099f76084be9d96ffc793b5bd7ef"}, 0x5a) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) setresuid(0x0, r3, 0x0) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x10, 0x0) sendto$inet(r1, 0x0, 0x1f9, 0xffeffffffffffffa, 0x0, 0x2cb) 18:29:31 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) timer_create(0x5, &(0x7f0000000000)={0x0, 0x19, 0x0, @tid=r0}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x1, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000000c0)) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4200, r0, 0xef, 0x62) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x1f, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 832.739644][T28503] XFS (loop4): Invalid superblock magic number [ 832.756665][T28510] ptrace attach of "/root/syz-executor.5"[7759] was attempted by "/root/syz-executor.5"[28510] [ 832.768940][T28514] FAULT_INJECTION: forcing a failure. [ 832.768940][T28514] name failslab, interval 1, probability 0, space 0, times 0 [ 832.807655][T28514] CPU: 1 PID: 28514 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 832.816805][T28514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 832.826883][T28514] Call Trace: [ 832.830205][T28514] dump_stack+0x172/0x1f0 [ 832.834581][T28514] should_fail.cold+0xa/0x15 [ 832.839205][T28514] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 832.845040][T28514] ? ___might_sleep+0x163/0x280 [ 832.849909][T28514] __should_failslab+0x121/0x190 [ 832.854855][T28514] ? loop_info64_to_compat+0x6d0/0x6d0 [ 832.860330][T28514] should_failslab+0x9/0x14 [ 832.864850][T28514] kmem_cache_alloc_trace+0x2d1/0x760 [ 832.870247][T28514] ? lockdep_init_map+0x10c/0x5b0 [ 832.875347][T28514] ? loop_info64_to_compat+0x6d0/0x6d0 [ 832.880830][T28514] __kthread_create_on_node+0xf2/0x460 [ 832.886324][T28514] ? lock_acquire+0x16f/0x3f0 [ 832.891017][T28514] ? kthread_parkme+0xb0/0xb0 [ 832.895720][T28514] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 832.902065][T28514] ? kasan_check_read+0x11/0x20 [ 832.906928][T28514] ? mutex_trylock+0x1e0/0x1e0 [ 832.911696][T28514] ? loop_info64_to_compat+0x6d0/0x6d0 [ 832.917172][T28514] kthread_create_on_node+0xbb/0xf0 [ 832.922388][T28514] ? __kthread_create_on_node+0x460/0x460 [ 832.928123][T28514] ? lockdep_init_map+0x10c/0x5b0 [ 832.933179][T28514] ? lockdep_init_map+0x10c/0x5b0 [ 832.938238][T28514] lo_ioctl+0xafb/0x20d0 [ 832.942506][T28514] ? lo_rw_aio+0x1200/0x1200 [ 832.947136][T28514] blkdev_ioctl+0xee8/0x1c40 [ 832.951739][T28514] ? blkpg_ioctl+0xa90/0xa90 [ 832.956343][T28514] ? kasan_check_read+0x11/0x20 [ 832.961210][T28514] ? __fget+0x35a/0x550 [ 832.965379][T28514] ? find_held_lock+0x35/0x130 [ 832.970156][T28514] ? __fget+0x35a/0x550 [ 832.974341][T28514] block_ioctl+0xee/0x130 [ 832.978698][T28514] ? blkdev_fallocate+0x410/0x410 [ 832.983758][T28514] do_vfs_ioctl+0xd6e/0x1390 [ 832.988375][T28514] ? kasan_check_read+0x11/0x20 [ 832.993245][T28514] ? ioctl_preallocate+0x210/0x210 [ 832.998371][T28514] ? __fget+0x381/0x550 [ 833.002548][T28514] ? ksys_dup3+0x3e0/0x3e0 [ 833.006985][T28514] ? security_file_ioctl+0x93/0xc0 [ 833.012104][T28514] ksys_ioctl+0xab/0xd0 [ 833.016279][T28514] __x64_sys_ioctl+0x73/0xb0 [ 833.020899][T28514] do_syscall_64+0x103/0x610 [ 833.025607][T28514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 833.031525][T28514] RIP: 0033:0x457c97 [ 833.035451][T28514] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 833.055067][T28514] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 833.063491][T28514] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 833.071484][T28514] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 833.079480][T28514] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 833.087480][T28514] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 833.095496][T28514] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:32 executing program 3 (fault-call:0 fault-nth:10): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:32 executing program 5: ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x40186f40, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x4e21, @multicast2}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000040)={@rand_addr=0x10001, @multicast2}, 0x8) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTAT(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="560000007d010000004f000000000000000102000000000000000100010000000000050000000000000000000080000000000b0a2f6465762f617564696f000b002f6465762f617564696f000100f7050077"], 0x52) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$capi20_data(r0, &(0x7f00000000c0)={{0x10, 0x0, 0x82, 0x82, 0xfffffffffffeffff, 0x3}, 0x48, "62863c2cbf44ae4e8ebd70a5b26a36f4d2e48d312abc2b142bcbf312e0a52367492087cde1434fe1fa41ae4d34424d61241fc06db294c5000172099f76084be9d96ffc793b5bd7ef"}, 0x5a) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) setresuid(0x0, r3, 0x0) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x10, 0x0) sendto$inet(r1, 0x0, 0x1f9, 0xffeffffffffffffa, 0x0, 0x2cb) 18:29:32 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x3f, r0, 0x9, 0x101) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 833.235462][T28535] ptrace attach of "/root/syz-executor.5"[7759] was attempted by "/root/syz-executor.5"[28535] 18:29:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x989680, 0x0) 18:29:32 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='v\nat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 833.332604][T28539] FAULT_INJECTION: forcing a failure. [ 833.332604][T28539] name failslab, interval 1, probability 0, space 0, times 0 [ 833.355091][T28539] CPU: 0 PID: 28539 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 833.364243][T28539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 833.374310][T28539] Call Trace: [ 833.377634][T28539] dump_stack+0x172/0x1f0 [ 833.382020][T28539] should_fail.cold+0xa/0x15 [ 833.386647][T28539] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 833.392507][T28539] ? ___might_sleep+0x163/0x280 [ 833.397378][T28539] __should_failslab+0x121/0x190 [ 833.402322][T28539] should_failslab+0x9/0x14 [ 833.406833][T28539] kmem_cache_alloc+0x2be/0x710 [ 833.411692][T28539] ? __schedule+0x1387/0x1cc0 [ 833.416404][T28539] __kernfs_new_node+0xef/0x690 [ 833.421275][T28539] ? _raw_spin_unlock_irq+0x28/0x90 [ 833.426499][T28539] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 833.432004][T28539] ? __lock_acquire+0x55d/0x4710 [ 833.437389][T28539] ? _raw_spin_unlock_irq+0x5e/0x90 [ 833.442613][T28539] ? __schedule+0x1387/0x1cc0 [ 833.447317][T28539] kernfs_new_node+0x99/0x130 [ 833.452009][T28539] kernfs_create_dir_ns+0x52/0x160 [ 833.457126][T28539] internal_create_group+0x7f8/0xc40 [ 833.462414][T28539] ? bd_set_size+0x89/0xb0 [ 833.466846][T28539] ? remove_files.isra.0+0x190/0x190 [ 833.472164][T28539] sysfs_create_group+0x20/0x30 [ 833.477040][T28539] lo_ioctl+0xf8f/0x20d0 [ 833.481312][T28539] ? lo_rw_aio+0x1200/0x1200 [ 833.485925][T28539] blkdev_ioctl+0xee8/0x1c40 [ 833.490542][T28539] ? blkpg_ioctl+0xa90/0xa90 [ 833.495142][T28539] ? find_held_lock+0x35/0x130 [ 833.499917][T28539] ? debug_check_no_obj_freed+0x211/0x444 [ 833.505667][T28539] ? __fget+0x35a/0x550 [ 833.509832][T28539] ? find_held_lock+0x35/0x130 [ 833.514603][T28539] ? __fget+0x35a/0x550 [ 833.518784][T28539] block_ioctl+0xee/0x130 [ 833.523130][T28539] ? blkdev_fallocate+0x410/0x410 [ 833.528182][T28539] do_vfs_ioctl+0xd6e/0x1390 [ 833.532807][T28539] ? kasan_check_read+0x11/0x20 [ 833.537685][T28539] ? ioctl_preallocate+0x210/0x210 [ 833.542818][T28539] ? __fget+0x381/0x550 [ 833.547012][T28539] ? ksys_dup3+0x3e0/0x3e0 [ 833.551435][T28539] ? do_sys_open+0x31d/0x5d0 [ 833.556041][T28539] ? security_file_ioctl+0x93/0xc0 [ 833.561157][T28539] ksys_ioctl+0xab/0xd0 [ 833.565333][T28539] __x64_sys_ioctl+0x73/0xb0 [ 833.570322][T28539] do_syscall_64+0x103/0x610 [ 833.575108][T28539] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 833.581040][T28539] RIP: 0033:0x457c97 [ 833.584952][T28539] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 833.604568][T28539] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 833.612994][T28539] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 833.620976][T28539] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 18:29:32 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) connect$rose(r1, &(0x7f0000000000)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x40) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:32 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuacct.usage\x00', 0x2, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000040)=0x6bc7ab67, 0x4) sendfile(r1, r1, 0x0, 0x79c) [ 833.628966][T28539] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 833.636965][T28539] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 833.644950][T28539] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 [ 833.668591][T28542] ptrace attach of "/root/syz-executor.5"[7759] was attempted by "/root/syz-executor.5"[28542] [ 833.780824][T28536] JFS: Cannot determine volume size [ 833.787439][T28536] JFS: discard option not supported on device [ 833.800119][T28536] JFS: Cannot determine volume size [ 833.805512][T28536] jfs: Unrecognized mount option "disXard=0x0000000000000008" or missing value 18:29:32 executing program 3 (fault-call:0 fault-nth:11): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:33 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4200, r0, 0xfd, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:33 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'disdard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:33 executing program 5: socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000002080)) alarm(0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) read$FUSE(r0, &(0x7f0000000040), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) [ 834.021759][T28561] FAULT_INJECTION: forcing a failure. [ 834.021759][T28561] name failslab, interval 1, probability 0, space 0, times 0 [ 834.054199][T28561] CPU: 0 PID: 28561 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 834.063386][T28561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 834.073547][T28561] Call Trace: [ 834.077125][T28561] dump_stack+0x172/0x1f0 [ 834.081534][T28561] should_fail.cold+0xa/0x15 [ 834.086193][T28561] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 834.092029][T28561] ? ___might_sleep+0x163/0x280 [ 834.096907][T28561] __should_failslab+0x121/0x190 [ 834.101865][T28561] should_failslab+0x9/0x14 [ 834.106388][T28561] kmem_cache_alloc+0x2be/0x710 [ 834.111251][T28561] ? __lock_acquire+0x55d/0x4710 [ 834.116206][T28561] __kernfs_new_node+0xef/0x690 [ 834.121080][T28561] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 834.126567][T28561] ? __lock_acquire+0x55d/0x4710 [ 834.131562][T28561] kernfs_new_node+0x99/0x130 [ 834.136292][T28561] kernfs_create_dir_ns+0x52/0x160 [ 834.141434][T28561] internal_create_group+0x7f8/0xc40 [ 834.146748][T28561] ? bd_set_size+0x89/0xb0 [ 834.151186][T28561] ? remove_files.isra.0+0x190/0x190 [ 834.156490][T28561] sysfs_create_group+0x20/0x30 [ 834.161360][T28561] lo_ioctl+0xf8f/0x20d0 [ 834.165622][T28561] ? lo_rw_aio+0x1200/0x1200 [ 834.170237][T28561] blkdev_ioctl+0xee8/0x1c40 [ 834.174856][T28561] ? blkpg_ioctl+0xa90/0xa90 [ 834.179468][T28561] ? find_held_lock+0x35/0x130 [ 834.184265][T28561] ? debug_check_no_obj_freed+0x211/0x444 [ 834.190016][T28561] ? __fget+0x35a/0x550 [ 834.194185][T28561] ? find_held_lock+0x35/0x130 [ 834.198956][T28561] ? __fget+0x35a/0x550 [ 834.203125][T28561] block_ioctl+0xee/0x130 [ 834.207464][T28561] ? blkdev_fallocate+0x410/0x410 [ 834.212499][T28561] do_vfs_ioctl+0xd6e/0x1390 [ 834.217109][T28561] ? kasan_check_read+0x11/0x20 [ 834.221976][T28561] ? ioctl_preallocate+0x210/0x210 [ 834.227107][T28561] ? __fget+0x381/0x550 [ 834.231298][T28561] ? ksys_dup3+0x3e0/0x3e0 [ 834.235743][T28561] ? do_sys_open+0x31d/0x5d0 [ 834.240354][T28561] ? security_file_ioctl+0x93/0xc0 [ 834.245487][T28561] ksys_ioctl+0xab/0xd0 [ 834.249669][T28561] __x64_sys_ioctl+0x73/0xb0 [ 834.254287][T28561] do_syscall_64+0x103/0x610 [ 834.258894][T28561] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 834.264796][T28561] RIP: 0033:0x457c97 [ 834.268707][T28561] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 834.288332][T28561] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 834.296763][T28561] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 834.304837][T28561] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 834.312820][T28561] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 18:29:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, 0x0) 18:29:33 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x1c, r0, 0x3, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={0x0, r1, 0x0, 0x2}, 0x14) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 834.320828][T28561] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 834.328829][T28561] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x10, &(0x7f0000000100)={[{@xino_off='xino=off'}], [{@subj_role={'subj_role', 0x3d, '%($vmnet1vboxnet0'}}]}) r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000000)=0x3) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) acct(&(0x7f0000000280)='./file0\x00') [ 834.391073][T28568] JFS: Cannot determine volume size [ 834.396768][T28568] JFS: discard option not supported on device [ 834.416043][T28568] JFS: Cannot determine volume size [ 834.421645][T28568] jfs: Unrecognized mount option "disdard=0x0000000000000008" or missing value 18:29:33 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='v%at\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:33 executing program 3 (fault-call:0 fault-nth:12): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:33 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'disiard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:33 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000000)=""/106) [ 834.516319][T28575] XFS (loop4): Invalid superblock magic number [ 834.643910][T28596] FAULT_INJECTION: forcing a failure. [ 834.643910][T28596] name failslab, interval 1, probability 0, space 0, times 0 [ 834.656751][T28596] CPU: 1 PID: 28596 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 834.665873][T28596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 834.675945][T28596] Call Trace: [ 834.679302][T28596] dump_stack+0x172/0x1f0 [ 834.683682][T28596] should_fail.cold+0xa/0x15 [ 834.688308][T28596] ? kernel_text_address+0x73/0xf0 18:29:33 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x600001, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x1, 0x7, 0x3}}, 0x28) r1 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x2, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) [ 834.693444][T28596] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 834.699445][T28596] __should_failslab+0x121/0x190 [ 834.704388][T28596] should_failslab+0x9/0x14 [ 834.708901][T28596] kmem_cache_alloc+0x47/0x710 [ 834.713670][T28596] ? save_stack+0xa9/0xd0 [ 834.718012][T28596] ? save_stack+0x45/0xd0 [ 834.722364][T28596] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 834.728204][T28596] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 834.734576][T28596] idr_get_free+0x425/0x8d0 [ 834.739114][T28596] idr_alloc_u32+0x19e/0x330 [ 834.743730][T28596] ? __fprop_inc_percpu_max+0x230/0x230 [ 834.749305][T28596] idr_alloc_cyclic+0x132/0x270 [ 834.754170][T28596] ? idr_alloc+0x150/0x150 [ 834.758605][T28596] __kernfs_new_node+0x171/0x690 [ 834.763571][T28596] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 834.769044][T28596] ? __lock_acquire+0x55d/0x4710 [ 834.773998][T28596] ? _raw_spin_unlock_irq+0x5e/0x90 [ 834.779218][T28596] ? __schedule+0x1387/0x1cc0 [ 834.783939][T28596] kernfs_new_node+0x99/0x130 [ 834.788658][T28596] kernfs_create_dir_ns+0x52/0x160 [ 834.793791][T28596] internal_create_group+0x7f8/0xc40 [ 834.799088][T28596] ? bd_set_size+0x89/0xb0 [ 834.803530][T28596] ? remove_files.isra.0+0x190/0x190 [ 834.808832][T28596] sysfs_create_group+0x20/0x30 [ 834.813699][T28596] lo_ioctl+0xf8f/0x20d0 [ 834.817965][T28596] ? lo_rw_aio+0x1200/0x1200 [ 834.822569][T28596] blkdev_ioctl+0xee8/0x1c40 [ 834.827203][T28596] ? blkpg_ioctl+0xa90/0xa90 [ 834.831847][T28596] ? find_held_lock+0x35/0x130 [ 834.836647][T28596] ? debug_check_no_obj_freed+0x211/0x444 [ 834.842390][T28596] ? __fget+0x35a/0x550 [ 834.846566][T28596] ? find_held_lock+0x35/0x130 [ 834.851336][T28596] ? __fget+0x35a/0x550 [ 834.855506][T28596] block_ioctl+0xee/0x130 [ 834.859848][T28596] ? blkdev_fallocate+0x410/0x410 [ 834.864954][T28596] do_vfs_ioctl+0xd6e/0x1390 [ 834.869569][T28596] ? kasan_check_read+0x11/0x20 [ 834.874455][T28596] ? ioctl_preallocate+0x210/0x210 [ 834.879585][T28596] ? __fget+0x381/0x550 [ 834.883776][T28596] ? ksys_dup3+0x3e0/0x3e0 [ 834.888226][T28596] ? do_sys_open+0x31d/0x5d0 [ 834.892840][T28596] ? security_file_ioctl+0x93/0xc0 [ 834.897960][T28596] ksys_ioctl+0xab/0xd0 [ 834.902127][T28596] __x64_sys_ioctl+0x73/0xb0 [ 834.906729][T28596] do_syscall_64+0x103/0x610 [ 834.911333][T28596] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 834.917247][T28596] RIP: 0033:0x457c97 [ 834.921162][T28596] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 18:29:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x10000c0, 0x0) [ 834.940878][T28596] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 834.949310][T28596] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 834.957293][T28596] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 834.965270][T28596] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 834.973258][T28596] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 834.981277][T28596] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:34 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x80000) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000180)=0x4, 0x4) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$cont(0x20, r1, 0x8, 0x5) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x3, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x800) r3 = socket$l2tp(0x18, 0x1, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={0x1, @default, @netrom={'nr', 0x0}, 0xe66, 'syz0\x00', @null, 0x80000000, 0x6, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @null]}) ptrace$cont(0x1f, r1, 0x0, 0x0) getsockname$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000100)=0x1c) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x3f) 18:29:34 executing program 3 (fault-call:0 fault-nth:13): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 835.051088][T28597] JFS: Cannot determine volume size [ 835.056328][T28597] JFS: discard option not supported on device [ 835.056337][T28597] JFS: Cannot determine volume size [ 835.056347][T28597] jfs: Unrecognized mount option "disiard=0x0000000000000008" or missing value 18:29:34 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dislard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 835.206669][T28610] XFS (loop4): Invalid superblock magic number [ 835.233411][T28625] FAULT_INJECTION: forcing a failure. [ 835.233411][T28625] name failslab, interval 1, probability 0, space 0, times 0 18:29:34 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='v.at\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:34 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x3, 0x2) wait4(r0, 0x0, 0x5, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000180)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 835.259471][T28625] CPU: 1 PID: 28625 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 835.268650][T28625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 835.278727][T28625] Call Trace: [ 835.282051][T28625] dump_stack+0x172/0x1f0 [ 835.286506][T28625] should_fail.cold+0xa/0x15 [ 835.291138][T28625] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 835.296955][T28625] ? ___might_sleep+0x163/0x280 [ 835.301819][T28625] __should_failslab+0x121/0x190 [ 835.306765][T28625] should_failslab+0x9/0x14 [ 835.311265][T28625] kmem_cache_alloc+0x2be/0x710 [ 835.316140][T28625] ? lock_downgrade+0x880/0x880 [ 835.321017][T28625] ? kasan_check_read+0x11/0x20 [ 835.325894][T28625] __kernfs_new_node+0xef/0x690 [ 835.330783][T28625] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 835.336271][T28625] ? wait_for_completion+0x440/0x440 [ 835.341597][T28625] ? mutex_unlock+0xd/0x10 [ 835.346025][T28625] ? kernfs_activate+0x192/0x1f0 [ 835.350974][T28625] kernfs_new_node+0x99/0x130 [ 835.355666][T28625] __kernfs_create_file+0x51/0x340 [ 835.360788][T28625] sysfs_add_file_mode_ns+0x222/0x560 [ 835.362230][T28628] overlayfs: unrecognized mount option "subj_role=%($vmnet1vboxnet0" or missing value [ 835.366185][T28625] internal_create_group+0x35b/0xc40 [ 835.366203][T28625] ? bd_set_size+0x89/0xb0 [ 835.366225][T28625] ? remove_files.isra.0+0x190/0x190 [ 835.366249][T28625] sysfs_create_group+0x20/0x30 [ 835.395637][T28625] lo_ioctl+0xf8f/0x20d0 [ 835.399899][T28625] ? lo_rw_aio+0x1200/0x1200 [ 835.404499][T28625] blkdev_ioctl+0xee8/0x1c40 [ 835.409103][T28625] ? blkpg_ioctl+0xa90/0xa90 [ 835.413695][T28625] ? find_held_lock+0x35/0x130 [ 835.418504][T28625] ? debug_check_no_obj_freed+0x211/0x444 [ 835.424261][T28625] ? __fget+0x35a/0x550 [ 835.428437][T28625] ? find_held_lock+0x35/0x130 [ 835.433241][T28625] ? __fget+0x35a/0x550 [ 835.437433][T28625] block_ioctl+0xee/0x130 [ 835.441779][T28625] ? blkdev_fallocate+0x410/0x410 [ 835.447428][T28625] do_vfs_ioctl+0xd6e/0x1390 [ 835.452033][T28625] ? kasan_check_read+0x11/0x20 [ 835.456891][T28625] ? ioctl_preallocate+0x210/0x210 [ 835.462010][T28625] ? __fget+0x381/0x550 [ 835.466181][T28625] ? ksys_dup3+0x3e0/0x3e0 [ 835.470613][T28625] ? do_sys_open+0x31d/0x5d0 [ 835.475233][T28625] ? security_file_ioctl+0x93/0xc0 [ 835.480367][T28625] ksys_ioctl+0xab/0xd0 [ 835.484564][T28625] __x64_sys_ioctl+0x73/0xb0 [ 835.489179][T28625] do_syscall_64+0x103/0x610 [ 835.493782][T28625] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 835.499673][T28625] RIP: 0033:0x457c97 [ 835.503570][T28625] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 835.523178][T28625] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 835.531643][T28625] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 835.539629][T28625] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 835.547630][T28625] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 835.555608][T28625] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 835.563583][T28625] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 [ 835.579350][ T26] audit: type=1804 audit(1550687374.677:48): pid=28629 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir494609449/syzkaller.QvcUhx/1268/file0" dev="sda1" ino=16524 res=1 [ 835.617613][ T26] audit: type=1804 audit(1550687374.717:49): pid=28600 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir494609449/syzkaller.QvcUhx/1268/file0" dev="sda1" ino=16524 res=1 [ 835.649953][T28628] Process accounting resumed [ 835.708440][ T26] audit: type=1804 audit(1550687374.757:50): pid=28628 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir494609449/syzkaller.QvcUhx/1268/file0" dev="sda1" ino=16524 res=1 [ 835.748410][T28628] Process accounting resumed 18:29:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="e821d0023c123f3188a070") r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7f, 0x100) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB="5a000000b0c11612944f6194a9d7813c7fed8c214ea5f64f18c723336bacbc33a8bb12deb81f36b837af2b7230941577830532f24824f39d5750e50fbb19e4e3c89da488c9e632b0afa5ed42e3e10f5a70075eafae1d0000000000000000"], &(0x7f0000000140)=0x62) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000180)={r2, 0x10000, 0x8000000000000379}, &(0x7f00000001c0)=0x16) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000008000800030004000000280000001100ffffba16a0aa1c0900001b2c000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 18:29:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) 18:29:34 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0xfffffffffffffffc, 0x5, 0x7fff, 0xb9f0, 0x0, 0x100000000, 0x4030, 0x1, 0x0, 0x7fff, 0x48d, 0x2, 0x6, 0xe87, 0x0, 0xfffffffffffffffd, 0x60fc, 0x0, 0xda2, 0x7, 0x20, 0x7, 0x2, 0x2, 0x9, 0xfffffffffffffff7, 0x2, 0x4, 0x2, 0x9, 0x70000000, 0x0, 0x9, 0x7ff, 0x1, 0xfffffffffffffffe, 0x0, 0x9, 0x1, @perf_config_ext={0x1, 0x1}, 0x40, 0x6, 0xfffffffffffffe00, 0x8, 0x1, 0x0, 0x40}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x2) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 835.777392][T28634] JFS: Cannot determine volume size [ 835.813236][T28634] JFS: discard option not supported on device [ 835.821935][T28634] JFS: Cannot determine volume size [ 835.839444][T28634] jfs: Unrecognized mount option "dislard=0x0000000000000008" or missing value 18:29:34 executing program 3 (fault-call:0 fault-nth:14): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:35 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x420000, 0x0) bind$ax25(r1, &(0x7f0000000080)={{0x3, @default, 0x6}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xf, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000000)=0x7fffffff, 0x4) [ 835.863936][T28648] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 18:29:35 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'disoard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 835.980307][T28660] FAULT_INJECTION: forcing a failure. [ 835.980307][T28660] name failslab, interval 1, probability 0, space 0, times 0 [ 836.015539][T28660] CPU: 0 PID: 28660 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 836.024715][T28660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 836.034786][T28660] Call Trace: [ 836.038134][T28660] dump_stack+0x172/0x1f0 [ 836.042498][T28660] should_fail.cold+0xa/0x15 [ 836.047124][T28660] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 836.052948][T28660] ? ___might_sleep+0x163/0x280 [ 836.057816][T28660] __should_failslab+0x121/0x190 [ 836.062766][T28660] should_failslab+0x9/0x14 [ 836.067288][T28660] kmem_cache_alloc+0x2be/0x710 [ 836.072177][T28660] ? lock_downgrade+0x880/0x880 [ 836.077063][T28660] ? kasan_check_read+0x11/0x20 [ 836.081949][T28660] __kernfs_new_node+0xef/0x690 [ 836.086845][T28660] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 836.092321][T28660] ? wait_for_completion+0x440/0x440 [ 836.097629][T28660] ? mutex_unlock+0xd/0x10 [ 836.102054][T28660] ? kernfs_activate+0x192/0x1f0 [ 836.107001][T28660] kernfs_new_node+0x99/0x130 [ 836.111697][T28660] __kernfs_create_file+0x51/0x340 [ 836.116826][T28660] sysfs_add_file_mode_ns+0x222/0x560 [ 836.122226][T28660] internal_create_group+0x35b/0xc40 [ 836.127541][T28660] ? bd_set_size+0x89/0xb0 [ 836.131992][T28660] ? remove_files.isra.0+0x190/0x190 [ 836.137315][T28660] sysfs_create_group+0x20/0x30 [ 836.142186][T28660] lo_ioctl+0xf8f/0x20d0 [ 836.146448][T28660] ? lo_rw_aio+0x1200/0x1200 [ 836.151050][T28660] blkdev_ioctl+0xee8/0x1c40 [ 836.155648][T28660] ? blkpg_ioctl+0xa90/0xa90 [ 836.160245][T28660] ? find_held_lock+0x35/0x130 [ 836.165021][T28660] ? debug_check_no_obj_freed+0x211/0x444 [ 836.170767][T28660] ? __fget+0x35a/0x550 [ 836.174947][T28660] ? find_held_lock+0x35/0x130 [ 836.179750][T28660] ? __fget+0x35a/0x550 [ 836.184316][T28660] block_ioctl+0xee/0x130 [ 836.188685][T28660] ? blkdev_fallocate+0x410/0x410 [ 836.193754][T28660] do_vfs_ioctl+0xd6e/0x1390 [ 836.198369][T28660] ? kasan_check_read+0x11/0x20 [ 836.203233][T28660] ? ioctl_preallocate+0x210/0x210 [ 836.208347][T28660] ? __fget+0x381/0x550 [ 836.212535][T28660] ? ksys_dup3+0x3e0/0x3e0 [ 836.216973][T28660] ? do_sys_open+0x31d/0x5d0 [ 836.221590][T28660] ? security_file_ioctl+0x93/0xc0 [ 836.226719][T28660] ksys_ioctl+0xab/0xd0 [ 836.230901][T28660] __x64_sys_ioctl+0x73/0xb0 [ 836.235529][T28660] do_syscall_64+0x103/0x610 [ 836.240144][T28660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 836.246042][T28660] RIP: 0033:0x457c97 [ 836.249942][T28660] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 836.269568][T28660] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 18:29:35 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(r0, 0x0, 0x8, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000080)={0x7001, 0x1000}) ptrace$cont(0x18, r0, 0x0, 0x0) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x80000000, 0x8e82}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(r1, 0xc0481273, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r1, 0xc040563e, &(0x7f00000000c0)={0x1, 0x0, 0x2, 0x2, {0x8, 0x10000, 0xffde, 0xffffffffffffff80}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1e, r0, 0xfffffffdffffffff, 0x0) [ 836.278004][T28660] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 836.286019][T28660] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 836.294011][T28660] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 836.302009][T28660] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 836.309983][T28660] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 [ 836.359087][T28654] XFS (loop4): Invalid superblock magic number [ 836.441511][T28668] JFS: Cannot determine volume size [ 836.455703][T28668] JFS: discard option not supported on device [ 836.474146][T28668] JFS: Cannot determine volume size 18:29:35 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x54) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:35 executing program 3 (fault-call:0 fault-nth:15): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 836.493494][T28668] jfs: Unrecognized mount option "disoard=0x0000000000000008" or missing value 18:29:35 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dispard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='v/at\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:35 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioprio_get$pid(0x3, r0) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000000)=r0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 836.664055][T28684] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 836.674649][T28681] JFS: Cannot determine volume size [ 836.680843][T28681] JFS: discard option not supported on device [ 836.697580][T28679] FAULT_INJECTION: forcing a failure. [ 836.697580][T28679] name failslab, interval 1, probability 0, space 0, times 0 [ 836.716696][T28681] JFS: Cannot determine volume size [ 836.729565][T28679] CPU: 1 PID: 28679 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 836.736619][T28681] jfs: Unrecognized mount option "dispard=0x0000000000000008" or missing value [ 836.738702][T28679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 836.738710][T28679] Call Trace: [ 836.738739][T28679] dump_stack+0x172/0x1f0 [ 836.738765][T28679] should_fail.cold+0xa/0x15 [ 836.770001][T28679] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 836.775820][T28679] ? ___might_sleep+0x163/0x280 [ 836.780696][T28679] __should_failslab+0x121/0x190 [ 836.785659][T28679] should_failslab+0x9/0x14 [ 836.790181][T28679] kmem_cache_alloc+0x2be/0x710 [ 836.795212][T28679] ? lock_downgrade+0x880/0x880 [ 836.800096][T28679] ? kasan_check_read+0x11/0x20 [ 836.804960][T28679] __kernfs_new_node+0xef/0x690 [ 836.809825][T28679] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 836.815301][T28679] ? wait_for_completion+0x440/0x440 [ 836.820608][T28679] ? mutex_unlock+0xd/0x10 [ 836.825037][T28679] ? kernfs_activate+0x192/0x1f0 [ 836.830000][T28679] kernfs_new_node+0x99/0x130 [ 836.834702][T28679] __kernfs_create_file+0x51/0x340 [ 836.839833][T28679] sysfs_add_file_mode_ns+0x222/0x560 [ 836.845226][T28679] internal_create_group+0x35b/0xc40 [ 836.850548][T28679] ? bd_set_size+0x89/0xb0 [ 836.854977][T28679] ? remove_files.isra.0+0x190/0x190 [ 836.860276][T28679] sysfs_create_group+0x20/0x30 [ 836.865140][T28679] lo_ioctl+0xf8f/0x20d0 [ 836.869400][T28679] ? lo_rw_aio+0x1200/0x1200 [ 836.874002][T28679] blkdev_ioctl+0xee8/0x1c40 [ 836.878608][T28679] ? blkpg_ioctl+0xa90/0xa90 [ 836.883222][T28679] ? find_held_lock+0x35/0x130 [ 836.888096][T28679] ? debug_check_no_obj_freed+0x211/0x444 [ 836.893825][T28679] ? __fget+0x35a/0x550 [ 836.897985][T28679] ? find_held_lock+0x35/0x130 [ 836.902755][T28679] ? __fget+0x35a/0x550 [ 836.906919][T28679] block_ioctl+0xee/0x130 [ 836.911255][T28679] ? blkdev_fallocate+0x410/0x410 [ 836.916304][T28679] do_vfs_ioctl+0xd6e/0x1390 [ 836.920906][T28679] ? kasan_check_read+0x11/0x20 [ 836.925768][T28679] ? ioctl_preallocate+0x210/0x210 [ 836.930890][T28679] ? __fget+0x381/0x550 [ 836.935068][T28679] ? ksys_dup3+0x3e0/0x3e0 [ 836.939495][T28679] ? do_sys_open+0x31d/0x5d0 [ 836.944108][T28679] ? security_file_ioctl+0x93/0xc0 [ 836.949230][T28679] ksys_ioctl+0xab/0xd0 [ 836.953396][T28679] __x64_sys_ioctl+0x73/0xb0 [ 836.957993][T28679] do_syscall_64+0x103/0x610 [ 836.962604][T28679] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 836.968504][T28679] RIP: 0033:0x457c97 [ 836.972420][T28679] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 836.992031][T28679] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 837.000469][T28679] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 837.008448][T28679] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 18:29:36 executing program 5: r0 = socket$inet(0x2, 0x3, 0x9) setsockopt$inet_mreqsrc(r0, 0x0, 0x21, &(0x7f0000e62000)={@broadcast, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast2}, 0xc) [ 837.016429][T28679] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 837.024419][T28679] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 837.032404][T28679] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x3000000, 0x0) 18:29:36 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x8000080000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:36 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'dissard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:36 executing program 3 (fault-call:0 fault-nth:16): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:36 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:lib_t:s0\x00', 0x1b, 0x2) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:36 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000000080)={0xfffffdfffffffffe}, 0x0, 0x7) rt_sigprocmask(0x3, &(0x7f0000000000)={0x7}, &(0x7f0000000040), 0x8) r1 = add_key(&(0x7f0000000480)='.dead\x00', &(0x7f00000004c0)={'syz', 0x2}, &(0x7f0000000500)="3768777d8d42d93d0f8cc007b399048c7091f73021075c552e7115d29c5bae2ee4e8c1b6c97319c6481849c4b8ab2a48541d3a90dbfcf3d36378b7ffc4f8c0ecab8f23fdabba8b3b2259ba27a6a8c8d571453d755c6ca4eb0eb2b2ffd94aad6efb", 0x61, 0xfffffffffffffffa) keyctl$set_timeout(0xf, r1, 0x6) ioperm(0x2, 0x4001, 0x9) timer_create(0x3, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) r2 = syz_open_procfs(r0, &(0x7f00000000c0)='Wom_\xf3core_adj\x00') r3 = accept4$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14, 0x800) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) request_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)='oom_score_adj\x00', 0xffffffffffffffff) timer_settime(0x0, 0x3, &(0x7f000002e000)={{}, {0x0, 0x9}}, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000002c0)={0x3, 0x20c, 0x80, 0x75cd, 0x0}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000340)={r4, @in={{0x2, 0x4e20, @local}}, [0x8, 0x7, 0x7, 0x5, 0x401, 0x7, 0x3, 0x5bb, 0x7fffffff, 0x3, 0x100, 0x4, 0xfb, 0x80000000]}, &(0x7f0000000440)=0x100) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000005c0)={r5, 0x1}, 0xfffffffffffffec5) [ 837.348533][T28812] JFS: Cannot determine volume size [ 837.363406][T28812] JFS: discard option not supported on device [ 837.382818][T28812] JFS: Cannot determine volume size 18:29:36 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000140)={0x15, 0x110, 0xfa00, {r1, 0x3, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0x3e, @rand_addr="a2005f48c938e85e994392d2c2149b97", 0xfffffffffffffff7}, @in6={0xa, 0x4e20, 0x2, @remote, 0x20}}}, 0x118) r2 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 837.391925][T28812] jfs: Unrecognized mount option "dissard=0x0000000000000008" or missing value [ 837.446365][T28804] XFS (loop4): Invalid superblock magic number [ 837.452976][T28822] FAULT_INJECTION: forcing a failure. [ 837.452976][T28822] name failslab, interval 1, probability 0, space 0, times 0 [ 837.465707][T28822] CPU: 0 PID: 28822 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 837.474832][T28822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 837.484933][T28822] Call Trace: [ 837.488274][T28822] dump_stack+0x172/0x1f0 [ 837.492660][T28822] should_fail.cold+0xa/0x15 [ 837.497266][T28822] ? kernel_text_address+0x73/0xf0 [ 837.502392][T28822] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 837.508215][T28822] ? unwind_get_return_address+0x61/0xa0 [ 837.513855][T28822] ? __save_stack_trace+0x8a/0xf0 [ 837.518911][T28822] __should_failslab+0x121/0x190 [ 837.523891][T28822] should_failslab+0x9/0x14 [ 837.528417][T28822] kmem_cache_alloc+0x47/0x710 [ 837.533223][T28822] ? save_stack+0xa9/0xd0 [ 837.537605][T28822] ? save_stack+0x45/0xd0 [ 837.541960][T28822] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 837.547778][T28822] ? kasan_slab_alloc+0xf/0x20 [ 837.552573][T28822] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 837.558915][T28822] idr_get_free+0x425/0x8d0 [ 837.563436][T28822] idr_alloc_u32+0x19e/0x330 [ 837.568337][T28822] ? __fprop_inc_percpu_max+0x230/0x230 [ 837.573901][T28822] ? perf_trace_lock+0x510/0x510 [ 837.578865][T28822] idr_alloc_cyclic+0x132/0x270 [ 837.583757][T28822] ? idr_alloc+0x150/0x150 [ 837.588218][T28822] __kernfs_new_node+0x171/0x690 [ 837.593191][T28822] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 837.598671][T28822] ? wait_for_completion+0x440/0x440 [ 837.603977][T28822] ? mutex_unlock+0xd/0x10 [ 837.608401][T28822] ? kernfs_activate+0x192/0x1f0 [ 837.613355][T28822] kernfs_new_node+0x99/0x130 [ 837.618061][T28822] __kernfs_create_file+0x51/0x340 [ 837.623191][T28822] sysfs_add_file_mode_ns+0x222/0x560 [ 837.628596][T28822] internal_create_group+0x35b/0xc40 [ 837.633918][T28822] ? bd_set_size+0x89/0xb0 [ 837.638380][T28822] ? remove_files.isra.0+0x190/0x190 [ 837.643705][T28822] sysfs_create_group+0x20/0x30 [ 837.648578][T28822] lo_ioctl+0xf8f/0x20d0 [ 837.652838][T28822] ? lo_rw_aio+0x1200/0x1200 [ 837.657440][T28822] blkdev_ioctl+0xee8/0x1c40 [ 837.662040][T28822] ? blkpg_ioctl+0xa90/0xa90 [ 837.666653][T28822] ? perf_trace_lock_acquire+0xf5/0x580 [ 837.672232][T28822] ? __fget+0x35a/0x550 [ 837.676410][T28822] ? find_held_lock+0x35/0x130 [ 837.681206][T28822] ? __fget+0x35a/0x550 [ 837.685440][T28822] block_ioctl+0xee/0x130 [ 837.689801][T28822] ? blkdev_fallocate+0x410/0x410 [ 837.694845][T28822] do_vfs_ioctl+0xd6e/0x1390 [ 837.699448][T28822] ? kasan_check_read+0x11/0x20 [ 837.704307][T28822] ? ioctl_preallocate+0x210/0x210 [ 837.709422][T28822] ? __fget+0x381/0x550 [ 837.713598][T28822] ? ksys_dup3+0x3e0/0x3e0 [ 837.718028][T28822] ? do_sys_open+0x31d/0x5d0 [ 837.722647][T28822] ? security_file_ioctl+0x93/0xc0 [ 837.727789][T28822] ksys_ioctl+0xab/0xd0 [ 837.731979][T28822] __x64_sys_ioctl+0x73/0xb0 [ 837.736598][T28822] do_syscall_64+0x103/0x610 [ 837.741221][T28822] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 837.747183][T28822] RIP: 0033:0x457c97 [ 837.751089][T28822] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 837.770708][T28822] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 837.779136][T28822] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 837.787145][T28822] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 18:29:36 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'disuard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vf\nt\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 837.795155][T28822] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 837.803140][T28822] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 837.811141][T28822] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:36 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x220001, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f00000000c0)) rt_tgsigqueueinfo(r0, r0, 0x34, &(0x7f0000000040)={0x32, 0x8}) 18:29:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000, 0x0) [ 837.960609][T28831] JFS: Cannot determine volume size [ 837.975999][T28831] JFS: discard option not supported on device [ 837.987781][T28831] JFS: Cannot determine volume size 18:29:37 executing program 3 (fault-call:0 fault-nth:17): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:37 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000000)=0x3) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 838.022708][T28831] jfs: Unrecognized mount option "disuard=0x0000000000000008" or missing value [ 838.141393][T28845] FAULT_INJECTION: forcing a failure. [ 838.141393][T28845] name failslab, interval 1, probability 0, space 0, times 0 [ 838.169421][T28845] CPU: 1 PID: 28845 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 838.178571][T28845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 838.188632][T28845] Call Trace: [ 838.191952][T28845] dump_stack+0x172/0x1f0 [ 838.196315][T28845] should_fail.cold+0xa/0x15 [ 838.200927][T28845] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 838.206749][T28845] ? ___might_sleep+0x163/0x280 [ 838.211615][T28845] __should_failslab+0x121/0x190 [ 838.216573][T28845] should_failslab+0x9/0x14 [ 838.221089][T28845] kmem_cache_alloc_trace+0x2d1/0x760 [ 838.226529][T28845] kobject_uevent_env+0x2fb/0x1030 [ 838.231679][T28845] kobject_uevent+0x20/0x26 [ 838.236225][T28845] lo_ioctl+0x100b/0x20d0 [ 838.240589][T28845] ? lo_rw_aio+0x1200/0x1200 [ 838.245723][T28845] blkdev_ioctl+0xee8/0x1c40 [ 838.250329][T28845] ? blkpg_ioctl+0xa90/0xa90 [ 838.254928][T28845] ? perf_trace_lock_acquire+0xf5/0x580 [ 838.260487][T28845] ? __fget+0x35a/0x550 [ 838.264660][T28845] ? find_held_lock+0x35/0x130 [ 838.269438][T28845] ? __fget+0x35a/0x550 [ 838.273610][T28845] block_ioctl+0xee/0x130 [ 838.277969][T28845] ? blkdev_fallocate+0x410/0x410 [ 838.283026][T28845] do_vfs_ioctl+0xd6e/0x1390 [ 838.287654][T28845] ? kasan_check_read+0x11/0x20 [ 838.292541][T28845] ? ioctl_preallocate+0x210/0x210 [ 838.297670][T28845] ? __fget+0x381/0x550 [ 838.301839][T28845] ? ksys_dup3+0x3e0/0x3e0 [ 838.306269][T28845] ? do_sys_open+0x31d/0x5d0 [ 838.310886][T28845] ? security_file_ioctl+0x93/0xc0 [ 838.316007][T28845] ksys_ioctl+0xab/0xd0 [ 838.320179][T28845] __x64_sys_ioctl+0x73/0xb0 [ 838.324794][T28845] do_syscall_64+0x103/0x610 [ 838.329413][T28845] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 838.335343][T28845] RIP: 0033:0x457c97 [ 838.339263][T28845] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 838.358894][T28845] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 838.367328][T28845] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 838.375326][T28845] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 838.383326][T28845] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 838.391343][T28845] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 838.399334][T28845] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:37 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'disxard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:37 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vf%t\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:37 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) ptrace$cont(0x1f, r0, 0x0, 0x0) ptrace$getregset(0x4204, r0, 0x205, &(0x7f0000000140)={&(0x7f0000000080)=""/75, 0x4b}) 18:29:37 executing program 3 (fault-call:0 fault-nth:18): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 838.549877][T28842] XFS (loop4): Invalid superblock magic number [ 838.585996][T28860] JFS: Cannot determine volume size [ 838.595383][T28860] JFS: discard option not supported on device [ 838.629033][T28860] JFS: Cannot determine volume size [ 838.651505][T28860] jfs: Unrecognized mount option "disxard=0x0000000000000008" or missing value [ 838.714359][T28872] FAULT_INJECTION: forcing a failure. [ 838.714359][T28872] name failslab, interval 1, probability 0, space 0, times 0 [ 838.737292][T28872] CPU: 0 PID: 28872 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 838.746458][T28872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 838.756533][T28872] Call Trace: [ 838.759850][T28872] dump_stack+0x172/0x1f0 [ 838.764198][T28872] should_fail.cold+0xa/0x15 [ 838.768818][T28872] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 838.774648][T28872] ? ___might_sleep+0x163/0x280 [ 838.779533][T28872] __should_failslab+0x121/0x190 [ 838.784515][T28872] should_failslab+0x9/0x14 [ 838.789055][T28872] kmem_cache_alloc_trace+0x2d1/0x760 [ 838.794456][T28872] kobject_uevent_env+0x2fb/0x1030 [ 838.799588][T28872] kobject_uevent+0x20/0x26 [ 838.804102][T28872] lo_ioctl+0x100b/0x20d0 [ 838.808444][T28872] ? lo_rw_aio+0x1200/0x1200 [ 838.813083][T28872] blkdev_ioctl+0xee8/0x1c40 [ 838.817693][T28872] ? blkpg_ioctl+0xa90/0xa90 [ 838.822304][T28872] ? perf_trace_lock_acquire+0xf5/0x580 [ 838.827870][T28872] ? __fget+0x35a/0x550 [ 838.832047][T28872] ? find_held_lock+0x35/0x130 [ 838.836842][T28872] ? __fget+0x35a/0x550 [ 838.841029][T28872] block_ioctl+0xee/0x130 [ 838.845378][T28872] ? blkdev_fallocate+0x410/0x410 [ 838.850419][T28872] do_vfs_ioctl+0xd6e/0x1390 [ 838.855041][T28872] ? kasan_check_read+0x11/0x20 [ 838.859902][T28872] ? ioctl_preallocate+0x210/0x210 [ 838.865027][T28872] ? __fget+0x381/0x550 [ 838.869208][T28872] ? ksys_dup3+0x3e0/0x3e0 [ 838.873639][T28872] ? do_sys_open+0x31d/0x5d0 [ 838.878268][T28872] ? security_file_ioctl+0x93/0xc0 [ 838.883859][T28872] ksys_ioctl+0xab/0xd0 [ 838.888810][T28872] __x64_sys_ioctl+0x73/0xb0 [ 838.893425][T28872] do_syscall_64+0x103/0x610 [ 838.898038][T28872] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 838.903933][T28872] RIP: 0033:0x457c97 [ 838.907838][T28872] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 838.927460][T28872] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 838.936276][T28872] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 838.944270][T28872] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 838.952256][T28872] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 838.960240][T28872] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 838.968213][T28872] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = syz_open_dev$usbmon(0x0, 0x578, 0x480) accept4$packet(r0, 0x0, &(0x7f0000000300), 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="2fdf005c3ad26c62e49d2b8b05a7de1128351f73b42702dd353834df220a586c67de7862a99f64e8ef981171cd6b1611f99b735e72c555c60bc3672481bfb58b0a75bc0eb94595702e24e725a431196138dba3a1b6119f8041f963899c0d1f"], 0x5f) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 18:29:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x5000000, 0x0) 18:29:39 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x181600, 0x0) sendmsg$nfc_llcp(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x27, 0x1, 0x0, 0x7, 0x0, 0x8, "e27c2c0e071a78a50762cd52517ab1c90b70cfdf0fb67aa1666b2296ac1227b529bb1770deee4a5d55e624c085a5ed93856dd366829a14928c5aaa296f96fe", 0xe}, 0x60, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x78, 0x1ff, 0x2, "0ec7add5704217731b653145bd847b4fe1cd97a4c2de1584b77387450da18616e77ac13b726b438de8db57c74c531885e5fd6c3afd25bbd619209c0dac25e3764773985e643bda008142c90d8e8effbecfd81e8bf2b898466484619d1403d73fa2582e"}, 0x78, 0x4000}, 0x4000) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) 18:29:39 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'disc\nrd', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfa\n\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:39 executing program 3 (fault-call:0 fault-nth:19): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 840.448741][T28886] FAULT_INJECTION: forcing a failure. [ 840.448741][T28886] name failslab, interval 1, probability 0, space 0, times 0 [ 840.467272][T28886] CPU: 1 PID: 28886 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 840.476421][T28886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 840.486515][T28886] Call Trace: [ 840.489834][T28886] dump_stack+0x172/0x1f0 [ 840.494175][T28886] should_fail.cold+0xa/0x15 [ 840.498776][T28886] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 840.504596][T28886] ? ___might_sleep+0x163/0x280 [ 840.509456][T28886] __should_failslab+0x121/0x190 [ 840.514410][T28886] should_failslab+0x9/0x14 [ 840.518929][T28886] kmem_cache_alloc_trace+0x2d1/0x760 [ 840.524330][T28886] kobject_uevent_env+0x2fb/0x1030 [ 840.529467][T28886] kobject_uevent+0x20/0x26 [ 840.533995][T28886] lo_ioctl+0x100b/0x20d0 [ 840.538360][T28886] ? lo_rw_aio+0x1200/0x1200 [ 840.542967][T28886] blkdev_ioctl+0xee8/0x1c40 [ 840.547573][T28886] ? blkpg_ioctl+0xa90/0xa90 [ 840.552175][T28886] ? find_held_lock+0x35/0x130 [ 840.556976][T28886] ? debug_check_no_obj_freed+0x211/0x444 [ 840.562796][T28886] ? __fget+0x35a/0x550 [ 840.566962][T28886] ? find_held_lock+0x35/0x130 [ 840.571740][T28886] ? __fget+0x35a/0x550 [ 840.575908][T28886] block_ioctl+0xee/0x130 [ 840.580261][T28886] ? blkdev_fallocate+0x410/0x410 [ 840.585323][T28886] do_vfs_ioctl+0xd6e/0x1390 [ 840.589931][T28886] ? kasan_check_read+0x11/0x20 [ 840.594823][T28886] ? ioctl_preallocate+0x210/0x210 [ 840.599941][T28886] ? __fget+0x381/0x550 [ 840.604106][T28886] ? ksys_dup3+0x3e0/0x3e0 [ 840.608540][T28886] ? do_sys_open+0x31d/0x5d0 [ 840.613147][T28886] ? security_file_ioctl+0x93/0xc0 [ 840.618265][T28886] ksys_ioctl+0xab/0xd0 [ 840.622464][T28886] __x64_sys_ioctl+0x73/0xb0 [ 840.627069][T28886] do_syscall_64+0x103/0x610 [ 840.631678][T28886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 840.637591][T28886] RIP: 0033:0x457c97 [ 840.641497][T28886] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 840.661112][T28886] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 840.669564][T28886] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 840.677555][T28886] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 840.685551][T28886] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 18:29:39 executing program 0: r0 = accept(0xffffffffffffff9c, &(0x7f0000000000)=@ethernet={0x0, @random}, &(0x7f0000000080)=0x80) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f00000000c0), 0x4) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 840.693552][T28886] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 840.701539][T28886] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:39 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) accept(r1, &(0x7f00000001c0)=@pptp={0x18, 0x2, {0x0, @local}}, &(0x7f0000000100)=0x80) tkill(r0, 0x25) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x5c, r2, 0x300, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x100000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xbe}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100000001}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8050}, 0x4) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 840.831248][T28888] JFS: Cannot determine volume size [ 840.837897][T28888] JFS: discard option not supported on device [ 840.859387][T28888] JFS: Cannot determine volume size [ 840.871710][T28888] jfs: Unrecognized mount option "disc [ 840.871710][T28888] rd=0x0000000000000008" or missing value 18:29:40 executing program 3 (fault-call:0 fault-nth:20): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 840.915144][T28889] XFS (loop4): Invalid superblock magic number [ 840.950569][T29013] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 18:29:40 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000000000)=""/25, &(0x7f0000000040)=0x19) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:40 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'disc%rd', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 840.980458][T29013] FAT-fs (loop5): Filesystem has been set read-only 18:29:40 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000000)=0x8000, 0x4) connect$caif(r0, &(0x7f0000000340)=@util={0x25, "0344a290e455c6c55524c398913b8e41"}, 0x18) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x404000, 0x0) epoll_wait(r1, &(0x7f0000000080)=[{}, {}, {}], 0x3, 0x1) 18:29:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfa%\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 841.049875][T29020] FAULT_INJECTION: forcing a failure. [ 841.049875][T29020] name failslab, interval 1, probability 0, space 0, times 0 [ 841.074510][T29020] CPU: 1 PID: 29020 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 841.083719][T29020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 841.093793][T29020] Call Trace: [ 841.097133][T29020] dump_stack+0x172/0x1f0 [ 841.101468][T29020] should_fail.cold+0xa/0x15 [ 841.106079][T29020] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 841.109148][T29015] XFS (loop4): Invalid superblock magic number [ 841.111897][T29020] ? ___might_sleep+0x163/0x280 [ 841.122987][T29020] __should_failslab+0x121/0x190 [ 841.127942][T29020] should_failslab+0x9/0x14 [ 841.132450][T29020] kmem_cache_alloc_node_trace+0x270/0x720 [ 841.138260][T29020] __kmalloc_node_track_caller+0x3d/0x70 [ 841.143882][T29020] __kmalloc_reserve.isra.0+0x40/0xf0 [ 841.149243][T29020] __alloc_skb+0x10b/0x5e0 [ 841.153648][T29020] ? skb_trim+0x190/0x190 [ 841.157985][T29020] ? kasan_check_read+0x11/0x20 [ 841.162838][T29020] alloc_uevent_skb+0x83/0x1e2 [ 841.167600][T29020] kobject_uevent_env+0xa63/0x1030 [ 841.172747][T29020] kobject_uevent+0x20/0x26 [ 841.177261][T29020] lo_ioctl+0x100b/0x20d0 [ 841.181644][T29020] ? lo_rw_aio+0x1200/0x1200 [ 841.186255][T29020] blkdev_ioctl+0xee8/0x1c40 [ 841.190881][T29020] ? blkpg_ioctl+0xa90/0xa90 [ 841.195467][T29020] ? find_held_lock+0x35/0x130 [ 841.200232][T29020] ? debug_check_no_obj_freed+0x211/0x444 [ 841.205952][T29020] ? __fget+0x35a/0x550 [ 841.210100][T29020] ? find_held_lock+0x35/0x130 [ 841.214866][T29020] ? __fget+0x35a/0x550 [ 841.219143][T29020] block_ioctl+0xee/0x130 [ 841.223497][T29020] ? blkdev_fallocate+0x410/0x410 [ 841.228518][T29020] do_vfs_ioctl+0xd6e/0x1390 [ 841.233118][T29020] ? kasan_check_read+0x11/0x20 [ 841.237966][T29020] ? ioctl_preallocate+0x210/0x210 [ 841.243072][T29020] ? __fget+0x381/0x550 [ 841.247214][T29020] ? ksys_dup3+0x3e0/0x3e0 [ 841.251615][T29020] ? do_sys_open+0x31d/0x5d0 [ 841.256194][T29020] ? security_file_ioctl+0x93/0xc0 [ 841.261286][T29020] ksys_ioctl+0xab/0xd0 [ 841.265432][T29020] __x64_sys_ioctl+0x73/0xb0 [ 841.270030][T29020] do_syscall_64+0x103/0x610 [ 841.274635][T29020] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 841.280544][T29020] RIP: 0033:0x457c97 [ 841.284447][T29020] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 841.304041][T29020] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 841.312437][T29020] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 841.320396][T29020] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 841.328388][T29020] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 841.336355][T29020] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 841.344338][T29020] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x6000000, 0x0) 18:29:40 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x18000, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f00000000c0)=0x1000, 0x4) r2 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x21) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, &(0x7f0000000000)={0x10, 0x400, {0x57, 0xff, 0xffff, {0x8, 0x5}, {0xa0, 0x200}, @cond=[{0x5, 0x28e25259, 0x1, 0x7, 0x6, 0x800}, {0x656, 0xa4, 0xa76, 0x30, 0x3e7, 0x2}]}, {0x52, 0x0, 0x6, {0x3, 0x7}, {0x0, 0x6be3}, @cond=[{0x3, 0x9, 0x5, 0x8, 0x6e, 0xb86}, {0x5, 0x0, 0x5, 0x9, 0x6, 0x200}]}}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:40 executing program 3 (fault-call:0 fault-nth:21): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:40 executing program 5: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) mlock(&(0x7f0000ff8000/0x8000)=nil, 0x8000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmctl$SHM_UNLOCK(r0, 0xc) [ 841.503643][T29025] JFS: Cannot determine volume size [ 841.508912][T29025] JFS: discard option not supported on device [ 841.529353][T29025] JFS: Cannot determine volume size [ 841.534616][T29025] jfs: Unrecognized mount option "disc%rd=0x0000000000000008" or missing value 18:29:40 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x100000001}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f00000000c0)={r2, 0x724}, 0x8) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000000)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x02', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:40 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r1, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x20040, &(0x7f00000004c0)={[{@mode={'mode', 0x3d, 0xff}}, {@mode={'mode', 0x3d, 0xc6a2}}], [{@uid_gt={'uid>', r1}}, {@audit='audit'}, {@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}]}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000580)={{}, {}, [], {0x4, 0x7}, [{0x8, 0x4, r2}, {0x8, 0x2, r2}, {0x8, 0x4, r2}, {0x8, 0x0, r2}], {0x10, 0x2}, {0x20, 0x1}}, 0x44, 0x1) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000cc0)={'nat\x00', 0x10b, "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"}, 0x0) fcntl$setpipe(r0, 0x407, 0x6) chdir(&(0x7f0000000340)='./file0\x00') mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x20, &(0x7f0000000700)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@rq={'rq', 0x3d, 0x1}}, {@common=@dfltuid={'dfltuid', 0x3d, r1}}, {@rq={'rq', 0x3d, 0x84}}], [{@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}}) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000900)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="000029bd7000df250100000008000300000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000840)=""/85) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000280), &(0x7f0000000380)=0x6) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x8000}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000940)={r3, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x26}}}, 0x3, 0x9a, 0x0, 0x2, 0xec}, 0x98) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000680)) [ 841.662247][T29147] FAULT_INJECTION: forcing a failure. [ 841.662247][T29147] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 841.675500][T29147] CPU: 1 PID: 29147 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 841.684636][T29147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 841.694978][T29147] Call Trace: [ 841.698287][T29147] dump_stack+0x172/0x1f0 [ 841.702647][T29147] should_fail.cold+0xa/0x15 18:29:40 executing program 0: clone(0x18000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 841.707254][T29147] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 841.713081][T29147] should_fail_alloc_page+0x50/0x60 [ 841.718294][T29147] __alloc_pages_nodemask+0x1a1/0x7e0 [ 841.723777][T29147] ? tick_nohz_tick_stopped+0x1a/0x90 [ 841.729175][T29147] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 841.734938][T29147] ? find_held_lock+0x35/0x130 [ 841.739763][T29147] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 841.745583][T29147] cache_grow_begin+0x9c/0x850 [ 841.750350][T29147] ? kobject_uevent_env+0x2fb/0x1030 [ 841.755647][T29147] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 841.761902][T29147] kmem_cache_alloc_trace+0x67f/0x760 [ 841.767305][T29147] kobject_uevent_env+0x2fb/0x1030 [ 841.772443][T29147] kobject_uevent+0x20/0x26 [ 841.776993][T29147] lo_ioctl+0x100b/0x20d0 [ 841.781358][T29147] ? lo_rw_aio+0x1200/0x1200 [ 841.785981][T29147] blkdev_ioctl+0xee8/0x1c40 [ 841.790593][T29147] ? blkpg_ioctl+0xa90/0xa90 [ 841.795196][T29147] ? find_held_lock+0x35/0x130 [ 841.799972][T29147] ? debug_check_no_obj_freed+0x211/0x444 [ 841.805699][T29147] ? __fget+0x35a/0x550 [ 841.809859][T29147] ? find_held_lock+0x35/0x130 [ 841.814648][T29147] ? __fget+0x35a/0x550 [ 841.818813][T29147] block_ioctl+0xee/0x130 [ 841.823154][T29147] ? blkdev_fallocate+0x410/0x410 [ 841.828198][T29147] do_vfs_ioctl+0xd6e/0x1390 [ 841.832820][T29147] ? kasan_check_read+0x11/0x20 [ 841.837721][T29147] ? ioctl_preallocate+0x210/0x210 [ 841.842848][T29147] ? __fget+0x381/0x550 [ 841.847016][T29147] ? ksys_dup3+0x3e0/0x3e0 [ 841.851444][T29147] ? do_sys_open+0x31d/0x5d0 [ 841.856056][T29147] ? security_file_ioctl+0x93/0xc0 [ 841.861183][T29147] ksys_ioctl+0xab/0xd0 [ 841.865348][T29147] __x64_sys_ioctl+0x73/0xb0 [ 841.869954][T29147] do_syscall_64+0x103/0x610 [ 841.874573][T29147] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 841.880484][T29147] RIP: 0033:0x457c97 [ 841.884432][T29147] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 841.904056][T29147] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 841.912482][T29147] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 841.920473][T29147] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 841.928455][T29147] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 841.936466][T29147] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 841.944474][T29147] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:41 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'disca\nd', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:41 executing program 3 (fault-call:0 fault-nth:22): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 842.058899][T29151] XFS (loop4): Invalid superblock magic number [ 842.159100][T29204] JFS: Cannot determine volume size 18:29:41 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x2000000a, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) sendto$netrom(r1, &(0x7f0000000000)="d80a5ab96f1c70517f0703f28055641b889e056ed1234cdb57c55700938d32f64eeb0437fa15e28de5f928871e5d5bbbca4e4989ae8550a89af941480c97979c6c6c2072a627a65f0d6e744af0db136d688ec73d9b311f96c9916d32978cb7fad575", 0x62, 0x20008000, 0x0, 0x0) 18:29:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x7000000, 0x0) [ 842.193612][T29204] JFS: discard option not supported on device [ 842.232862][T29204] JFS: Cannot determine volume size [ 842.243596][T29204] jfs: Unrecognized mount option "disca [ 842.243596][T29204] d=0x0000000000000008" or missing value [ 842.269589][T29278] FAULT_INJECTION: forcing a failure. [ 842.269589][T29278] name failslab, interval 1, probability 0, space 0, times 0 18:29:41 executing program 5: mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x418201, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x494380, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = userfaultfd(0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_ZEROPAGE(r1, 0x8010aa01, &(0x7f0000000000)={{&(0x7f0000716000/0x4000)=nil, 0x4000}}) 18:29:41 executing program 0: r0 = accept$unix(0xffffffffffffff9c, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000000c0)=0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000140)=r1) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xc0200}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r4, 0x100, 0x70bd26, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x8004) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 842.296104][T29278] CPU: 0 PID: 29278 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 842.305263][T29278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 842.315356][T29278] Call Trace: [ 842.318669][T29278] dump_stack+0x172/0x1f0 [ 842.323022][T29278] should_fail.cold+0xa/0x15 [ 842.327643][T29278] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 842.333484][T29278] ? ___might_sleep+0x163/0x280 [ 842.338373][T29278] __should_failslab+0x121/0x190 [ 842.343337][T29278] should_failslab+0x9/0x14 [ 842.348034][T29278] kmem_cache_alloc+0x2be/0x710 [ 842.352899][T29278] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 842.358711][T29278] ? lock_downgrade+0x880/0x880 [ 842.363581][T29278] skb_clone+0x150/0x3b0 [ 842.367855][T29278] netlink_broadcast_filtered+0x870/0xb20 [ 842.373614][T29278] netlink_broadcast+0x3a/0x50 [ 842.378400][T29278] kobject_uevent_env+0xa94/0x1030 [ 842.383559][T29278] kobject_uevent+0x20/0x26 [ 842.388097][T29278] lo_ioctl+0x100b/0x20d0 [ 842.392453][T29278] ? lo_rw_aio+0x1200/0x1200 [ 842.397063][T29278] blkdev_ioctl+0xee8/0x1c40 [ 842.401668][T29278] ? blkpg_ioctl+0xa90/0xa90 [ 842.406292][T29278] ? find_held_lock+0x35/0x130 [ 842.411092][T29278] ? debug_check_no_obj_freed+0x211/0x444 [ 842.416833][T29278] ? __fget+0x35a/0x550 [ 842.421007][T29278] ? find_held_lock+0x35/0x130 [ 842.425785][T29278] ? __fget+0x35a/0x550 [ 842.429978][T29278] block_ioctl+0xee/0x130 [ 842.434846][T29278] ? blkdev_fallocate+0x410/0x410 [ 842.439922][T29278] do_vfs_ioctl+0xd6e/0x1390 [ 842.444554][T29278] ? kasan_check_read+0x11/0x20 [ 842.449427][T29278] ? ioctl_preallocate+0x210/0x210 [ 842.454561][T29278] ? __fget+0x381/0x550 [ 842.458753][T29278] ? ksys_dup3+0x3e0/0x3e0 [ 842.463177][T29278] ? do_sys_open+0x31d/0x5d0 [ 842.467788][T29278] ? security_file_ioctl+0x93/0xc0 [ 842.472931][T29278] ksys_ioctl+0xab/0xd0 [ 842.477125][T29278] __x64_sys_ioctl+0x73/0xb0 [ 842.481748][T29278] do_syscall_64+0x103/0x610 [ 842.486814][T29278] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 842.492729][T29278] RIP: 0033:0x457c97 [ 842.496634][T29278] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 842.516251][T29278] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 842.524764][T29278] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 842.532760][T29278] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 18:29:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x03', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 842.541301][T29278] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 842.549284][T29278] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 842.557266][T29278] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:41 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r1, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040004}, 0x90) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="604884e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0xfcfdffff00000000) syz_open_dev$swradio(&(0x7f00000002c0)='/dev/swradio#\x00', 0x0, 0x2) syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) 18:29:41 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x10001, 0x8000) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) r4 = getegid() fchownat(r1, &(0x7f0000000040)='./file0\x00', r2, r4, 0x1800) r5 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r5, 0x0, 0x61, &(0x7f0000000480)=ANY=[@ANYPTR=&(0x7f0000000180)=ANY=[@ANYRES32=r5, @ANYRESDEC=r3, @ANYRESHEX, @ANYRES16=r0, @ANYRESOCT=0x0, @ANYPTR=&(0x7f0000000200)=ANY=[@ANYRES64=r4, @ANYPTR64, @ANYRES64, @ANYBLOB="d010c3441b9efbd728c71c5594f905e2e1973f"]]], &(0x7f0000000280)=0x1) ptrace$setopts(0x4206, r0, 0x0, 0xffffffffffffffff) socket$bt_hidp(0x1f, 0x3, 0x6) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) recvfrom$x25(r1, &(0x7f00000003c0)=""/132, 0x84, 0x20, &(0x7f0000000380)={0x9, @remote={[], 0x3}}, 0x12) ioctl$BLKTRACESETUP(r1, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:41 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'disca%d', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:41 executing program 3 (fault-call:0 fault-nth:23): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 842.801394][T29302] MINIX-fs: file system does not have enough imap blocks allocated. Refusing to mount. [ 842.816988][T29302] MINIX-fs: bad superblock or unable to read bitmaps 18:29:41 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v2={0x5, 0x1, 0x1, 0x8000, 0x8e, "20ffabf9f1b895f486bd9305d1e8fb35cdcda624b4d8d11313695ddcb01ec1a95f1fd3f95c686d93a04fd1a1e1f69954dcf7d092fe9af6cce727188096058f27f18ecffc2f87faeea4970369a1eb503e426a581e910cd1b595b08bf78498a57d2781412fc8afff741c51a48cfd534edff45d522142bd51d5552bbc411cfca11659241ac76750cdcef8c4a4eaed75"}, 0x98, 0x3) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@broadcast, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040), 0xffffffffffffffdd) sendto$inet6(r0, &(0x7f00000001c0)='p', 0x1, 0x0, 0x0, 0x0) [ 842.896644][T29301] XFS (loop4): Invalid superblock magic number [ 842.948561][T29325] FAULT_INJECTION: forcing a failure. [ 842.948561][T29325] name failslab, interval 1, probability 0, space 0, times 0 [ 842.962153][T29318] JFS: Cannot determine volume size [ 842.969605][T29325] CPU: 0 PID: 29325 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 842.978751][T29325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 842.978824][T29318] JFS: discard option not supported on device [ 842.988834][T29325] Call Trace: [ 842.988866][T29325] dump_stack+0x172/0x1f0 [ 842.988888][T29325] should_fail.cold+0xa/0x15 [ 842.988906][T29325] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 842.988930][T29325] ? ___might_sleep+0x163/0x280 [ 842.988953][T29325] __should_failslab+0x121/0x190 [ 842.988973][T29325] should_failslab+0x9/0x14 [ 842.988992][T29325] kmem_cache_alloc+0x2be/0x710 [ 842.989003][T29325] ? __d_lookup+0x433/0x760 [ 842.989018][T29325] ? lookup_dcache+0x23/0x140 [ 842.989030][T29325] ? d_lookup+0xf9/0x260 18:29:42 executing program 5: perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) llistxattr(&(0x7f0000000080)='./file0/file1\x00', &(0x7f0000000180)=""/216, 0xd8) mkdir(0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file1\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000480)='ns\x00') openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) connect$l2tp(r1, &(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x0, 0x0, 0x4, {0xa, 0x4e21, 0x8, @empty, 0x4}}}, 0x32) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000640)={0x6, &(0x7f0000000a40)=[{}, {}, {}, {}, {}, {}]}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(0x0, 0xc) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) socket$nl_route(0x10, 0x3, 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='f`\x00\x00\x00', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="d7a9bda7182d1ff3d5ea", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f00000002c0)="7ee6df36e4c68dada1b03d239ea77ec8", 0x10) [ 842.989047][T29325] ? lockdep_hardirqs_on+0x418/0x5d0 [ 842.989066][T29325] __d_alloc+0x2e/0x8c0 [ 842.989093][T29325] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 843.026796][T29318] JFS: Cannot determine volume size [ 843.027435][T29325] d_alloc+0x4d/0x2b0 [ 843.048445][T29318] jfs: Unrecognized mount option "disca%d=0x0000000000000008" or missing value [ 843.050975][T29325] __lookup_hash+0xcd/0x190 [ 843.050999][T29325] filename_create+0x1a7/0x4f0 [ 843.051018][T29325] ? kern_path_mountpoint+0x40/0x40 [ 843.051035][T29325] ? strncpy_from_user+0x2a8/0x380 [ 843.051057][T29325] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 843.051071][T29325] ? getname_flags+0x277/0x5b0 [ 843.051091][T29325] do_mkdirat+0xb5/0x2a0 [ 843.051109][T29325] ? __ia32_sys_mknod+0xb0/0xb0 [ 843.051133][T29325] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 843.124146][T29325] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 843.130239][T29325] ? do_syscall_64+0x26/0x610 [ 843.134949][T29325] ? lockdep_hardirqs_on+0x418/0x5d0 [ 843.140265][T29325] __x64_sys_mkdir+0x5c/0x80 [ 843.144876][T29325] do_syscall_64+0x103/0x610 [ 843.149482][T29325] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 843.155375][T29325] RIP: 0033:0x457247 [ 843.159270][T29325] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 843.178883][T29325] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 843.187311][T29325] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 18:29:42 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 843.195326][T29325] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 [ 843.203306][T29325] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 843.211287][T29325] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 843.219295][T29325] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000, 0x0) 18:29:42 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="2bdf2556c4cc50595e24698d5502b9c7787575d90c6474c4f8ea5d32b6f7059df7b5434a351b6e78a0043d8fab4e5779436ba4b989cf7de458ee8e56c5dc548e3b568d4505a455f26226a1bc1738fc17112475dbe6aa7283f822bad68b4e819ca2328c83b7063566adf4136019b2e3e0906a5681ac1dbac871d4f9801d3cd189d53255e0874ec375c75793fccb563608d35cc23a41c332d4a792f5c92d6806bc90e723dee84350385b9fa8a5794ad8f9d580c9376957a6a46e563a93f8effe6892ccd52622b2d018e2420db766a0bae308a839360cc65a7fea485c8504909a", 0xdf) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:42 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discar\n', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:42 executing program 3 (fault-call:0 fault-nth:24): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:42 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x24, r2, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x200}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 843.520438][T29351] FAULT_INJECTION: forcing a failure. [ 843.520438][T29351] name failslab, interval 1, probability 0, space 0, times 0 [ 843.573838][T29351] CPU: 1 PID: 29351 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 843.583010][T29351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.593082][T29351] Call Trace: [ 843.596398][T29351] dump_stack+0x172/0x1f0 [ 843.600747][T29351] should_fail.cold+0xa/0x15 [ 843.605349][T29351] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 843.611166][T29351] ? ___might_sleep+0x163/0x280 [ 843.616034][T29351] __should_failslab+0x121/0x190 [ 843.620992][T29351] should_failslab+0x9/0x14 [ 843.625512][T29351] kmem_cache_alloc+0x2be/0x710 [ 843.630418][T29351] ? __d_lookup+0x433/0x760 [ 843.634954][T29351] ? lookup_dcache+0x23/0x140 [ 843.639647][T29351] ? d_lookup+0xf9/0x260 [ 843.643904][T29351] ? lockdep_hardirqs_on+0x418/0x5d0 [ 843.649194][T29351] __d_alloc+0x2e/0x8c0 [ 843.653356][T29351] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 843.659079][T29351] d_alloc+0x4d/0x2b0 [ 843.663070][T29351] __lookup_hash+0xcd/0x190 [ 843.667591][T29351] filename_create+0x1a7/0x4f0 [ 843.672375][T29351] ? kern_path_mountpoint+0x40/0x40 [ 843.677592][T29351] ? strncpy_from_user+0x2a8/0x380 [ 843.682734][T29351] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 843.689103][T29351] ? getname_flags+0x277/0x5b0 [ 843.693879][T29351] do_mkdirat+0xb5/0x2a0 [ 843.698136][T29351] ? __ia32_sys_mknod+0xb0/0xb0 [ 843.702990][T29351] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 843.708459][T29351] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 843.714538][T29351] ? do_syscall_64+0x26/0x610 [ 843.719228][T29351] ? lockdep_hardirqs_on+0x418/0x5d0 [ 843.724542][T29351] __x64_sys_mkdir+0x5c/0x80 [ 843.729163][T29351] do_syscall_64+0x103/0x610 [ 843.733804][T29351] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 843.739814][T29351] RIP: 0033:0x457247 [ 843.743714][T29351] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 843.763413][T29351] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 843.771839][T29351] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 843.779823][T29351] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 [ 843.787830][T29351] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 843.795814][T29351] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 843.803788][T29351] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:42 executing program 5: perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) llistxattr(&(0x7f0000000080)='./file0/file1\x00', &(0x7f0000000180)=""/216, 0xd8) mkdir(0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file1\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000480)='ns\x00') openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) connect$l2tp(r1, &(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x0, 0x0, 0x4, {0xa, 0x4e21, 0x8, @empty, 0x4}}}, 0x32) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000640)={0x6, &(0x7f0000000a40)=[{}, {}, {}, {}, {}, {}]}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(0x0, 0xc) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) socket$nl_route(0x10, 0x3, 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='f`\x00\x00\x00', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="d7a9bda7182d1ff3d5ea", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f00000002c0)="7ee6df36e4c68dada1b03d239ea77ec8", 0x10) [ 843.823551][T29350] JFS: Cannot determine volume size [ 843.833164][T29350] JFS: discard option not supported on device [ 843.840449][T29346] XFS (loop4): Invalid superblock magic number 18:29:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x05', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 843.882720][T29350] JFS: Cannot determine volume size 18:29:43 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x6, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000080)={0x0, 0x0, 0x0, {0xd, @raw_data="95eb72bcc01962f22680823beab4bcfe3b97544b4acac4f1e9e2c8be2a6748b1bb235ee2aa71f60d1442d08ee4110f2b4255bce3314f50b6ca04321efe6a6282243bb62eb261f8da53ee3ddd9adbc2ea7ad3e74ac7655e1e194e26c5fb8952e8dc2c197789c78ab056abae995c501d649fcc2e7d8f0ba87f0b5c92b120242f2c7358954bfac37f0a8804c04d9d8f5eb3deb34213313dd0466392ce2c42da9a79990f41c5264980c5a51ed9582ad6a1f76a69b8149f10f49f0765ae195413e2f5781d10fbb9bb475a"}}) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_DQEVENT(r2, 0x80885659, &(0x7f0000000180)={0x0, @motion_det}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 843.903380][T29350] jfs: Unrecognized mount option "discar [ 843.903380][T29350] =0x0000000000000008" or missing value 18:29:43 executing program 3 (fault-call:0 fault-nth:25): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000080)={0x0, @rand_addr=0x4, 0x0, 0x3, 'none\x00\x00\x00\x00\xe2\xff\x00', 0x0, 0x0, 0x8000000000}, 0x2c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="6000000021a6edb9bc14ba532e00000127bd70001edbdf2502341408030000000f0000000800012008000f000000000008000200e000000108121a0200511414e37d6a79ba9dfa0a74a9360add6d1ae0459143a877"], 0x1}}, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x60, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'dh\x00', 0x0, 0x0, 0x400}, 0x2c) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) bind$rxrpc(r1, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e22, 0x8000, @loopback}}, 0x24) 18:29:43 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discar%', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x8030000, 0x0) 18:29:43 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(r1, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:43 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r0}}, 0xc) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) ioctl$TIOCGSID(r1, 0x5409, 0x0) [ 844.268232][T29381] FAULT_INJECTION: forcing a failure. [ 844.268232][T29381] name failslab, interval 1, probability 0, space 0, times 0 [ 844.306896][T29381] CPU: 1 PID: 29381 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 844.316054][T29381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 844.316069][T29381] Call Trace: [ 844.329438][T29381] dump_stack+0x172/0x1f0 [ 844.333799][T29381] should_fail.cold+0xa/0x15 [ 844.338411][T29381] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 844.344233][T29381] ? ___might_sleep+0x163/0x280 [ 844.349090][T29381] __should_failslab+0x121/0x190 [ 844.354032][T29381] should_failslab+0x9/0x14 [ 844.358549][T29381] kmem_cache_alloc+0x2be/0x710 [ 844.363403][T29381] ? __fget+0x381/0x550 18:29:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000900)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)=0xf2db) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x404000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="75707065726469723d2e2f54696c65302c6c6f7765726469723d2e2f66696c65302c776f72108200003d2e2f6600"]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x80400, 0x43) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f00000001c0)=""/22, &(0x7f0000000200)=0x16) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0xff) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, 0x0) [ 844.367586][T29381] getname_flags+0xd6/0x5b0 [ 844.372115][T29381] do_mkdirat+0xa0/0x2a0 [ 844.376382][T29381] ? __ia32_sys_mknod+0xb0/0xb0 [ 844.381254][T29381] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 844.386738][T29381] ? do_syscall_64+0x26/0x610 [ 844.391433][T29381] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 844.397517][T29381] ? do_syscall_64+0x26/0x610 [ 844.402209][T29381] ? lockdep_hardirqs_on+0x418/0x5d0 [ 844.407501][T29381] __x64_sys_mkdir+0x5c/0x80 [ 844.412102][T29381] do_syscall_64+0x103/0x610 [ 844.416711][T29381] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 844.422621][T29381] RIP: 0033:0x457247 [ 844.426535][T29381] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 844.446600][T29381] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 844.455020][T29381] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 18:29:43 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x2d, &(0x7f0000000000)={@remote, @loopback, @rand_addr=0x56}, 0xc) kcmp(r0, r0, 0x3, r2, r1) [ 844.462993][T29381] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 [ 844.470974][T29381] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 844.478967][T29381] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 844.486964][T29381] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x06', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 844.530649][T29391] JFS: Cannot determine volume size [ 844.537325][T29391] JFS: discard option not supported on device [ 844.547971][T29391] JFS: Cannot determine volume size [ 844.554244][T29391] jfs: Unrecognized mount option "discar%=0x0000000000000008" or missing value 18:29:43 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/19, 0x13}, {&(0x7f0000000040)=""/99, 0x63}, {&(0x7f0000000140)=""/143, 0x8f}], 0x3, &(0x7f0000000200)=""/54, 0x36}, 0x10002) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x9000000, 0x0) 18:29:43 executing program 3 (fault-call:0 fault-nth:26): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:43 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discar.', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:43 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x4, 0x4) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000140)={@ethernet={0x6}, {&(0x7f0000000000)=""/45, 0x2d}, &(0x7f0000000040), 0x6}, 0xa0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:44 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(r0, 0x0, 0x7fffffff, 0x0) ptrace$setopts(0x4206, r0, 0x7ff, 0x1) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000140)={0xfffffffffffffbff, {{0x2, 0x4e20, @local}}, 0x1, 0x7, [{{0x2, 0x4e22, @local}}, {{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e21, @loopback}}, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e20, @multicast2}}, {{0x2, 0x4e24, @local}}, {{0x2, 0x4e23, @loopback}}]}, 0x410) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0xfffffffffffffffe, 0x7) [ 844.971931][T29409] overlayfs: unrecognized mount option "wor‚" or missing value [ 844.993600][T29424] FAULT_INJECTION: forcing a failure. [ 844.993600][T29424] name failslab, interval 1, probability 0, space 0, times 0 [ 845.008026][T29424] CPU: 0 PID: 29424 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 845.017156][T29424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.017162][T29424] Call Trace: [ 845.017187][T29424] dump_stack+0x172/0x1f0 [ 845.017206][T29424] should_fail.cold+0xa/0x15 [ 845.017222][T29424] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 845.017241][T29424] ? ___might_sleep+0x163/0x280 [ 845.017261][T29424] __should_failslab+0x121/0x190 [ 845.017279][T29424] should_failslab+0x9/0x14 [ 845.017296][T29424] __kmalloc+0x2dc/0x740 [ 845.017315][T29424] ? __lock_acquire+0x55d/0x4710 [ 845.017333][T29424] ? ext4_find_extent+0x76e/0x9d0 [ 845.017351][T29424] ext4_find_extent+0x76e/0x9d0 [ 845.017373][T29424] ext4_ext_map_blocks+0x1cc/0x4e50 [ 845.017398][T29424] ? ext4_ext_release+0x10/0x10 [ 845.017421][T29424] ? lock_acquire+0x16f/0x3f0 [ 845.074276][T29424] ? ext4_map_blocks+0x3fd/0x1a00 [ 845.098878][T29424] ext4_map_blocks+0xebb/0x1a00 [ 845.099514][T29423] JFS: Cannot determine volume size [ 845.103744][T29424] ? ext4_issue_zeroout+0x190/0x190 [ 845.103769][T29424] ? kasan_check_write+0x14/0x20 [ 845.103790][T29424] ? __brelse+0x95/0xb0 [ 845.112676][T29423] JFS: discard option not supported on device [ 845.114176][T29424] ext4_getblk+0xc4/0x510 [ 845.114197][T29424] ? ext4_iomap_begin+0xfe0/0xfe0 [ 845.114219][T29424] ? ext4_free_inode+0x1450/0x1450 [ 845.114241][T29424] ext4_bread+0x8f/0x230 [ 845.134028][T29423] JFS: Cannot determine volume size [ 845.138741][T29424] ? ext4_getblk+0x510/0x510 [ 845.138767][T29424] ext4_append+0x155/0x370 [ 845.138787][T29424] ext4_mkdir+0x61b/0xdf0 [ 845.138815][T29424] ? ext4_init_dot_dotdot+0x520/0x520 18:29:44 executing program 5: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) dup3(r1, r1, 0x80000) [ 845.148166][T29424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 845.148183][T29424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 845.148206][T29424] ? security_inode_permission+0xd5/0x110 [ 845.172079][T29424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 845.172098][T29424] ? security_inode_mkdir+0xee/0x120 [ 845.172118][T29424] vfs_mkdir+0x433/0x690 [ 845.172139][T29424] do_mkdirat+0x234/0x2a0 [ 845.172154][T29424] ? __ia32_sys_mknod+0xb0/0xb0 [ 845.172171][T29424] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 845.172195][T29424] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 845.172209][T29424] ? do_syscall_64+0x26/0x610 [ 845.172226][T29424] ? lockdep_hardirqs_on+0x418/0x5d0 [ 845.172243][T29424] __x64_sys_mkdir+0x5c/0x80 [ 845.172259][T29424] do_syscall_64+0x103/0x610 [ 845.172282][T29424] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 845.185433][T29423] jfs: Unrecognized mount option "discar.=0x0000000000000008" or missing value [ 845.190514][T29424] RIP: 0033:0x457247 18:29:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\a', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 845.190540][T29424] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 845.190549][T29424] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 845.190564][T29424] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 845.190573][T29424] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 [ 845.190582][T29424] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 18:29:44 executing program 0: clone(0x13102001feb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) ioprio_get$pid(0x1, r0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) futex(&(0x7f0000000000)=0x2, 0x4, 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080)=0x1, 0x0) 18:29:44 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x800) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x220200, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f00000001c0)=0x4) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r3, 0x4}, 0x8) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x7) openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, &(0x7f0000000400)) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x9, 0x5, 0x4}, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) close(r4) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000340)=ANY=[@ANYBLOB="0000a58d000000000000463ba3daa1799bbfd1750800000086052000000000000c00006fa6e9536fdb02656589a2b2babc4a150fc5252455d30a2b691da48b038177cfe9bb25ce16b4cc7d1897135660c50000000000"], 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) read(r0, 0x0, 0x0) [ 845.190591][T29424] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 845.190600][T29424] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:44 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x5) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e22, 0x1, @empty, 0x2}}, 0x3, 0x1000, 0x0, 0x7, 0x9}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000001c0)=ANY=[@ANYRES32=r2, @ANYBLOB="020008000000ff034c8febd7b800003f000300010000a0ff00"], &(0x7f0000000180)=0x18) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:44 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discar/', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:44 executing program 3 (fault-call:0 fault-nth:27): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 845.408966][T29426] XFS (loop4): Invalid superblock magic number [ 845.620838][T29464] FAULT_INJECTION: forcing a failure. [ 845.620838][T29464] name failslab, interval 1, probability 0, space 0, times 0 [ 845.659468][T29464] CPU: 0 PID: 29464 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 845.668635][T29464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.678702][T29464] Call Trace: [ 845.682025][T29464] dump_stack+0x172/0x1f0 [ 845.686409][T29464] should_fail.cold+0xa/0x15 [ 845.691048][T29464] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 845.696880][T29464] ? ___might_sleep+0x163/0x280 [ 845.701767][T29464] __should_failslab+0x121/0x190 [ 845.706726][T29464] should_failslab+0x9/0x14 [ 845.711234][T29464] __kmalloc+0x2dc/0x740 [ 845.715502][T29464] ? __lock_acquire+0x55d/0x4710 [ 845.720474][T29464] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 845.726158][T29464] ? ext4_find_extent+0x76e/0x9d0 [ 845.731227][T29464] ext4_find_extent+0x76e/0x9d0 [ 845.736120][T29464] ext4_ext_map_blocks+0x1cc/0x4e50 [ 845.741344][T29464] ? retint_kernel+0x2d/0x2d [ 845.745966][T29464] ? ext4_ext_release+0x10/0x10 [ 845.750843][T29464] ? debug_smp_processor_id+0x37/0x280 [ 845.756321][T29464] ? lock_acquire+0x16f/0x3f0 [ 845.761007][T29464] ? ext4_map_blocks+0x3fd/0x1a00 [ 845.766056][T29464] ext4_map_blocks+0xebb/0x1a00 [ 845.770942][T29464] ? ext4_issue_zeroout+0x190/0x190 [ 845.776174][T29464] ? kasan_check_write+0x14/0x20 [ 845.781143][T29464] ? __brelse+0x95/0xb0 [ 845.785338][T29464] ext4_getblk+0xc4/0x510 [ 845.789699][T29464] ? ext4_iomap_begin+0xfe0/0xfe0 [ 845.794754][T29464] ? ext4_free_inode+0x1450/0x1450 [ 845.799879][T29464] ext4_bread+0x8f/0x230 [ 845.804135][T29464] ? ext4_getblk+0x510/0x510 [ 845.808743][T29464] ext4_append+0x155/0x370 [ 845.813176][T29464] ext4_mkdir+0x61b/0xdf0 [ 845.817583][T29464] ? ext4_init_dot_dotdot+0x520/0x520 [ 845.822978][T29464] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 845.829236][T29464] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 845.832730][T29465] JFS: Cannot determine volume size [ 845.835515][T29464] ? security_inode_permission+0xd5/0x110 [ 845.846486][T29464] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 845.852737][T29464] ? security_inode_mkdir+0xee/0x120 [ 845.858030][T29464] vfs_mkdir+0x433/0x690 [ 845.862280][T29464] do_mkdirat+0x234/0x2a0 [ 845.862298][T29464] ? __ia32_sys_mknod+0xb0/0xb0 18:29:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xa000000, 0x0) 18:29:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\b', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:45 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000080)=0x7) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xc0109207, 0x20000000) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 18:29:45 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x280, 0x0) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000040)) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000140)=0x400) r1 = gettid() r2 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) getpid() tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r2, 0xc040564a, &(0x7f00000001c0)={0x7, 0x0, 0x301d, 0xc847, 0x5, 0x10000, 0x8b74}) syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x100, 0x802) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 845.862313][T29464] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 845.862331][T29464] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 845.862345][T29464] ? do_syscall_64+0x26/0x610 [ 845.862361][T29464] ? lockdep_hardirqs_on+0x418/0x5d0 [ 845.862378][T29464] __x64_sys_mkdir+0x5c/0x80 [ 845.862395][T29464] do_syscall_64+0x103/0x610 [ 845.862414][T29464] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 845.862426][T29464] RIP: 0033:0x457247 [ 845.862447][T29464] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 845.878133][T29465] JFS: discard option not supported on device [ 845.883172][T29464] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 845.883188][T29464] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 845.883195][T29464] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 [ 845.883203][T29464] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 18:29:45 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r1, 0xc040563e, &(0x7f0000000000)={0x1, 0x0, 0x100, 0x3, {0x5, 0x1, 0x3, 0x9}}) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:45 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000000c0)={@loopback}, 0x5) r0 = syz_open_dev$sndpcmp(&(0x7f0000000780)='/dev/snd/pcmC#D#p\x00', 0x6, 0x2000) getdents(r0, &(0x7f00000007c0)=""/193, 0xc1) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) mount$overlay(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000340)='overlay\x00', 0x4, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r1]) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000380)=""/124, 0x7c}, {&(0x7f0000000400)=""/182, 0xb6}, {&(0x7f00000004c0)=""/136, 0x88}, {&(0x7f0000000300)=""/18, 0x12}], 0x4, &(0x7f0000000600)=""/191, 0xbf}, 0x2020) getsockopt$IPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x43, &(0x7f0000000700)={'ah\x00'}, &(0x7f0000000740)=0x1e) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x17\x000\xdf\xaa_(\x8a\x8c\x9a\x8e\x00\x00\x00\x01\x00'}}) [ 845.883210][T29464] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 845.883218][T29464] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 [ 845.908775][T29465] JFS: Cannot determine volume size [ 845.955245][T29465] jfs: Unrecognized mount option "discar/=0x0000000000000008" or missing value 18:29:45 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4202, r0, 0x401, 0x100033) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:45 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0xa, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:45 executing program 3 (fault-call:0 fault-nth:28): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 846.194457][T29480] XFS (loop4): Invalid superblock magic number 18:29:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ip\x01\x00\x01\x00s/lblc\t_expiration\x00Z\x86)&\xc0 m\xf9fu\xd0\xf7\xceY\x91\xea\n\x80t@@\xd7\x84A\x05\x88\xfb3\xb7\xb4Dk;c\xc7_\xad\xb6\xdds\xaa\xd6s\xd2\xc9\xf4\xe1\x9d\x94p\xca\xd2\xdcz\x8d\xa9\xae\xe2c\x11\x9d\x00&m\xed\xef\xd1\xc9\xdf\xca<\xf2\xda\xbc=\v(\xd7\xbb\x84\xe8\xccG\a\xabQ\xa8\"AE\x8a\xa7\xf2\xac\'\xb1\xfb/\xfa\x81\a\xcd\x11Dv.\xcb\xf4\x03\xfd\xf6\x7f\xe3?C\'\f\x96\xaf\xbe\xe1\xb1d\x04L\xeat\xae\xf6\xa4\x0fL\xfe\xcd`\x05\n\x1f\xa2MB\xa8\x8e\xcc\x7fq\xa7\xee\x1b\xa1\xa3\xbe\x1d\x03\xbc\xb8H\xed4P\xbbk\x81\xd2\x9f\x93t\xfe\xf4\x0em`\x90\x13\xe0\x87\n\xc6\x0e\xb0\x02t\xcc\xdc\x16\xb9\x835\xcc\xf5\x16\xc4\xfc\xd1j\xee\xdf\xed\xe7:E\'\xd0\xdb\x86\a\xb3O\x8d\xa3$\x96\x05\x15<\xd6\x9cC\xd3\x97e\x01\xc6\x1c\xaf\f\xb80(!\xb2\xe8\x1b\xcc\xbb:\xbe\x19Q\xba\x058\v2\xca\x9c\x1b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) mremap(&(0x7f00007c0000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000054000/0x2000)=nil) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000440)) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'tunl0\x00', &(0x7f00000000c0)=@ethtool_modinfo={0x42, 0x790f3677, 0x1, "65cb4956c52e3281"}}) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f00000001c0)) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) epoll_create1(0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ssse3\x00'}, 0x58) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00009b2000/0x18000)=nil, &(0x7f0000001580)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400090000006766c7442404020000006766c744240600000200670f011c240f20c066352000000a0f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000001500), 0x243) 18:29:45 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000000)={0x8, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\t', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 846.293829][T29505] JFS: Cannot determine volume size [ 846.300180][T29505] JFS: discard option not supported on device [ 846.311764][T29505] JFS: Cannot determine volume size [ 846.347185][T29505] jfs: Unrecognized mount option "discard [ 846.347185][T29505] 0x0000000000000008" or missing value 18:29:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xd000000, 0x0) 18:29:45 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) recvfrom$x25(r1, &(0x7f0000000280)=""/242, 0xf2, 0x20, &(0x7f0000000040)={0x9, @remote={[], 0x1}}, 0x12) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000140)={{0x0, 0x5, 0xb91, 0x100, 'syz0\x00', 0x7}, 0x4, 0x0, 0x1, r0, 0x1, 0xffffffffffffffff, 'syz1\x00', &(0x7f0000000000)=[':-@selinux\x00'], 0xb, [], [0x0, 0x5, 0xffff, 0xe3d9]}) [ 846.422617][T29520] FAULT_INJECTION: forcing a failure. [ 846.422617][T29520] name failslab, interval 1, probability 0, space 0, times 0 [ 846.435875][T29520] CPU: 1 PID: 29520 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 846.445119][T29520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 846.455187][T29520] Call Trace: [ 846.458501][T29520] dump_stack+0x172/0x1f0 [ 846.462872][T29520] should_fail.cold+0xa/0x15 [ 846.467487][T29520] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 846.473331][T29520] ? save_stack+0xa9/0xd0 [ 846.477685][T29520] ? __es_tree_search.isra.0+0x1bf/0x230 [ 846.483360][T29520] __should_failslab+0x121/0x190 [ 846.488335][T29520] should_failslab+0x9/0x14 [ 846.492879][T29520] kmem_cache_alloc+0x47/0x710 [ 846.497669][T29520] ? ext4_es_scan+0x6f0/0x6f0 [ 846.502355][T29520] ? do_raw_write_lock+0x124/0x290 [ 846.507474][T29520] __es_insert_extent+0x2cc/0xf20 [ 846.512564][T29520] ext4_es_insert_extent+0x2b7/0xa40 [ 846.517871][T29520] ? ext4_es_scan_clu+0x50/0x50 [ 846.522751][T29520] ? rcu_read_lock_sched_held+0x110/0x130 [ 846.528497][T29520] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 846.534771][T29520] ? ext4_es_find_extent_range+0xff/0x600 [ 846.540522][T29520] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 846.546094][T29520] ? ext4_rereserve_cluster+0x240/0x240 [ 846.551650][T29520] ? ext4_find_extent+0x76e/0x9d0 [ 846.556695][T29520] ? ext4_find_extent+0x6a6/0x9d0 [ 846.561735][T29520] ext4_ext_map_blocks+0x216a/0x4e50 [ 846.567537][T29520] ? ext4_ext_release+0x10/0x10 [ 846.572419][T29520] ? lock_acquire+0x16f/0x3f0 [ 846.577114][T29520] ? ext4_map_blocks+0x3fd/0x1a00 [ 846.582194][T29520] ext4_map_blocks+0xebb/0x1a00 [ 846.587083][T29520] ? ext4_issue_zeroout+0x190/0x190 [ 846.592316][T29520] ? kasan_check_write+0x14/0x20 [ 846.597281][T29520] ? __brelse+0x95/0xb0 [ 846.601458][T29520] ext4_getblk+0xc4/0x510 [ 846.605800][T29520] ? ext4_iomap_begin+0xfe0/0xfe0 [ 846.610850][T29520] ? ext4_free_inode+0x1450/0x1450 [ 846.615990][T29520] ext4_bread+0x8f/0x230 [ 846.620251][T29520] ? ext4_getblk+0x510/0x510 [ 846.624868][T29520] ext4_append+0x155/0x370 [ 846.629317][T29520] ext4_mkdir+0x61b/0xdf0 [ 846.633692][T29520] ? ext4_init_dot_dotdot+0x520/0x520 [ 846.639112][T29520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 846.645381][T29520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 846.651733][T29520] ? security_inode_permission+0xd5/0x110 [ 846.657469][T29520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 846.663723][T29520] ? security_inode_mkdir+0xee/0x120 [ 846.669118][T29520] vfs_mkdir+0x433/0x690 [ 846.673375][T29520] do_mkdirat+0x234/0x2a0 [ 846.677719][T29520] ? __ia32_sys_mknod+0xb0/0xb0 [ 846.682598][T29520] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 846.688090][T29520] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 846.694179][T29520] ? do_syscall_64+0x26/0x610 [ 846.698865][T29520] ? lockdep_hardirqs_on+0x418/0x5d0 [ 846.704174][T29520] __x64_sys_mkdir+0x5c/0x80 [ 846.708773][T29520] do_syscall_64+0x103/0x610 [ 846.713375][T29520] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 846.719288][T29520] RIP: 0033:0x457247 [ 846.723204][T29520] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 846.742823][T29520] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 846.751681][T29520] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 846.759659][T29520] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 18:29:45 executing program 0: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'rose0\x00', 0x400}) clone(0x2013102001ff0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x29, r1, 0x2, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f00000001c0)=""/164) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) ioctl$KVM_GET_DIRTY_LOG(r3, 0x4010ae42, &(0x7f0000000180)={0x10201, 0x0, &(0x7f0000ffc000/0x3000)=nil}) [ 846.767668][T29520] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 846.775659][T29520] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 846.783649][T29520] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:46 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x43, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:46 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\n', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:46 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) write$FUSE_GETXATTR(r1, &(0x7f0000000000)={0x18, 0xffffffffffffffda, 0x4, {0x9}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ip\x01\x00\x01\x00s/lblc\t_expiration\x00Z\x86)&\xc0 m\xf9fu\xd0\xf7\xceY\x91\xea\n\x80t@@\xd7\x84A\x05\x88\xfb3\xb7\xb4Dk;c\xc7_\xad\xb6\xdds\xaa\xd6s\xd2\xc9\xf4\xe1\x9d\x94p\xca\xd2\xdcz\x8d\xa9\xae\xe2c\x11\x9d\x00&m\xed\xef\xd1\xc9\xdf\xca<\xf2\xda\xbc=\v(\xd7\xbb\x84\xe8\xccG\a\xabQ\xa8\"AE\x8a\xa7\xf2\xac\'\xb1\xfb/\xfa\x81\a\xcd\x11Dv.\xcb\xf4\x03\xfd\xf6\x7f\xe3?C\'\f\x96\xaf\xbe\xe1\xb1d\x04L\xeat\xae\xf6\xa4\x0fL\xfe\xcd`\x05\n\x1f\xa2MB\xa8\x8e\xcc\x7fq\xa7\xee\x1b\xa1\xa3\xbe\x1d\x03\xbc\xb8H\xed4P\xbbk\x81\xd2\x9f\x93t\xfe\xf4\x0em`\x90\x13\xe0\x87\n\xc6\x0e\xb0\x02t\xcc\xdc\x16\xb9\x835\xcc\xf5\x16\xc4\xfc\xd1j\xee\xdf\xed\xe7:E\'\xd0\xdb\x86\a\xb3O\x8d\xa3$\x96\x05\x15<\xd6\x9cC\xd3\x97e\x01\xc6\x1c\xaf\f\xb80(!\xb2\xe8\x1b\xcc\xbb:\xbe\x19Q\xba\x058\v2\xca\x9c\x1b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) mremap(&(0x7f00007c0000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000054000/0x2000)=nil) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000440)) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'tunl0\x00', &(0x7f00000000c0)=@ethtool_modinfo={0x42, 0x790f3677, 0x1, "65cb4956c52e3281"}}) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f00000001c0)) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) epoll_create1(0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ssse3\x00'}, 0x58) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00009b2000/0x18000)=nil, &(0x7f0000001580)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400090000006766c7442404020000006766c744240600000200670f011c240f20c066352000000a0f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000001500), 0x243) [ 847.035263][T29527] XFS (loop4): Invalid superblock magic number [ 847.060932][T29543] JFS: Cannot determine volume size [ 847.092884][T29543] JFS: discard option not supported on device [ 847.160456][T29543] JFS: Cannot determine volume size 18:29:46 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 847.213024][T29543] jfs: Unrecognized mount option "discardC0x0000000000000008" or missing value 18:29:46 executing program 3 (fault-call:0 fault-nth:29): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x10000000, 0x0) 18:29:46 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x0e', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:46 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x63, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:46 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x3, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ptrace$setopts(0x4200, r0, 0x3f, 0xc) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f0000000000)={0x1, {0x0, 0x989680}, 0x4, 0x9}) 18:29:46 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x200000, 0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r3 = getpgid(0xffffffffffffffff) syz_open_procfs(r3, &(0x7f0000000140)='attr/keycreate\x00') fcntl$setstatus(r2, 0x4, 0x44002) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r4, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x8, 0x1, 0x0, r2, &(0x7f0000000000), 0x200a00}]) r5 = socket$inet(0xa, 0x801, 0x84) connect$inet(r5, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r5, 0x8) r6 = accept4(r5, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x9}, 0x34e) shutdown(r6, 0x1) accept$alg(r1, 0x0, 0x0) r7 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_inet6_udp_SIOCOUTQ(r7, 0x8902, 0xfffffffffffffffe) recvfrom$netrom(r7, &(0x7f0000000000)=""/27, 0x1b, 0x40000100, &(0x7f0000000040)={{0x3, @null, 0x5}, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default]}, 0x48) 18:29:46 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$UDMABUF_CREATE_LIST(r1, 0x40087543, &(0x7f0000000000)={0x0, 0x6, [{r1, 0x0, 0xfffffffff0000000, 0x8000}, {r2, 0x0, 0x1000000001000, 0x4000}, {r1, 0x0, 0x8000, 0x1000000000000}, {r1, 0x0, 0xfffffffffffff000, 0x100000000}, {r1, 0x0, 0xfffffffff0010000, 0xfffffffff0000000}, {r1, 0x0, 0x10000fffff000, 0xfffffffffffff000}]}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) dup(r2) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 847.451760][T29566] JFS: Cannot determine volume size [ 847.459401][T29566] JFS: discard option not supported on device [ 847.482892][T29566] JFS: Cannot determine volume size 18:29:46 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)={0x0, 0x0}) migrate_pages(r0, 0x2, &(0x7f0000000080)=0x8, &(0x7f00000000c0)) r1 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 847.501290][T29566] jfs: Unrecognized mount option "discardc0x0000000000000008" or missing value [ 847.514973][T29563] XFS (loop4): Invalid superblock magic number [ 847.552584][T29583] FAULT_INJECTION: forcing a failure. [ 847.552584][T29583] name failslab, interval 1, probability 0, space 0, times 0 [ 847.566356][T29583] CPU: 0 PID: 29583 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 847.575487][T29583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 847.585576][T29583] Call Trace: [ 847.588896][T29583] dump_stack+0x172/0x1f0 [ 847.593254][T29583] should_fail.cold+0xa/0x15 [ 847.597866][T29583] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 847.603689][T29583] ? ___might_sleep+0x163/0x280 [ 847.608557][T29583] __should_failslab+0x121/0x190 [ 847.613510][T29583] should_failslab+0x9/0x14 [ 847.618040][T29583] kmem_cache_alloc+0x2be/0x710 [ 847.622908][T29583] ? rcu_read_lock_sched_held+0x110/0x130 [ 847.628650][T29583] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 847.634961][T29583] ? __mark_inode_dirty+0x241/0x1290 [ 847.640280][T29583] ext4_mb_new_blocks+0x5a8/0x3c70 [ 847.645439][T29583] ? __lock_acquire+0x55d/0x4710 [ 847.650389][T29583] ? ext4_find_extent+0x76e/0x9d0 [ 847.655438][T29583] ext4_ext_map_blocks+0x3094/0x4e50 [ 847.660741][T29583] ? ext4_ext_release+0x10/0x10 [ 847.665600][T29583] ? find_held_lock+0x35/0x130 [ 847.670406][T29583] ext4_map_blocks+0x8c5/0x1a00 [ 847.675304][T29583] ? ext4_issue_zeroout+0x190/0x190 [ 847.680546][T29583] ? kasan_check_write+0x14/0x20 [ 847.685510][T29583] ? __brelse+0x95/0xb0 [ 847.689712][T29583] ext4_getblk+0xc4/0x510 [ 847.694071][T29583] ? ext4_iomap_begin+0xfe0/0xfe0 [ 847.699110][T29583] ? ext4_free_inode+0x1450/0x1450 [ 847.704237][T29583] ext4_bread+0x8f/0x230 [ 847.708485][T29583] ? ext4_getblk+0x510/0x510 [ 847.713086][T29583] ext4_append+0x155/0x370 [ 847.717519][T29583] ext4_mkdir+0x61b/0xdf0 [ 847.721877][T29583] ? ext4_init_dot_dotdot+0x520/0x520 [ 847.727274][T29583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 847.733557][T29583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 847.739839][T29583] ? security_inode_permission+0xd5/0x110 [ 847.745589][T29583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 847.751847][T29583] ? security_inode_mkdir+0xee/0x120 [ 847.757144][T29583] vfs_mkdir+0x433/0x690 [ 847.761421][T29583] do_mkdirat+0x234/0x2a0 [ 847.765765][T29583] ? __ia32_sys_mknod+0xb0/0xb0 [ 847.770637][T29583] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 847.776118][T29583] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 847.782212][T29583] ? do_syscall_64+0x26/0x610 [ 847.786945][T29583] ? lockdep_hardirqs_on+0x418/0x5d0 [ 847.792259][T29583] __x64_sys_mkdir+0x5c/0x80 [ 847.796866][T29583] do_syscall_64+0x103/0x610 [ 847.801471][T29583] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 847.807363][T29583] RIP: 0033:0x457247 [ 847.811270][T29583] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 847.830880][T29583] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 847.839303][T29583] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 18:29:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x14', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 847.847289][T29583] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 [ 847.855268][T29583] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 847.863251][T29583] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 847.871237][T29583] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:47 executing program 0: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x25) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000000)=0x1ffc00000000000) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:47 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x9}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:47 executing program 3 (fault-call:0 fault-nth:30): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x12000000, 0x0) [ 848.147707][T29610] FAULT_INJECTION: forcing a failure. [ 848.147707][T29610] name failslab, interval 1, probability 0, space 0, times 0 [ 848.160581][T29610] CPU: 0 PID: 29610 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 848.169705][T29610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 848.179778][T29610] Call Trace: [ 848.183115][T29610] dump_stack+0x172/0x1f0 [ 848.187476][T29610] should_fail.cold+0xa/0x15 [ 848.192098][T29610] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 848.197922][T29610] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 848.203648][T29610] ? __es_tree_search.isra.0+0x1bf/0x230 [ 848.209323][T29610] __should_failslab+0x121/0x190 [ 848.214277][T29610] should_failslab+0x9/0x14 [ 848.218817][T29610] kmem_cache_alloc+0x47/0x710 [ 848.223600][T29610] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 848.229342][T29610] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 848.234834][T29610] ? ext4_es_scan+0x6f0/0x6f0 [ 848.239549][T29610] ? do_raw_write_lock+0x124/0x290 [ 848.244685][T29610] __es_insert_extent+0x2cc/0xf20 [ 848.249733][T29610] ext4_es_insert_extent+0x2b7/0xa40 [ 848.255039][T29610] ? ext4_es_scan_clu+0x50/0x50 [ 848.260277][T29610] ext4_map_blocks+0xb7b/0x1a00 [ 848.265150][T29610] ? ext4_issue_zeroout+0x190/0x190 [ 848.270379][T29610] ? kasan_check_write+0x14/0x20 [ 848.275333][T29610] ? __brelse+0x95/0xb0 [ 848.279521][T29610] ext4_getblk+0xc4/0x510 [ 848.283906][T29610] ? ext4_iomap_begin+0xfe0/0xfe0 [ 848.288967][T29610] ? ext4_free_inode+0x1450/0x1450 [ 848.294120][T29610] ext4_bread+0x8f/0x230 [ 848.298387][T29610] ? ext4_getblk+0x510/0x510 [ 848.303001][T29610] ext4_append+0x155/0x370 [ 848.307432][T29610] ext4_mkdir+0x61b/0xdf0 [ 848.311774][T29610] ? ext4_init_dot_dotdot+0x520/0x520 [ 848.317173][T29610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 848.323436][T29610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 848.329704][T29610] ? security_inode_permission+0xd5/0x110 [ 848.335458][T29610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 848.341719][T29610] ? security_inode_mkdir+0xee/0x120 18:29:47 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$dupfd(r1, 0x406, r1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 848.347033][T29610] vfs_mkdir+0x433/0x690 [ 848.351301][T29610] do_mkdirat+0x234/0x2a0 [ 848.355644][T29610] ? __ia32_sys_mknod+0xb0/0xb0 [ 848.360506][T29610] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 848.365995][T29610] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 848.372087][T29610] ? do_syscall_64+0x26/0x610 [ 848.376784][T29610] ? lockdep_hardirqs_on+0x418/0x5d0 [ 848.382103][T29610] __x64_sys_mkdir+0x5c/0x80 [ 848.386731][T29610] do_syscall_64+0x103/0x610 [ 848.391354][T29610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 848.397263][T29610] RIP: 0033:0x457247 [ 848.401170][T29610] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 848.420780][T29610] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 848.429209][T29610] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 848.438667][T29610] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 [ 848.446680][T29610] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 848.454662][T29610] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 848.462639][T29610] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 [ 848.501282][T29606] JFS: Cannot determine volume size [ 848.506519][T29606] JFS: discard option not supported on device [ 848.529368][T29606] JFS: Cannot determine volume size [ 848.541233][T29606] JFS: discard option not supported on device 18:29:47 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000380)={{{@in=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000480)=0xe8) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2840000, &(0x7f00000004c0)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@nodevmap='nodevmap'}, {@access_uid={'access', 0x3d, r2}}, {@cache_fscache='cache=fscache'}], [{@func={'func', 0x3d, 'PATH_CHECK'}}, {@hash='hash'}, {@uid_eq={'uid', 0x3d, r3}}, {@fsmagic={'fsmagic', 0x3d, 0x20}}]}}) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f00000000c0)="e22c15326eddb8cd6cdc82cd594e7fdbcef3f75148806679215d64287cdb43bff6e79f6b328de75568ff9480b1e7cb37c2364d505b20e3681c0a4b0265c1f370e63a8f0f02e90c4fdfc162e936905171df6b06a5e3e8a70f6941a7d7285bd06806f06f891460b23c847cb9f266d016bf3eeae55f313072a541f109ae4dee2fd5196ac61e11e82c3836e656ff0300f541e858249b19b7f6b6f87462cf1d8551a65bd773b43058a66fdca56d271455c3ab6f88a43295f084cfd0b0264536608aac68220d7a6991e7") setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000080)={0x82500, 0x0, 0x0, 0x200000000, 0x7}, 0xc) [ 848.561113][T29606] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 848.600357][T29714] XFS (loop4): Invalid superblock magic number 18:29:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat#', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:47 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(r1, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:47 executing program 3 (fault-call:0 fault-nth:31): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:47 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) r2 = shmget(0x0, 0x4000, 0x10, &(0x7f0000ffa000/0x4000)=nil) getresuid(&(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f0000000080)) getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0xee00, 0x0]) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) getgroups(0x5, &(0x7f0000000280)=[0xee00, 0xee01, 0xee00, 0xffffffffffffffff, 0xee01]) shmctl$IPC_SET(r2, 0x1, &(0x7f00000002c0)={{0xff, r3, r4, r5, r6, 0x4, 0xffff}, 0xe9, 0x2, 0x101, 0x628, r0, r0, 0x1b9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ptrace$cont(0x1f, r0, 0x0, 0x0) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000340)=ANY=[@ANYBLOB="000800000000000004000000000000001f000000000000000600000000000000050000000000000003020409000000000000000000000000000000000000000000000000000000000000000000000000010000000100000000000000000000003579000000000000040601050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cd0e00000000000001000000000000005e010106000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000081000000000000000000010000000000006b6108000000000000000000000000000000000000000000000000000000000000000000000000"]) [ 848.791874][T29744] FAULT_INJECTION: forcing a failure. [ 848.791874][T29744] name failslab, interval 1, probability 0, space 0, times 0 [ 848.804608][T29744] CPU: 1 PID: 29744 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 848.813718][T29744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 848.813725][T29744] Call Trace: [ 848.813749][T29744] dump_stack+0x172/0x1f0 [ 848.813772][T29744] should_fail.cold+0xa/0x15 [ 848.836069][T29744] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 848.841904][T29744] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 848.841920][T29744] ? __es_tree_search.isra.0+0x1bf/0x230 [ 848.841940][T29744] __should_failslab+0x121/0x190 [ 848.841959][T29744] should_failslab+0x9/0x14 [ 848.841976][T29744] kmem_cache_alloc+0x47/0x710 [ 848.841990][T29744] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 848.842011][T29744] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 848.878668][T29744] ? ext4_es_scan+0x6f0/0x6f0 [ 848.883378][T29744] ? do_raw_write_lock+0x124/0x290 [ 848.883401][T29744] __es_insert_extent+0x2cc/0xf20 [ 848.883426][T29744] ext4_es_insert_extent+0x2b7/0xa40 [ 848.893588][T29744] ? ext4_es_scan_clu+0x50/0x50 [ 848.893621][T29744] ext4_map_blocks+0xb7b/0x1a00 [ 848.893645][T29744] ? ext4_issue_zeroout+0x190/0x190 [ 848.903766][T29744] ? kasan_check_write+0x14/0x20 [ 848.903780][T29744] ? __brelse+0x95/0xb0 [ 848.903802][T29744] ext4_getblk+0xc4/0x510 [ 848.903820][T29744] ? ext4_iomap_begin+0xfe0/0xfe0 [ 848.903841][T29744] ? ext4_free_inode+0x1450/0x1450 [ 848.903862][T29744] ext4_bread+0x8f/0x230 [ 848.913885][T29744] ? ext4_getblk+0x510/0x510 [ 848.913911][T29744] ext4_append+0x155/0x370 [ 848.913940][T29744] ext4_mkdir+0x61b/0xdf0 [ 848.923062][T29744] ? ext4_init_dot_dotdot+0x520/0x520 [ 848.923080][T29744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 848.923093][T29744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 848.923112][T29744] ? security_inode_permission+0xd5/0x110 [ 848.923130][T29744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 848.923143][T29744] ? security_inode_mkdir+0xee/0x120 [ 848.923164][T29744] vfs_mkdir+0x433/0x690 [ 848.932506][T29744] do_mkdirat+0x234/0x2a0 [ 848.932526][T29744] ? __ia32_sys_mknod+0xb0/0xb0 [ 848.932554][T29744] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 848.932574][T29744] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 848.932597][T29744] ? do_syscall_64+0x26/0x610 [ 848.941955][T29744] ? lockdep_hardirqs_on+0x418/0x5d0 [ 848.941976][T29744] __x64_sys_mkdir+0x5c/0x80 [ 848.941996][T29744] do_syscall_64+0x103/0x610 [ 848.942016][T29744] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 848.942028][T29744] RIP: 0033:0x457247 [ 848.942044][T29744] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 848.942052][T29744] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 849.072443][T29744] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 849.080436][T29744] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 18:29:48 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ioctl$KVM_SET_NESTED_STATE(r1, 0x4080aebf, &(0x7f0000000140)={0x1, 0x0, 0x2080, {0x10000, 0x5000, 0x3}, [], "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", "b7b8d5532476a9da766b1f0b925099f4c7cbb79f1b7ba1386772b6a9f6484567ed6f94f7828e5dcc985c313277f9c61725b271b7b0ea1c9e8dd1f8f77eb5e1a482b7ca9923c3138c6ebf9463b1b5439cab730a09cbbb3323352df71319dfc9f2dfafd86c2cb2c90ee799a4fe8f22f25b91e9117bd7d7e8eca4c6dd2a15c2b966cada35f5c915c46a79698d2fb60f452bf941e51144207b9d793983466c3cc3259747c8fc8b88012e330932f3fac7112d477c02014bedab50d113a3377b0d7451d26b9c836db75a672fc28ab99d6c6920961909eaa732aa4eb2beeea4246ca44e68fc9285791d6c18199b98b30bd220d5a24f3a44643ba0ec18847ef3bbcbc63cc432a565317baf021ef7c55cd6b713114016e2b1593c7f282eeb8bce05132f6cc5d045d718826a0bfb9208856a35207aae00b0e132c189b57de01ac6600b413adb0ba23b7306de74bc941f7aa5407b782168971346ab5244185edd416c9ca5cafabc66bb88ea9c55969141c8f7e98c81cce9c0513d5091b1c120487712c4c9868101954bf9d50564a623eb8e9d7c7c1ce624a33b44788f29066c42ad6e7b5c0943e1853d2aa1d53061a31a4ecef2dc00d142634a3dbd11c1e6a8876eadee6272f1243ff9b710bbea1720d63884b5c5c48832c1e0225ada13e8abaa4bf7aa0cc553b565fd566f8f2b7fb5392362ff311c040d9e5f528d51277651085cbce0b4bfaadcc36d4e4aed812677b48d0f32aa05c8d34efd13c60f65a8441f09dd4861bc1a973dc4f930c8036c68fbe97b70fb54a83d2e2a3aabf5c87a676c898030b4cc1f2658e8aa42e935bbcf069149cee48ce1220d8c1cc7223afa9cc6a283068b3330f7bcbb89f085c8b0376a709105906c96b25c81372a2304c84d3a37113c5179f060e142e09a1c290df252bf70d9dcef38f2b84536157392359e1b6a437f20ffd4b1bec7fe5705fee99ad0f462b218087d4eeb51f85dc40b5d59b7342e97e5bbb0aaaf8ffd06ccf95a8aa617919f49f45c039f16d1a0fd5fb0f54bebfb3e1c909ebe288af5e6c4537d75db605a3cd5060738c6aa1ed20c086402fca5602624c964cd0929e854bb8531a9450324ce0efb3cadde0e5afa9abe94c9ae2f9a83847d716456bbb56e2d3f2833fdbd764668f8d52482e5f7a47f7bc15b0c205620be64513bc3a847a7c40f63121b785ba006561c596abc244a2e01b939c2c25c100ba8bf86883e08ccca4131c0f99c5a9618cc4a13a915f80918b4b43c066f84c172563ddc897503a2361f96d0d2a56d32b6ff79a141130469509a0a27b9b3cbb113b8fbda2d2b4c158a30275418c1abbff842676bc40573509c1d5cc7dc3d91077c13c4e309733c94b35b9c9f21ae1dba19b1a470fbecdf8eb78d19a202b8dc5b25caf6f14f98ecd604a3839c83e967775a03b542f96c03840fcac0c02349dcb74619e78c76f04cf3026eac7f51ca983c27f60cc71746e7fa15a22db817f2f18741ff207ba6961e15e4b2df6b0233e560480caf324579158f8215ead27ef568820bbbad3b21d95586cffe30fb7e6e20873cc271f09b153598cf3a606c6fd8581060b033dfc6b90611cb54786dc7d2f50715d37b0d849b041732738551cad6e5bb53336487d7a346c00c841cb02582e07f151b946c06c420f96ab087035a52d621fed625d289ec55ed9f0b6911b80382af3ef4db08664af36f4f84cdedf79cc736f2283a24274ef5f9194d55c6376d42217413c52164409d5f987ba8d7d633eb6f330a1285b3dc87fcb7c4806b627291b84a5ebdae3785ae60693a419e06c76888772fb4730af8c40982f96590b485fbf5bfc367d2dd6e4e11fe60c864b37f627df7d8a0bb57144db4f3702dd3cfa8923b7c9d03bf9178371b7595a82b57fd7101f0e6cbd8bd3a5fd9e3ff8bc532d8323e8913f473e63fab618f34012ca0de954551a1907b1a8469f01e00e3a56f94a6660c9c5d11ed21b3a1d0601e279d615579848738d2c8390a31565aa6830e401c4db42957e66dcf47c63ccedf28d17ca29ee4675657144d6ce508cec2a27cb6f3dc781a2f908ead3784ef59452cd315138d57fd7b63466e16bdb08144c68a5132df023c3ce3391f570dadcd895c36bb2fb578b2ef4f9668e3d37f2f4c7b7c4365a26eadab5398b846d796c2ec3a1f2e24a5704538ebda849a3891908f5a5fb18760cbdf9a79787d486127dfc041cd458d780884a671461903026c9bffe913d13a7b2e9b489ca837a204410d132f8cab03b806728f52587e4e3bbef9312c14be75cc04a529c544c1bf6fa4a3bfae0f0f907857719f6a643333aed03cb352f7381abd3b5d69a7c2017e7f924bb9fb98611be7662c1804a70c379754afcc215b83c19e8634b97d4bdec98c47412c247877c32808616479bfc25517c56cc95e97f104df615557f26d49e53b1f693a327bd4c6538cabf9f64995bf02d967c70cfec81c2960d30bffff4b86483035d20f9c6f0d861266c4138780e06492ca7dafde163b45d00c1ef513b6624d840632a6ce53656378947f3540eea5e5e300d3a53da1dd63994b4d9f35cdf3eabd5e7e86f627e879890503c2c86e7661ae7da6f7af1067028bcda50bb2e4799c7d1572d51cfe406d864021fc792f335ac9c27976a21e644e16c321c6d807deb876009738f37c47ecfcb91934bd09ca4268093474340b044f3cbf437dd8b344320e98a067d259b51295dc19c0bc0fb572f0bf1f88a42b9c988469eca97cde27ac2cfdda231fcd84b184510c77b7aab8ac8bd2065ffdaab54c3cfcd54bb96b24e54bc7996a3c2d365580f1d17176d73a043c030eaac6213bd2f0eabce717fc378f63f88f646e5442a0b098a5d339097ddda2d7b8e14fb9bdc1af6a4d32e3ce461c3371f24f2b80b41fac276432427f9b6a1b47a9ae5cc12fdd7da8240ee37773953f292ca7ba512e356114af940e4b8ba46c012409d72907eab6c5e93ce1207b242e38d9dcb3dec5dfb47a1c3b7495b7f8cbc991ef1982a1af1b3294bab4bf07ca1db5fc98a4c6c3d4944faefb4b733f6f48055af7ea7add12cc973392b1056af221284a02b9c2830dd3e2318a97dbb5b0cd0d82b3380cd5e4adde79c2f85e13f77f03efac34a8e3a20a13bc4427ca1ae6a55e29eee1959a8957ae165138761a5c504b81166f8d230dbddb663a7eed19f521ff1990a257ea72b3e9999373f556cd4ff5ffa70be208a2ff08ee64f34f948b3f2f19ebe730f2c8d56a15f1b20295c41ecffb315912e2c52314e30cf438e60c88fdd08a402f6016750319d17c28bbbbd3567924832314bc88779f6ea3a37a4cfc06362b70d77a8e096c14afe09494bcd93f10c179e4af1a517bd970bdc2850deeace7b7f3ee2396ecd26f30f1d6e23cfffe6f5f427ee51a439a67d5a85aa5eacaf05b3a39812a5d20e2eee4c93e5efccdc78b511fd2f46617cf59fc002866186fc820f91320c40fdb79eee36e107732c640e39fb279795b25cedaf2f22cb9dcb9f87991cb99f6fa662bda944c068391e63d971d6b2982974370e2d35a03b9826584bfb62174dd5fcc01593fedc21f278dc167ebe958697f4ecdaa55a22867468c6f7ea3d2a77a8d0cebb16a431bfbc189195339b96ce27719e2e1cd9c6aae2197252ef9dc0e5e1ec2f85f9c77191d31d322670db77685e007467590a8b62cf7bfe2004046bff605a6445eb76ada32de458c6aa480b2782a27ae404db85d7136939221607b36a65e849eadbc3f03deb97fe1fb1338a80ecfbd5005b2af8d40fe83a9accc20715b63c368a94b4c1cefe413f798168b68b78b72d076fc2f55e2cafef2d1637b26bdab2b010c3b1c7c4c955148a5d3d7d9007989f7b46278260943fc572ffc215428958db9898fb2f9f6d692b6911d588f6e8a49152725078b75cb9641358198483b4e2e770294d9c4f5daabb0877978a581b142fe8bf01ba273ed3510759ff7bf3c175dc88fa2b4b620e74a7c1cb34bb64a85a1c830d9355e01a120b20835ce54f6392630331944b6c6fe6d193b9e86001b1cfa2833de89910e3f31ecb20a64a1e839caa0d9e885ff837cecbe890b224e61f50d95a95206ff66710e5e7852d4737a4d953da0f2504e2290068fc47a725dfcc97367aba2f5261067b64f6c3c4398be83d2d72281da6a491455fccd30ef352ee3db62d64ceec768ecea492208ed05f6c0f7877f5691c311bc090fb44a472a400f260572c9fda1893b42390098c2fa6fed4cf928a6395b6209416cb7717b076e6c30f58f31ea57e3c0c7eef0ca9f82ec8e6c38f9f06465884293229354548dae531d887303bc3fdd64a2cbaa9a9a3db45c2a31e1fa0193d53a2d19af2719711b61e638ba81ce6d93d9e0c30de74c42b1b0b07c5c7cdfb8efe8dfb7cf735e50eb3aaa09038e1dfd392c832ccf5c12645fe81d536820a0a9b99c0098d89c62ce21370674f67b10ed4610ec6a615cb39ddc6de1bfffec6d02c0ef8b619731bfb6ea942f760a3c5cff70b9b53588a088d17cbec2d20423bb1357e3891e5d23b3c979c6c94767ca38076108f6553c13efe53ad4283a19412621a5ad7955eda3ba65301e6f38d437b403faa54f2a6f2f81ee89c4add3c2b2cddc5a091c3e4c3840d0ca2d3d51acd733795ae5b2ee38d8e3d66a32d4d941db4ed93bf6b75f047b32560d5f5ee33529464730873564850e7a1138da5529c38f7f09d52ead479f81739ab63e54de945a200bd6d1925c16d17b4206a81b6fc76c7ac444258f71e16576baccfac6d8a164085584852a143867bc999e19b1ac9ddc5212d8e4dc0ba547029315a2e6a94483c31496efac7538d05b9fe67eff9517aa3231d4908c081dad13fd227e361198354a6fa4e0a193966685b6f011c462904ff223feddd2f0d30fa0a4ed76e6f5b08eb4c95289d03b29c1c59b024467a330eccabb834ec680615f6251db4869d18c20418d92b30cf1a8c21635b2c65b0f2b2586d693013413a4e28d7db7fc2c5975b7d8dd431159887b90d1ff539d0460d387427d8dafe2801f280d11b94594ab2530a3b7c6263fda68f181291705e6dd3ac6ec57033996e9aecd39bb215ee0c7f2c13108441868ade0617ce38802387c84cdb58214183e49ce91d8eaae369eaaa1b1c45d850b14803b81e863493932bfc906ca909717a8be698df46bedbca124b05a1c30767bb086a54085b6f03fd4c8a34616984ec4085b9d51427600ccb7ba17e617c50ab4549aef69efc4aed3fa938e78ee395883977107f4b671f09a1ac8f1ad4c2c4f810aa24de573008d0bca4f1651376d665321a9d88b90e7d308b95d1f41d910cc70b828dd14fc3fbfbc0769befa22017c1e14a423677901c9e23c664b8724f6904936bdb42db4093b7acf307c31ca30c0cd30b6ac2e594bc51de56c2b0b8ea48584051f940f0d48e5e280aeed4c514865407b2d7d2257b247863dbb15eecae7fd5364061830bbc27fce32a279bf9d8c126157b4e621314710c654e454b8461068c7067621b167421c8310e086ef8bff543c6b18fc6ed7f6c2a81d68e80f4dfa17cd7c2ecce49f2d4542e565b42f63f25f23c34f0819da3cf5441e6822c451ed6ae1211e2c1994491f1c3c7e2692aa5beb9a2636006624bcbf74ab9cf796cd72bf8398d0d9c48e558aa147b7a443bf25102c8cb0ea507988a374b50ed2d965ce5c12c85a79332a7665d29ed0075172aea15978d6d5f0121ebdf5ce9f9f086ac6e21eb1ab0ba91d6a128d45cdb53eab22d4633a09cc55d1a17f22707fbf31fa1cb99109597872c95b8f2cc01558f5c712f24c05677ef760e9904fb30c"}) openat$cgroup(r2, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:48 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0xa}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:48 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21, @remote}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f00000f5ffc)=0xffffffff00000003, 0x254) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e21, @empty}}, 0x5, 0x2}, &(0x7f0000000000)=0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r3, 0xff, 0x40, 0x0, 0x101, 0x4}, &(0x7f0000000180)=0x14) bind$inet6(r1, &(0x7f0000710fe4)={0xa, 0x4e21}, 0x1c) r4 = socket(0x10, 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp6\x00') sendfile(r4, r5, 0x0, 0x80000002) [ 849.088426][T29744] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 849.096423][T29744] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 849.104395][T29744] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) 18:29:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x14000000, 0x0) 18:29:48 executing program 0: clone(0x13102801fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x10, &(0x7f0000000000), &(0x7f0000000040)=0x4) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000240)="17d30a7e97eefba886572ed5675034aeb62afb059fc08c2609d826e538a80ac7d1a3b085fd633e2dc0a235d8466605a92aefaf05044280bec7de30eaef3067ff1b61b7e8c96df6f23374a2c227658a6841025ece2f7b112cc6f712c17436a0c0b332f06f0669c8773c5955e972b493656e66acbbaa2b431d8cb5b61f167d63f5f36840c5b5c0f2b8885c188d42c24a7a8fb9a0c11a0d042c55367b026afba3de0588ef40555ead4a7186d1f79e6170db3ae1e409599d64488adf5632069482ab74e27b") removexattr(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600)=@known='com.apple.system.Security\x00') ptrace$cont(0x1f, r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000140)={0x0, 0xaf, "e9ee8edda4d924825eaecd2297009f03e6a3c9815133fa3bba59c56adc34ad78a804085f1c8261720b92a2c294f66131df7539649b46f8bd64a398b5cf5bb7c81f8fbec88398c3724a0a627cb7c4e2cc0e299312155b7ce8af2e0c1f4ca0174720c5909e4dcdbbea446dd31717d08fde8c15135a1c83efbd3f3206960ee6fdfb75bdf7917a2675b4d45a6310bb4ccbabfcade6df5f1da7d6dd95b4839b7f4005c947809bb347617b0117892bf3ce64"}, &(0x7f0000000080)=0xb7) sendmsg$nl_generic(r1, &(0x7f0000001580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20042000}, 0xc, &(0x7f0000001540)={&(0x7f0000000400)={0x1130, 0x31, 0x300, 0x70bd2d, 0x25dfdbfe, {0x7}, [@nested={0x28, 0x2f, [@generic="bf9c2b07c0414a2eea296e891438640ddc86c0a433a0838285870e5ecb9d", @typed={0x4, 0x37}]}, @generic="1b4c8a6b88e5a937ada929d17543f6bcef71c83cda637f5eded191700fbbae2ed2eb5961e19fe170bf3ac3dcfcb8cfb14745439ce063c210884f8cad9dd050e5be34", @generic="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", @nested={0xb0, 0x19, [@generic="49f639c138798156961acf9129a63bce2aeee81e991cb02a46ac1d2ef85ffe8dd2497bc35d731f5c2bd513489391a84737aa29f45d8ad5c19f4894af6eab56a18d537f92b827d709de9e", @typed={0x4, 0x3c}, @generic="f8c1c323349f603afaf544df35985fd899f815c0882957d18e4cb17d2551ce1e397f9c07992be591740ef54b5827fb34d1", @typed={0x28, 0xa, @binary="d4eeab848bd9163f2815889cb7c4df2a83149400b69096bbcaa46e270befc5cf11a4"}, @typed={0x4, 0x21}]}]}, 0x1130}, 0x1, 0x0, 0x0, 0x4040004}, 0x4000) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000340)={r3, 0x9d, "5480f3e6000246e24b697e2e17a5af4ce4fa7a3b287b27308fefd868c9f8d36259445f36c5fb733935b4150f7fbf6f02199131c8e0a7edfa814ad38e9af4157337587b71b71374b4bc21ffa8d4a7ae3283bf1f9c2667b8e128bc70073e2f0c5e0e9cd5d4413cefb7279a09cafb921364dfda46fb0c2e075e2ce8d4959608f7b7152d4b5b456f7dc4c6b2284e6caa820aa244380b56a6970aa19e75082b"}, &(0x7f00000000c0)=0xa5) 18:29:48 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfatH', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 849.301035][T29760] JFS: Cannot determine volume size 18:29:48 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x2) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000000c0)=0x1e) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:48 executing program 3 (fault-call:0 fault-nth:32): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 849.334478][T29760] JFS: discard option not supported on device [ 849.348640][T29760] JFS: Cannot determine volume size 18:29:48 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xfffffffffffffc00, 0x2102) getsockopt$inet6_int(r0, 0x29, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000000)={0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffff80}, 0xc) [ 849.389170][T29760] JFS: discard option not supported on device [ 849.416008][T29760] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 18:29:48 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() recvmmsg(0xffffffffffffff9c, &(0x7f0000006a80)=[{{&(0x7f0000000080)=@sco, 0x80, &(0x7f0000001400)=[{&(0x7f0000000140)=""/107, 0x6b}, {&(0x7f00000001c0)=""/10, 0xa}, {&(0x7f0000000200)=""/147, 0x93}, {&(0x7f00000002c0)=""/254, 0xfe}, {&(0x7f00000003c0)=""/44, 0x2c}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x6, &(0x7f0000001480)=""/129, 0x81}, 0x40}, {{&(0x7f0000001540)=@isdn, 0x80, &(0x7f00000025c0)=[{&(0x7f00000015c0)=""/4096, 0x1000}], 0x1}, 0x8b6}, {{0x0, 0x0, &(0x7f0000003700)=[{&(0x7f0000002600)=""/4, 0x4}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000003640)=""/190, 0xbe}], 0x3, &(0x7f0000003740)=""/54, 0x36}, 0xffffffff}, {{&(0x7f0000003780)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003800)=""/130, 0x82}, {&(0x7f00000038c0)=""/182, 0xb6}, {&(0x7f0000003980)=""/186, 0xba}, {&(0x7f0000003a40)=""/173, 0xad}, {&(0x7f0000003b00)=""/179, 0xb3}, {&(0x7f0000003bc0)=""/96, 0x60}, {&(0x7f0000003c40)=""/6, 0x6}], 0x7, &(0x7f0000003d00)=""/201, 0xc9}, 0x7df7ee6d}, {{0x0, 0x0, &(0x7f0000003e80)=[{&(0x7f0000003e00)}, {&(0x7f0000003e40)=""/14, 0xe}], 0x2, &(0x7f0000003ec0)=""/250, 0xfa}, 0x3}, {{&(0x7f0000003fc0)=@hci, 0x80, &(0x7f0000005540)=[{&(0x7f0000004040)=""/130, 0x82}, {&(0x7f0000004100)=""/77, 0x4d}, {&(0x7f0000004180)=""/148, 0x94}, {&(0x7f0000004240)=""/138, 0x8a}, {&(0x7f0000004300)}, {&(0x7f0000004340)=""/35, 0x23}, {&(0x7f0000004380)=""/123, 0x7b}, {&(0x7f0000004400)=""/4096, 0x1000}, {&(0x7f0000005400)=""/57, 0x39}, {&(0x7f0000005440)=""/199, 0xc7}], 0xa, &(0x7f0000005600)=""/4096, 0x1000}, 0x9}, {{&(0x7f0000006600)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000006840)=[{&(0x7f0000006680)=""/133, 0x85}, {&(0x7f0000006740)=""/248, 0xf8}], 0x2}, 0x2}, {{&(0x7f0000006880)=@alg, 0x80, &(0x7f0000006a40)=[{&(0x7f0000006900)=""/12, 0xc}, {&(0x7f0000006940)=""/213, 0xd5}], 0x2}, 0x5d}], 0x8, 0x2, 0x0) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000006c80)={0x1, 0x2, 0x3, 0x100000001}, 0x10) syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$setsig(0x4203, r0, 0x2, &(0x7f0000006cc0)={0x13, 0x1, 0xc1}) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) move_pages(r0, 0x4, &(0x7f0000003e00)=[&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil], 0x0, &(0x7f0000004300), 0x4) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:48 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x10}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 849.480998][T29871] XFS (loop4): Invalid superblock magic number [ 849.505006][T29886] FAULT_INJECTION: forcing a failure. [ 849.505006][T29886] name failslab, interval 1, probability 0, space 0, times 0 [ 849.518015][T29886] CPU: 0 PID: 29886 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 18:29:48 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x42, 0x3af) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000140)=0x8, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e21}, 0x10) recvmmsg(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x12001, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f00000006c0)=ANY=[@ANYPTR64, @ANYRESHEX=r0, @ANYRESOCT=r1, @ANYRES16=r0, @ANYPTR=&(0x7f0000000180)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="328d4fb28fc660386ee381dae3385b6811f010", @ANYRES16, @ANYRES64=r2, @ANYRESOCT=r2], @ANYPTR64], @ANYBLOB="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", @ANYBLOB="a670f97f3cd02373d2e5a5e3c6ad4e20c82506b629d60473481ef9c71832f9f237b198b97fba6824d984c38e5eaf062ce98406ab04292f56f3342835baab0f9969977f3211f565008d4793a1f0230fe414388a29c18c600100000071ce02cd7ad3c80c6070f0a6de431693b773623c633a16d45998b6532328e1fd3f2777661b7ab166d5a7"], 0x17b) socket$inet(0x2, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}, 0x4) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) [ 849.527141][T29886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 849.537209][T29886] Call Trace: [ 849.540530][T29886] dump_stack+0x172/0x1f0 [ 849.544898][T29886] should_fail.cold+0xa/0x15 [ 849.549497][T29886] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 849.555318][T29886] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 849.561040][T29886] ? __es_tree_search.isra.0+0x1bf/0x230 [ 849.566936][T29886] __should_failslab+0x121/0x190 [ 849.571896][T29886] should_failslab+0x9/0x14 [ 849.576415][T29886] kmem_cache_alloc+0x47/0x710 [ 849.581203][T29886] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 849.586947][T29886] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 849.592431][T29886] ? ext4_es_scan+0x6f0/0x6f0 [ 849.597119][T29886] ? do_raw_write_lock+0x124/0x290 [ 849.602244][T29886] __es_insert_extent+0x2cc/0xf20 [ 849.607279][T29886] ext4_es_insert_extent+0x2b7/0xa40 [ 849.612580][T29886] ? ext4_es_scan_clu+0x50/0x50 [ 849.617459][T29886] ext4_map_blocks+0xb7b/0x1a00 [ 849.622332][T29886] ? ext4_issue_zeroout+0x190/0x190 [ 849.627566][T29886] ? kasan_check_write+0x14/0x20 [ 849.632543][T29886] ? __brelse+0x95/0xb0 [ 849.636741][T29886] ext4_getblk+0xc4/0x510 [ 849.641096][T29886] ? ext4_iomap_begin+0xfe0/0xfe0 [ 849.646146][T29886] ? ext4_free_inode+0x1450/0x1450 [ 849.651276][T29886] ext4_bread+0x8f/0x230 [ 849.655525][T29886] ? ext4_getblk+0x510/0x510 [ 849.660141][T29886] ext4_append+0x155/0x370 [ 849.664578][T29886] ext4_mkdir+0x61b/0xdf0 [ 849.668933][T29886] ? ext4_init_dot_dotdot+0x520/0x520 [ 849.674315][T29886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 849.680585][T29886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 849.686861][T29886] ? security_inode_permission+0xd5/0x110 [ 849.692607][T29886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 849.698856][T29886] ? security_inode_mkdir+0xee/0x120 [ 849.704154][T29886] vfs_mkdir+0x433/0x690 [ 849.708405][T29886] do_mkdirat+0x234/0x2a0 [ 849.712748][T29886] ? __ia32_sys_mknod+0xb0/0xb0 [ 849.717606][T29886] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 849.723075][T29886] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 849.729176][T29886] ? do_syscall_64+0x26/0x610 [ 849.733879][T29886] ? lockdep_hardirqs_on+0x418/0x5d0 [ 849.739195][T29886] __x64_sys_mkdir+0x5c/0x80 [ 849.743817][T29886] do_syscall_64+0x103/0x610 [ 849.748427][T29886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 849.754321][T29886] RIP: 0033:0x457247 [ 849.758219][T29886] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 849.777837][T29886] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 849.786270][T29886] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 849.794261][T29886] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 [ 849.802237][T29886] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 849.810220][T29886] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 849.818656][T29886] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:49 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) migrate_pages(r0, 0x9, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x5) ptrace$cont(0x1f, r0, 0x0, 0x100000000) 18:29:49 executing program 3 (fault-call:0 fault-nth:33): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:49 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=[&(0x7f00000001c0)='em0em1!*-GPL\x00'], &(0x7f0000000340)=[&(0x7f0000000280)='/dev/dsp\x00', &(0x7f00000002c0)='posix_acl_access!\x00', &(0x7f0000000300)='/dev/dsp\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mknod$loop(&(0x7f0000000140)='./file0\x00', 0xa, 0xffffffffffffffff) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x2, 0x594}, {0x7, 0x7}], r0}, 0x18, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x28500, 0x0) bind$vsock_dgram(r1, &(0x7f0000000200)={0x28, 0x0, 0x100000005}, 0x10) setresuid(r0, r0, r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f00000003c0)={0x1, &(0x7f0000000380)=[{0x0}]}) ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, &(0x7f0000000400)={r2, 0xd}) [ 850.028494][T29899] JFS: Cannot determine volume size [ 850.036909][T29899] JFS: discard option not supported on device [ 850.056435][T29899] JFS: Cannot determine volume size 18:29:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x1f000000, 0x0) 18:29:49 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfatL', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 850.084584][T29899] JFS: discard option not supported on device [ 850.091691][T29912] FAULT_INJECTION: forcing a failure. [ 850.091691][T29912] name failslab, interval 1, probability 0, space 0, times 0 [ 850.115062][T29899] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 850.134919][T29912] CPU: 0 PID: 29912 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 850.144074][T29912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 850.154142][T29912] Call Trace: [ 850.157448][T29912] dump_stack+0x172/0x1f0 [ 850.161804][T29912] should_fail.cold+0xa/0x15 [ 850.166429][T29912] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 850.172258][T29912] ? ___might_sleep+0x163/0x280 [ 850.177138][T29912] __should_failslab+0x121/0x190 18:29:49 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2f0400, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0x7, 0x4d, 0x1}, 0x7) syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000140)=0x4) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 850.182116][T29912] should_failslab+0x9/0x14 [ 850.186657][T29912] __kmalloc_track_caller+0x2d8/0x740 [ 850.192056][T29912] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 850.198307][T29912] ? strndup_user+0x77/0xd0 [ 850.202827][T29912] memdup_user+0x26/0xb0 [ 850.207092][T29912] strndup_user+0x77/0xd0 [ 850.211434][T29912] ksys_mount+0x7b/0x150 [ 850.215690][T29912] __x64_sys_mount+0xbe/0x150 [ 850.220388][T29912] do_syscall_64+0x103/0x610 [ 850.225006][T29912] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 850.230910][T29912] RIP: 0033:0x45a89a [ 850.235254][T29912] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 850.254867][T29912] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 850.263295][T29912] RAX: ffffffffffffffda RBX: 00007fedcf4beb30 RCX: 000000000045a89a [ 850.271280][T29912] RDX: 00007fedcf4bead0 RSI: 00000000200004c0 RDI: 00007fedcf4beaf0 18:29:49 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$mice(0x0, 0x0, 0x101080) r2 = syz_open_dev$vcsa(0x0, 0xfffffffffffffffc, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f00000003c0)=ANY=[@ANYBLOB="004f0198b2eb3fd73777320bd8d718367a46a5a40b28eef56adeacbb35c056e741853e9104fa6d018e707e3e58c8489960def28a3dfcce66260342d8ad997d25ecf6bb5b25ea57b168b99ddeb16049c2423ae01fcee4e51fdbec069bb357b7007a13418ca54a4f5d06f791cdffc3633bc92767fe0866abb9d5f7934524af35b3910bb565595fa58ed384dce429498ae69e431ab315255bb503cefa05001789d7f63d10"], 0x2) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) r8 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x88, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r3, 0x4040ae72, &(0x7f0000000040)={0x800, 0xeb74, 0x2d58, 0x1, 0x5}) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x20011, r8, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f00000001c0), &(0x7f0000000340)=0xc) socketpair(0x20, 0x40000001, 0x2, &(0x7f0000000080)={0x0, 0x0}) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000100), &(0x7f0000000200)=0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) read(r4, &(0x7f0000000240)=""/81, 0x51) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0xdb}, 0x2c) [ 850.279263][T29912] RBP: 00000000200004c0 R08: 00007fedcf4beb30 R09: 00007fedcf4bead0 [ 850.287250][T29912] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 850.295244][T29912] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:49 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x12}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:49 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000140)={0x9, 0x5, 0x0, [{0x0, 0x9, 0x80000000, 0x101, 0x5b6, 0xffffffffffffffa1, 0xfffffffffffffff8}, {0x7, 0x0, 0x8, 0x200, 0x5, 0xada5, 0x5}, {0x81, 0x7ff, 0x2, 0x6, 0x9, 0x5, 0x2}, {0x20e, 0x81, 0x0, 0x15, 0x8, 0xffffffff, 0x100000001}, {0xdfc4, 0xffffffffffffff5e, 0x3, 0xff, 0x2, 0x7, 0x9}]}) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000000)={'hsr0\x00', 0x7bb7}) 18:29:49 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$mice(0x0, 0x0, 0x101080) r2 = syz_open_dev$vcsa(0x0, 0xfffffffffffffffc, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f00000003c0)=ANY=[@ANYBLOB="004f0198b2eb3fd73777320bd8d718367a46a5a40b28eef56adeacbb35c056e741853e9104fa6d018e707e3e58c8489960def28a3dfcce66260342d8ad997d25ecf6bb5b25ea57b168b99ddeb16049c2423ae01fcee4e51fdbec069bb357b7007a13418ca54a4f5d06f791cdffc3633bc92767fe0866abb9d5f7934524af35b3910bb565595fa58ed384dce429498ae69e431ab315255bb503cefa05001789d7f63d10"], 0x2) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) r8 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x88, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r3, 0x4040ae72, &(0x7f0000000040)={0x800, 0xeb74, 0x2d58, 0x1, 0x5}) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x20011, r8, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f00000001c0), &(0x7f0000000340)=0xc) socketpair(0x20, 0x40000001, 0x2, &(0x7f0000000080)={0x0, 0x0}) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000100), &(0x7f0000000200)=0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) read(r4, &(0x7f0000000240)=""/81, 0x51) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0xdb}, 0x2c) 18:29:49 executing program 3 (fault-call:0 fault-nth:34): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:49 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x2000000000004206, r0, 0xfffffffffffffffd, 0x70) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:49 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat`', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 850.531409][T29925] XFS (loop4): Invalid superblock magic number [ 850.545663][T29953] JFS: Cannot determine volume size [ 850.552305][T29953] JFS: discard option not supported on device [ 850.564914][T29953] JFS: Cannot determine volume size [ 850.578002][T29953] JFS: discard option not supported on device [ 850.585584][T29953] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 850.631013][T29958] FAULT_INJECTION: forcing a failure. [ 850.631013][T29958] name failslab, interval 1, probability 0, space 0, times 0 [ 850.670313][T29958] CPU: 1 PID: 29958 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 850.679482][T29958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 850.689562][T29958] Call Trace: [ 850.692880][T29958] dump_stack+0x172/0x1f0 [ 850.697224][T29958] should_fail.cold+0xa/0x15 [ 850.701830][T29958] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 850.707652][T29958] ? ___might_sleep+0x163/0x280 [ 850.712514][T29958] __should_failslab+0x121/0x190 [ 850.717479][T29958] should_failslab+0x9/0x14 [ 850.722014][T29958] kmem_cache_alloc_trace+0x2d1/0x760 [ 850.727407][T29958] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 850.733680][T29958] ? _copy_from_user+0xdd/0x150 [ 850.738574][T29958] copy_mount_options+0x5c/0x440 [ 850.743545][T29958] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 850.749801][T29958] ksys_mount+0xa7/0x150 [ 850.754052][T29958] __x64_sys_mount+0xbe/0x150 [ 850.758741][T29958] do_syscall_64+0x103/0x610 [ 850.763356][T29958] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 850.769261][T29958] RIP: 0033:0x45a89a [ 850.773163][T29958] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 850.792776][T29958] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 850.801194][T29958] RAX: ffffffffffffffda RBX: 00007fedcf4beb30 RCX: 000000000045a89a [ 850.809172][T29958] RDX: 00007fedcf4bead0 RSI: 00000000200004c0 RDI: 00007fedcf4beaf0 [ 850.817172][T29958] RBP: 00000000200004c0 R08: 00007fedcf4beb30 R09: 00007fedcf4bead0 18:29:49 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 850.825156][T29958] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 850.833147][T29958] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:50 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$mice(0x0, 0x0, 0x101080) r2 = syz_open_dev$vcsa(0x0, 0xfffffffffffffffc, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f00000003c0)=ANY=[@ANYBLOB="004f0198b2eb3fd73777320bd8d718367a46a5a40b28eef56adeacbb35c056e741853e9104fa6d018e707e3e58c8489960def28a3dfcce66260342d8ad997d25ecf6bb5b25ea57b168b99ddeb16049c2423ae01fcee4e51fdbec069bb357b7007a13418ca54a4f5d06f791cdffc3633bc92767fe0866abb9d5f7934524af35b3910bb565595fa58ed384dce429498ae69e431ab315255bb503cefa05001789d7f63d10"], 0x2) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) r8 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x88, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r3, 0x4040ae72, &(0x7f0000000040)={0x800, 0xeb74, 0x2d58, 0x1, 0x5}) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x20011, r8, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f00000001c0), &(0x7f0000000340)=0xc) socketpair(0x20, 0x40000001, 0x2, &(0x7f0000000080)={0x0, 0x0}) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000100), &(0x7f0000000200)=0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) read(r4, &(0x7f0000000240)=""/81, 0x51) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0xdb}, 0x2c) 18:29:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20000000, 0x0) 18:29:50 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x14}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:50 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfath', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:50 executing program 0: r0 = accept$ax25(0xffffffffffffff9c, &(0x7f0000000000)={{0x3, @netrom}, [@bcast, @null, @remote, @null, @rose, @null, @remote, @default]}, &(0x7f0000000080)=0x48) fcntl$getown(r0, 0x9) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x9, r1, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) sendmsg$nl_crypto(r2, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=@alg={0xf0, 0x10, 0x0, 0x70bd28, 0x25dfdbfb, {{'drbg_nopr_ctr_aes128\x00'}, [], [], 0x0, 0x400}, [{0x8, 0x1, 0x39}, {0x8, 0x1, 0xa1}]}, 0xf0}, 0x1, 0x0, 0x0, 0x4000080}, 0x0) ptrace$cont(0x1f, r1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 18:29:50 executing program 3 (fault-call:0 fault-nth:35): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 851.061024][T29979] JFS: Cannot determine volume size [ 851.066276][T29979] JFS: discard option not supported on device [ 851.097657][T29988] FAULT_INJECTION: forcing a failure. [ 851.097657][T29988] name failslab, interval 1, probability 0, space 0, times 0 18:29:50 executing program 0: msgget$private(0x0, 0x8) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x2, 0x2) wait4(r0, 0x0, 0x7ffffffd, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x5f) [ 851.097867][T29979] JFS: Cannot determine volume size [ 851.168873][T29988] CPU: 1 PID: 29988 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 851.171316][T29979] JFS: discard option not supported on device [ 851.178029][T29988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 851.178037][T29988] Call Trace: [ 851.178064][T29988] dump_stack+0x172/0x1f0 [ 851.178092][T29988] should_fail.cold+0xa/0x15 [ 851.178116][T29988] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 851.203577][T29979] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 851.206473][T29988] ? ___might_sleep+0x163/0x280 [ 851.206495][T29988] __should_failslab+0x121/0x190 [ 851.206514][T29988] should_failslab+0x9/0x14 [ 851.206546][T29988] kmem_cache_alloc_trace+0x2d1/0x760 [ 851.240850][T29988] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 851.247107][T29988] ? _copy_from_user+0xdd/0x150 [ 851.251991][T29988] copy_mount_options+0x5c/0x440 [ 851.256956][T29988] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 851.263231][T29988] ksys_mount+0xa7/0x150 [ 851.267484][T29988] __x64_sys_mount+0xbe/0x150 [ 851.272172][T29988] do_syscall_64+0x103/0x610 [ 851.276776][T29988] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 851.282703][T29988] RIP: 0033:0x45a89a [ 851.286636][T29988] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 851.306252][T29988] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 18:29:50 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$mice(0x0, 0x0, 0x101080) r2 = syz_open_dev$vcsa(0x0, 0xfffffffffffffffc, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f00000003c0)=ANY=[@ANYBLOB="004f0198b2eb3fd73777320bd8d718367a46a5a40b28eef56adeacbb35c056e741853e9104fa6d018e707e3e58c8489960def28a3dfcce66260342d8ad997d25ecf6bb5b25ea57b168b99ddeb16049c2423ae01fcee4e51fdbec069bb357b7007a13418ca54a4f5d06f791cdffc3633bc92767fe0866abb9d5f7934524af35b3910bb565595fa58ed384dce429498ae69e431ab315255bb503cefa05001789d7f63d10"], 0x2) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) r8 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x88, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r3, 0x4040ae72, &(0x7f0000000040)={0x800, 0xeb74, 0x2d58, 0x1, 0x5}) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x20011, r8, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f00000001c0), &(0x7f0000000340)=0xc) socketpair(0x20, 0x40000001, 0x2, &(0x7f0000000080)={0x0, 0x0}) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000100), &(0x7f0000000200)=0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) read(r4, &(0x7f0000000240)=""/81, 0x51) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0xdb}, 0x2c) 18:29:50 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x3f, r0, 0x8003, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000140)={0xfff, 0x0, [], {0x0, @reserved}}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 851.314678][T29988] RAX: ffffffffffffffda RBX: 00007fedcf4beb30 RCX: 000000000045a89a [ 851.322680][T29988] RDX: 00007fedcf4bead0 RSI: 00000000200004c0 RDI: 00007fedcf4beaf0 [ 851.330669][T29988] RBP: 00000000200004c0 R08: 00007fedcf4beb30 R09: 00007fedcf4bead0 [ 851.338744][T29988] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 851.346728][T29988] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:50 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000000)=0x9) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tee(r1, r1, 0x100, 0xa) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x14, 0x40000, 0x1, 0x0, 0x8, r1, 0xff}, 0x2c) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 851.450176][T29990] XFS (loop4): Invalid superblock magic number 18:29:50 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfatl', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:50 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x2f}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:50 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000000)={0x0, 0x1, 0xdd, 'queue0\x00', 0x3}) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f00000000c0)={0x6, 0x6}) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20100000, 0x0) 18:29:50 executing program 3 (fault-call:0 fault-nth:36): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:50 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) write(r1, &(0x7f0000000000)="efcdc715695153f66974bf13815245ea8268c00da075e424a02741849c7c89f300a1e411149875bb85a28e64dae967ff47d2808e387d5992d24edf4adc040fee25f1bf358cce2c5f44d453cd3937d97ddf24b28ba04f9b18a9b67f0017cc1947d2cc63f8c3be17680cb62b339311f6005d261cebc23e422771d6c930340e4f367af5810c35d3804e78c3dc184c0cc243cc7925b4", 0x94) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f00000000c0)=0xae, 0x4) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 851.709487][T30032] JFS: Cannot determine volume size [ 851.727676][T30032] JFS: discard option not supported on device [ 851.744171][T30038] FAULT_INJECTION: forcing a failure. [ 851.744171][T30038] name failslab, interval 1, probability 0, space 0, times 0 18:29:50 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$mice(0x0, 0x0, 0x101080) r2 = syz_open_dev$vcsa(0x0, 0xfffffffffffffffc, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f00000003c0)=ANY=[@ANYBLOB="004f0198b2eb3fd73777320bd8d718367a46a5a40b28eef56adeacbb35c056e741853e9104fa6d018e707e3e58c8489960def28a3dfcce66260342d8ad997d25ecf6bb5b25ea57b168b99ddeb16049c2423ae01fcee4e51fdbec069bb357b7007a13418ca54a4f5d06f791cdffc3633bc92767fe0866abb9d5f7934524af35b3910bb565595fa58ed384dce429498ae69e431ab315255bb503cefa05001789d7f63d10"], 0x2) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) r8 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x88, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r3, 0x4040ae72, &(0x7f0000000040)={0x800, 0xeb74, 0x2d58, 0x1, 0x5}) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x20011, r8, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f00000001c0), &(0x7f0000000340)=0xc) socketpair(0x20, 0x40000001, 0x2, &(0x7f0000000080)={0x0, 0x0}) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000100), &(0x7f0000000200)=0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) read(r4, &(0x7f0000000240)=""/81, 0x51) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0xdb}, 0x2c) [ 851.759431][T30032] JFS: Cannot determine volume size [ 851.772353][T30032] JFS: discard option not supported on device [ 851.788626][T30032] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 851.801241][T30038] CPU: 0 PID: 30038 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 851.810368][T30038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 851.810376][T30038] Call Trace: [ 851.810402][T30038] dump_stack+0x172/0x1f0 [ 851.810427][T30038] should_fail.cold+0xa/0x15 [ 851.810452][T30038] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 851.810477][T30038] ? ___might_sleep+0x163/0x280 [ 851.810500][T30038] __should_failslab+0x121/0x190 [ 851.810520][T30038] should_failslab+0x9/0x14 [ 851.810550][T30038] __kmalloc_track_caller+0x2d8/0x740 [ 851.810579][T30038] ? vfs_parse_fs_string+0xe8/0x170 [ 851.810599][T30038] kmemdup_nul+0x31/0xa0 [ 851.810620][T30038] vfs_parse_fs_string+0xe8/0x170 [ 851.810638][T30038] ? vfs_parse_fs_param+0x510/0x510 [ 851.810664][T30038] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 851.867820][T30038] ? alloc_fs_context+0x3bb/0x640 [ 851.867845][T30038] do_mount+0x6e9/0x2c40 [ 851.867869][T30038] ? copy_mount_string+0x40/0x40 [ 851.898620][T30038] ? _copy_from_user+0xdd/0x150 [ 851.903492][T30038] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 18:29:51 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000)=0xeea, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 851.909731][T30038] ? copy_mount_options+0x30e/0x440 [ 851.909751][T30038] ksys_mount+0xdb/0x150 [ 851.909769][T30038] __x64_sys_mount+0xbe/0x150 [ 851.909790][T30038] do_syscall_64+0x103/0x610 [ 851.909820][T30038] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 851.909833][T30038] RIP: 0033:0x45a89a [ 851.909848][T30038] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 851.909856][T30038] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 851.909871][T30038] RAX: ffffffffffffffda RBX: 00007fedcf4beb30 RCX: 000000000045a89a [ 851.909887][T30038] RDX: 00007fedcf4bead0 RSI: 00000000200004c0 RDI: 00007fedcf4beaf0 [ 851.923973][T30038] RBP: 00000000200004c0 R08: 00007fedcf4beb30 R09: 00007fedcf4bead0 [ 851.923983][T30038] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 851.923993][T30038] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:51 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$mice(0x0, 0x0, 0x101080) r2 = syz_open_dev$vcsa(0x0, 0xfffffffffffffffc, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f00000003c0)=ANY=[@ANYBLOB="004f0198b2eb3fd73777320bd8d718367a46a5a40b28eef56adeacbb35c056e741853e9104fa6d018e707e3e58c8489960def28a3dfcce66260342d8ad997d25ecf6bb5b25ea57b168b99ddeb16049c2423ae01fcee4e51fdbec069bb357b7007a13418ca54a4f5d06f791cdffc3633bc92767fe0866abb9d5f7934524af35b3910bb565595fa58ed384dce429498ae69e431ab315255bb503cefa05001789d7f63d10"], 0x2) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) r8 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x88, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r3, 0x4040ae72, &(0x7f0000000040)={0x800, 0xeb74, 0x2d58, 0x1, 0x5}) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x20011, r8, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f00000001c0), &(0x7f0000000340)=0xc) socketpair(0x20, 0x40000001, 0x2, &(0x7f0000000080)={0x0, 0x0}) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000100), &(0x7f0000000200)=0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) read(r4, &(0x7f0000000240)=""/81, 0x51) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0xdb}, 0x2c) 18:29:51 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x39}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:51 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e24, 0x5e, @ipv4={[], [], @empty}, 0x7}}, [0xde1, 0x7e, 0xfffffffffffffff9, 0x2, 0x3, 0xe3, 0x80000001, 0x5, 0x10000, 0x2, 0x3, 0x4, 0x3]}, &(0x7f0000000140)=0x100) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000180)={r3, 0x2, 0x6, 0x9, 0xce33, 0x6}, 0x14) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x210f0000, 0x0) 18:29:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfatt', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:51 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000100)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000000004778635202d225205dd5c1950a8a905434e8c762d5665ecafbfadcbd9b51250a2ba06df8ace5fd60228a7a95a"], 0x28) r1 = gettid() syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r2, 0x10f, 0x85) 18:29:51 executing program 3 (fault-call:0 fault-nth:37): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 852.229048][T30062] JFS: Cannot determine volume size [ 852.241479][T30062] JFS: discard option not supported on device [ 852.264863][T30062] JFS: Cannot determine volume size 18:29:51 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$int_out(r1, 0x2, &(0x7f00000000c0)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) wait4(r0, 0x0, 0x4, &(0x7f0000000000)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 852.278008][T30062] JFS: discard option not supported on device [ 852.284357][T30062] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 18:29:51 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$mice(0x0, 0x0, 0x101080) r2 = syz_open_dev$vcsa(0x0, 0xfffffffffffffffc, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f00000003c0)=ANY=[@ANYBLOB="004f0198b2eb3fd73777320bd8d718367a46a5a40b28eef56adeacbb35c056e741853e9104fa6d018e707e3e58c8489960def28a3dfcce66260342d8ad997d25ecf6bb5b25ea57b168b99ddeb16049c2423ae01fcee4e51fdbec069bb357b7007a13418ca54a4f5d06f791cdffc3633bc92767fe0866abb9d5f7934524af35b3910bb565595fa58ed384dce429498ae69e431ab315255bb503cefa05001789d7f63d10"], 0x2) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) r8 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x88, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r3, 0x4040ae72, &(0x7f0000000040)={0x800, 0xeb74, 0x2d58, 0x1, 0x5}) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x20011, r8, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f00000001c0), &(0x7f0000000340)=0xc) socketpair(0x20, 0x40000001, 0x2, &(0x7f0000000080)={0x0, 0x0}) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000100), &(0x7f0000000200)=0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) read(r4, &(0x7f0000000240)=""/81, 0x51) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0xdb}, 0x2c) [ 852.350363][T30077] FAULT_INJECTION: forcing a failure. [ 852.350363][T30077] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 852.363612][T30077] CPU: 0 PID: 30077 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 852.372735][T30077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 852.382979][T30077] Call Trace: [ 852.386303][T30077] dump_stack+0x172/0x1f0 [ 852.390667][T30077] should_fail.cold+0xa/0x15 [ 852.395365][T30077] ? __x64_sys_mount+0xbe/0x150 [ 852.400232][T30077] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 852.406043][T30077] ? mark_held_locks+0xf0/0xf0 [ 852.410825][T30077] should_fail_alloc_page+0x50/0x60 [ 852.416038][T30077] __alloc_pages_nodemask+0x1a1/0x7e0 [ 852.421435][T30077] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 852.427158][T30077] ? find_held_lock+0x35/0x130 [ 852.431945][T30077] ? __might_fault+0x12b/0x1e0 [ 852.431966][T30077] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 852.431988][T30077] cache_grow_begin+0x9c/0x850 18:29:51 executing program 0: clone(0xc0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 852.432006][T30077] ? copy_mount_options+0x5c/0x440 [ 852.432024][T30077] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 852.432044][T30077] kmem_cache_alloc_trace+0x67f/0x760 [ 852.432064][T30077] copy_mount_options+0x5c/0x440 [ 852.432077][T30077] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 852.432092][T30077] ksys_mount+0xa7/0x150 [ 852.432107][T30077] __x64_sys_mount+0xbe/0x150 [ 852.432126][T30077] do_syscall_64+0x103/0x610 [ 852.432146][T30077] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 852.432160][T30077] RIP: 0033:0x45a89a [ 852.432177][T30077] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 852.432194][T30077] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 852.447831][T30077] RAX: ffffffffffffffda RBX: 00007fedcf4beb30 RCX: 000000000045a89a [ 852.447841][T30077] RDX: 00007fedcf4bead0 RSI: 00000000200004c0 RDI: 00007fedcf4beaf0 [ 852.447852][T30077] RBP: 00000000200004c0 R08: 00007fedcf4beb30 R09: 00007fedcf4bead0 [ 852.447861][T30077] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 852.447871][T30077] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x23000000, 0x0) 18:29:51 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x43}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:51 executing program 3 (fault-call:0 fault-nth:38): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfatz', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 852.805042][T30187] FAULT_INJECTION: forcing a failure. [ 852.805042][T30187] name failslab, interval 1, probability 0, space 0, times 0 [ 852.836014][T30187] CPU: 1 PID: 30187 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 852.845186][T30187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 18:29:51 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000000)) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) gettid() ptrace$cont(0x18, r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e22, 0x80000001, @mcast1, 0x8}, @in={0x2, 0x4e21, @multicast2}], 0x2c) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(r1, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 852.855237][T30187] Call Trace: [ 852.855283][T30187] dump_stack+0x172/0x1f0 [ 852.855307][T30187] should_fail.cold+0xa/0x15 [ 852.855337][T30187] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 852.855368][T30187] ? ___might_sleep+0x163/0x280 [ 852.862971][T30187] __should_failslab+0x121/0x190 [ 852.862990][T30187] should_failslab+0x9/0x14 [ 852.863008][T30187] kmem_cache_alloc_trace+0x2d1/0x760 [ 852.863023][T30187] ? kasan_check_write+0x14/0x20 [ 852.863043][T30187] ? lock_downgrade+0x880/0x880 [ 852.863062][T30187] alloc_super+0x55/0x890 [ 852.863083][T30187] ? kasan_check_read+0x11/0x20 [ 852.911925][T30187] ? test_single_super+0x10/0x10 [ 852.916853][T30187] sget_userns+0xf1/0x560 [ 852.921198][T30187] ? kill_litter_super+0x60/0x60 [ 852.926157][T30187] ? test_single_super+0x10/0x10 [ 852.931081][T30187] ? kill_litter_super+0x60/0x60 [ 852.936014][T30187] sget+0x10c/0x150 [ 852.939822][T30187] mount_bdev+0xff/0x3c0 [ 852.944056][T30187] ? jfs_destroy_inode+0x1e0/0x1e0 [ 852.949158][T30187] jfs_do_mount+0x35/0x40 [ 852.953482][T30187] ? jfs_get_dquots+0x20/0x20 [ 852.958153][T30187] legacy_get_tree+0xf2/0x200 [ 852.962830][T30187] vfs_get_tree+0x123/0x450 [ 852.967352][T30187] do_mount+0x1436/0x2c40 [ 852.971680][T30187] ? copy_mount_string+0x40/0x40 [ 852.976607][T30187] ? _copy_from_user+0xdd/0x150 [ 852.981470][T30187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 852.987705][T30187] ? copy_mount_options+0x30e/0x440 [ 852.992907][T30187] ksys_mount+0xdb/0x150 [ 852.997138][T30187] __x64_sys_mount+0xbe/0x150 [ 853.001811][T30187] do_syscall_64+0x103/0x610 [ 853.006404][T30187] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 853.012277][T30187] RIP: 0033:0x45a89a [ 853.016166][T30187] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 853.035772][T30187] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 853.044202][T30187] RAX: ffffffffffffffda RBX: 00007fedcf4beb30 RCX: 000000000045a89a [ 853.052180][T30187] RDX: 00007fedcf4bead0 RSI: 00000000200004c0 RDI: 00007fedcf4beaf0 [ 853.060145][T30187] RBP: 00000000200004c0 R08: 00007fedcf4beb30 R09: 00007fedcf4bead0 [ 853.068121][T30187] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 853.076074][T30187] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:52 executing program 0: clone(0xc3000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000040)) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000000)) [ 853.160601][T30194] JFS: Cannot determine volume size [ 853.167337][T30194] JFS: discard option not supported on device [ 853.187596][T30194] JFS: Cannot determine volume size [ 853.216266][T30194] JFS: discard option not supported on device [ 853.229892][T30196] XFS (loop4): Invalid superblock magic number 18:29:52 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000200)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x12000, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x5a) connect$inet(r4, &(0x7f0000593000)={0x2, 0x0, @multicast1}, 0x10) r5 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r5, 0x0, 0x27, &(0x7f0000000040)={@multicast1, @local, @local}, 0xc) setsockopt$inet_mreqn(r4, 0x0, 0x7, 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x6}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000001c0)={r6, 0x6}, 0x8) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) r7 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r7) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc040564a, &(0x7f0000000080)) [ 853.263624][T30194] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 853.327784][T30215] IPVS: ftp: loaded support on port[0] = 21 18:29:52 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\xa8', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:52 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x40802, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@empty, 0x200, 0x2, 0x0, 0x7, 0x35f, 0x1}, &(0x7f00000000c0)=0x20) write$sndseq(r0, &(0x7f0000000040)=[{0x1, 0x6, 0x0, 0x1, @time={0x0, 0x1c9c380}, {0x800, 0x4}, {}, @queue={0x2, {0x2, 0x7}}}], 0x30) 18:29:52 executing program 3 (fault-call:0 fault-nth:39): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x3c030000, 0x0) 18:29:52 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x63}}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 853.545127][T30327] FAULT_INJECTION: forcing a failure. [ 853.545127][T30327] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 853.558377][T30327] CPU: 0 PID: 30327 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 853.558390][T30327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 853.558395][T30327] Call Trace: [ 853.558426][T30327] dump_stack+0x172/0x1f0 [ 853.581607][T30327] should_fail.cold+0xa/0x15 [ 853.581626][T30327] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 853.581645][T30327] ? mark_held_locks+0xf0/0xf0 [ 853.581667][T30327] should_fail_alloc_page+0x50/0x60 [ 853.581684][T30327] __alloc_pages_nodemask+0x1a1/0x7e0 [ 853.581703][T30327] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 853.581716][T30327] ? find_held_lock+0x35/0x130 [ 853.581742][T30327] ? do_syscall_64+0x103/0x610 [ 853.581763][T30327] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 853.633082][T30327] cache_grow_begin+0x9c/0x850 [ 853.637879][T30327] ? getname_flags+0xd6/0x5b0 [ 853.642590][T30327] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 853.648861][T30327] kmem_cache_alloc+0x645/0x710 [ 853.653731][T30327] ? cache_grow_end+0xa4/0x190 [ 853.658506][T30327] getname_flags+0xd6/0x5b0 [ 853.663028][T30327] user_path_at_empty+0x2f/0x50 [ 853.667889][T30327] do_mount+0x150/0x2c40 [ 853.672150][T30327] ? copy_mount_options+0x5c/0x440 [ 853.677274][T30327] ? copy_mount_string+0x40/0x40 [ 853.682252][T30327] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 853.682268][T30327] ? copy_mount_options+0x30e/0x440 18:29:52 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x80, 0x4100) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000240)={{0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 853.682283][T30327] ksys_mount+0xdb/0x150 [ 853.682299][T30327] __x64_sys_mount+0xbe/0x150 [ 853.682317][T30327] do_syscall_64+0x103/0x610 [ 853.682338][T30327] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 853.682350][T30327] RIP: 0033:0x45a89a [ 853.682375][T30327] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 853.682383][T30327] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 853.682396][T30327] RAX: ffffffffffffffda RBX: 00007fedcf4beb30 RCX: 000000000045a89a [ 853.682403][T30327] RDX: 00007fedcf4bead0 RSI: 00000000200004c0 RDI: 00007fedcf4beaf0 [ 853.682410][T30327] RBP: 00000000200004c0 R08: 00007fedcf4beb30 R09: 00007fedcf4bead0 [ 853.682416][T30327] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 853.682423][T30327] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 [ 853.795718][T30330] JFS: Cannot determine volume size 18:29:52 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x5, 0x5, 0x2, 0x2, 0x0, 0xffffffff, 0x0, 0xe, 0x2, 0x7fffffff, 0x73, 0x9, 0x3, 0x4, 0x5, 0x32, 0x3, 0x2, 0x7, 0x403, 0xffffffffffffffff, 0x4449e5ed, 0x7, 0x4, 0x2, 0x4, 0x4, 0xffff, 0x9, 0x6, 0x1000, 0x8, 0x2000000, 0x9, 0x4, 0x4, 0x0, 0x9, 0x4, @perf_config_ext={0x0, 0x6}, 0x20000, 0x4, 0x6, 0x0, 0xf85, 0x1000, 0x8}, r2, 0x2, r1, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000000240)="58722a6ab57dab5eab769edd5025314af996d832f7e52c5ba1751803964025e375a51a56f6f20ee787a8627694385df2874cd999dc9d19a9fe6bdca9a64e9595e513d8d608200f57285a425b69b7d03bd9a8eedea4ca06f308e5c6912ceb670181b90f1ceed63a6026a4375e014344cf1f4ab67c2c456da21c2cdb3e0c876f14c1dde25005e90d9b2109cff777133dfa511567d3612a97f86b6fcbee440e8a55a9bfaebe", 0xffffffffffffffc6, 0x20000005, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c) 18:29:53 executing program 3 (fault-call:0 fault-nth:40): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 853.821564][T30330] JFS: discard option not supported on device [ 853.827984][T30330] JFS: Cannot determine volume size [ 853.838069][T30330] JFS: discard option not supported on device [ 853.857217][T30330] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 18:29:53 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x104) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000040)=""/71) r2 = geteuid() mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x2000000, &(0x7f0000000180)={[{@metacopy_off='metacopy=off'}, {@index_on='index=on'}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file0'}}], [{@hash='hash'}, {@appraise='appraise'}, {@fsname={'fsname', 0x3d, '^%%'}}, {@uid_lt={'uid<', r2}}, {@fsuuid={'fsuuid', 0x3d, {[0x77, 0x32, 0x77, 0x77, 0x66, 0x30, 0x0, 0x37], 0x2d, [0x35, 0x38, 0x63, 0x64], 0x2d, [0x38, 0x66, 0x3d, 0x77], 0x2d, [0x37, 0x35, 0x3b, 0x64], 0x2d, [0x62, 0x32, 0x37, 0x0, 0x37, 0x32, 0x62, 0x30]}}}]}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:53 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:53 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}, 0x39}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:53 executing program 5: r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000080)) socket$kcm(0xa, 0x0, 0x11) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x149100, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vcs\x00', 0x400, 0x0) acct(&(0x7f00000003c0)='./file0\x00') ioctl$DRM_IOCTL_MAP_BUFS(r2, 0xc0186419, &(0x7f0000000380)={0x3, &(0x7f00000000c0)=""/152, &(0x7f0000000300)=[{0x3f, 0x35, 0x5, &(0x7f0000000200)=""/53}, {0x6, 0x5, 0x96, &(0x7f0000000240)=""/5}, {0x22, 0x62, 0x8, &(0x7f0000000280)=""/98}]}) ioctl$VHOST_GET_FEATURES(r2, 0x8008af00, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x7b) 18:29:53 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 854.120599][T30344] FAULT_INJECTION: forcing a failure. [ 854.120599][T30344] name failslab, interval 1, probability 0, space 0, times 0 18:29:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x3f000000, 0x0) [ 854.177280][T30354] FAT-fs (loop2): bogus number of reserved sectors [ 854.182950][T30344] CPU: 0 PID: 30344 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 854.193001][T30344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 854.193010][T30344] Call Trace: [ 854.193038][T30344] dump_stack+0x172/0x1f0 [ 854.193061][T30344] should_fail.cold+0xa/0x15 [ 854.193080][T30344] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 854.193103][T30344] ? ___might_sleep+0x163/0x280 [ 854.193125][T30344] __should_failslab+0x121/0x190 [ 854.193143][T30344] should_failslab+0x9/0x14 [ 854.193159][T30344] __kmalloc+0x2dc/0x740 [ 854.193182][T30344] ? lockdep_init_map+0x10c/0x5b0 [ 854.213471][T30354] FAT-fs (loop2): Can't find a valid FAT filesystem [ 854.215435][T30344] ? prealloc_shrinker+0xa6/0x350 [ 854.215458][T30344] prealloc_shrinker+0xa6/0x350 [ 854.215484][T30344] alloc_super+0x710/0x890 [ 854.265928][T30344] ? test_single_super+0x10/0x10 [ 854.270885][T30344] sget_userns+0xf1/0x560 [ 854.275231][T30344] ? kill_litter_super+0x60/0x60 [ 854.280194][T30344] ? test_single_super+0x10/0x10 [ 854.285174][T30344] ? kill_litter_super+0x60/0x60 [ 854.290134][T30344] sget+0x10c/0x150 [ 854.293962][T30344] mount_bdev+0xff/0x3c0 [ 854.298209][T30344] ? jfs_destroy_inode+0x1e0/0x1e0 [ 854.303328][T30344] jfs_do_mount+0x35/0x40 [ 854.307751][T30344] ? jfs_get_dquots+0x20/0x20 [ 854.312445][T30344] legacy_get_tree+0xf2/0x200 [ 854.317138][T30344] vfs_get_tree+0x123/0x450 [ 854.321658][T30344] do_mount+0x1436/0x2c40 [ 854.326003][T30344] ? copy_mount_string+0x40/0x40 [ 854.330963][T30344] ? _copy_from_user+0xdd/0x150 [ 854.335856][T30344] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 854.342119][T30344] ? copy_mount_options+0x30e/0x440 [ 854.347338][T30344] ksys_mount+0xdb/0x150 [ 854.351591][T30344] __x64_sys_mount+0xbe/0x150 [ 854.356277][T30344] do_syscall_64+0x103/0x610 [ 854.360886][T30344] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 854.366786][T30344] RIP: 0033:0x45a89a [ 854.370693][T30344] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 854.390420][T30344] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 854.398848][T30344] RAX: ffffffffffffffda RBX: 00007fedcf4beb30 RCX: 000000000045a89a [ 854.406831][T30344] RDX: 00007fedcf4bead0 RSI: 00000000200004c0 RDI: 00007fedcf4beaf0 [ 854.414817][T30344] RBP: 00000000200004c0 R08: 00007fedcf4beb30 R09: 00007fedcf4bead0 18:29:53 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(r0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) getsockopt$bt_hci(r1, 0x0, 0x1, &(0x7f0000000000)=""/227, &(0x7f0000000140)=0xe3) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 854.422793][T30344] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 854.430784][T30344] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 [ 854.446050][T30362] JFS: Cannot determine volume size [ 854.468006][T30362] JFS: discard option not supported on device [ 854.494873][T30362] JFS: Cannot determine volume size [ 854.501964][T30362] jfs: Unrecognized mount option "discard=0x00000000000000089euid=00000000000000000000" or missing value 18:29:53 executing program 3 (fault-call:0 fault-nth:41): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:53 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat&', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:53 executing program 0: clone(0x8000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x28) ptrace$cont(0x18, r0, 0x40000004, 0x7) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) ptrace$setregs(0x11, r0, 0x0, &(0x7f0000000140)="86783bca0c83b3234e362df742e6996d25e248d53068835629797bd0d5ab703832db5c05b2b057264f0437c47a67a2a9189cea68c920915b3a1e73a0382f0c30d5b35f9444e28a53ca6dc693cf0f524fcf64489088be006ead8e38f00428e13826d4ec8cf3736ee5c6f29d64219248db5d1208153bd9d4b2da013512331ae3e0070b78d0e5c38c2a632da2cea8984b8fc21fbfb77e0d9db7fc560c142ab17b518097d8c1b39bdb592f") ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:53 executing program 5: r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000080)) socket$kcm(0xa, 0x0, 0x11) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x149100, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vcs\x00', 0x400, 0x0) acct(&(0x7f00000003c0)='./file0\x00') ioctl$DRM_IOCTL_MAP_BUFS(r2, 0xc0186419, &(0x7f0000000380)={0x3, &(0x7f00000000c0)=""/152, &(0x7f0000000300)=[{0x3f, 0x35, 0x5, &(0x7f0000000200)=""/53}, {0x6, 0x5, 0x96, &(0x7f0000000240)=""/5}, {0x22, 0x62, 0x8, &(0x7f0000000280)=""/98}]}) ioctl$VHOST_GET_FEATURES(r2, 0x8008af00, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x7b) 18:29:53 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}, 0x43}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 854.704573][T30391] FAULT_INJECTION: forcing a failure. [ 854.704573][T30391] name failslab, interval 1, probability 0, space 0, times 0 [ 854.732804][T30369] XFS (loop4): Invalid superblock magic number [ 854.761806][T30391] CPU: 1 PID: 30391 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 854.770958][T30391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 854.770967][T30391] Call Trace: [ 854.770994][T30391] dump_stack+0x172/0x1f0 [ 854.771018][T30391] should_fail.cold+0xa/0x15 [ 854.771040][T30391] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 854.771064][T30391] ? ___might_sleep+0x163/0x280 [ 854.771086][T30391] __should_failslab+0x121/0x190 [ 854.771107][T30391] should_failslab+0x9/0x14 [ 854.771127][T30391] __kmalloc_track_caller+0x2d8/0x740 [ 854.771157][T30391] ? vfs_parse_fs_string+0xe8/0x170 [ 854.771178][T30391] kmemdup_nul+0x31/0xa0 [ 854.771205][T30391] vfs_parse_fs_string+0xe8/0x170 [ 854.799285][T30391] ? vfs_parse_fs_param+0x510/0x510 [ 854.799310][T30391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 854.799334][T30391] ? alloc_fs_context+0x3bb/0x640 [ 854.799356][T30391] do_mount+0x6e9/0x2c40 [ 854.809131][T30391] ? copy_mount_string+0x40/0x40 [ 854.809156][T30391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 854.809170][T30391] ? copy_mount_options+0x30e/0x440 [ 854.809189][T30391] ksys_mount+0xdb/0x150 [ 854.819057][T30391] __x64_sys_mount+0xbe/0x150 [ 854.833511][T30391] do_syscall_64+0x103/0x610 [ 854.833537][T30391] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 854.833569][T30391] RIP: 0033:0x45a89a [ 854.845028][T30391] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 854.845038][T30391] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 854.845052][T30391] RAX: ffffffffffffffda RBX: 00007fedcf4beb30 RCX: 000000000045a89a [ 854.845060][T30391] RDX: 00007fedcf4bead0 RSI: 00000000200004c0 RDI: 00007fedcf4beaf0 [ 854.845069][T30391] RBP: 00000000200004c0 R08: 00007fedcf4beb30 R09: 00007fedcf4bead0 [ 854.845076][T30391] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 18:29:54 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\'', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x3fffffff, 0x0) [ 854.845085][T30391] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 [ 854.870622][T30450] JFS: Cannot determine volume size [ 854.905762][T30450] JFS: discard option not supported on device [ 854.958053][T30450] JFS: Cannot determine volume size [ 854.977946][T30450] jfs: Unrecognized mount option "discard=0x0000000000000008Ceuid=00000000000000000000" or missing value 18:29:54 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(r1, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:29:54 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}, 0x39}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:54 executing program 3 (fault-call:0 fault-nth:42): syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:54 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="f60a8688ef299669de1ff9e0622eaf51", 0x10) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4, 0x40010, r0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000880)={0x10, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="445657abe5e9a06346ad4e395a65b14e084b9ed3faf3e92af023a167315afc3b4fdcf5fadc286b03d9c2d97006b20c6e83ecb804b7136b9de8155e632c835021e676f1", @ANYPTR, @ANYPTR], 0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x5, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x4}, {&(0x7f0000000100)="cab4b5", 0x3, 0x7}, {&(0x7f0000000180)="4c2ce83dee0655840353d4035b76e0de446cb5bd72029b6133652bc8bc093b7a8cfe1ae130ba487b606a36e3359bf1edb50ad76f0dd67ebbc32f0772d062858e7a376bd4e29e1e32ced0437d", 0x4c, 0x5}, {&(0x7f0000000280)="b881d5e5af4d990528c7fe1571c811d27d2d33d5c861c7fd014d0b3924c30cc9b6729122215d105b6129f11963f9d611a9231c9acb5480549d4a83a97ede3de5209fe44951a47d7f01a1036110d1f862f6726506fe74df969df546ed6cf79a5bb04143eb3a0e9e77eb445f2c0bca00a2c6a533b50d3984007c7cf1b5c2c375fe650c975820862d53b66faceec8fb0d26b2c81aadf13aae4f5720b045405ca4545af1471b1d60b82a35853d4032e54c23d7a618eb9298c1e506ad67a3", 0xbc, 0x2}, {&(0x7f0000000340)="d39694ae7b723f3d96e2c84e9bcb44ea3e666eb7184e17f33633bc7398880712021eabc9ee8c0cae17c1", 0x2a, 0x9}], 0x4008, &(0x7f0000000400)={[{@shortname_win95='shortname=win95'}, {@rodir='rodir'}, {@shortname_mixed='shortname=mixed'}, {@fat=@discard='discard'}, {@shortname_win95='shortname=win95'}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x6}}, {@numtail='nonumtail=0'}, {@rodir='rodir'}], [{@subj_role={'subj_role', 0x3d, '/dev/dri/card#\x00'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x3f, 0x63, 0x31, 0x0, 0x63, 0x64, 0x77], 0x2d, [0x73, 0x34, 0x77, 0x37], 0x2d, [0x38, 0x7f, 0x3d, 0x75], 0x2d, [0x77, 0x36, 0x38], 0x2d, [0x71, 0x77, 0x37, 0x76, 0x33, 0x67, 0x64, 0x77]}}}, {@obj_user={'obj_user', 0x3d, 'vcan0\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'wlan0&'}}]}) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_raw(r1, &(0x7f0000000140)={0x1d, r2}, 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000080), 0x1d0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) close(r1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000580)={0x0, 0x100}, &(0x7f00000005c0)=0x8) prctl$PR_GET_NAME(0x10, &(0x7f0000000640)=""/131) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000600)={r3, 0x6}, 0x8) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, 0x0) [ 855.205401][T30516] FAULT_INJECTION: forcing a failure. [ 855.205401][T30516] name failslab, interval 1, probability 0, space 0, times 0 [ 855.229643][T30518] JFS: Cannot determine volume size 18:29:54 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}, 0x4c}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 855.250395][T30518] JFS: discard option not supported on device [ 855.283450][T30516] CPU: 1 PID: 30516 Comm: syz-executor.3 Not tainted 5.0.0-rc7-next-20190220 #39 [ 855.289871][T30518] JFS: Cannot determine volume size [ 855.292629][T30516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 855.292637][T30516] Call Trace: [ 855.292665][T30516] dump_stack+0x172/0x1f0 [ 855.292692][T30516] should_fail.cold+0xa/0x15 [ 855.302448][T30518] jfs: Unrecognized mount option "discard=0x00000000000000089euid=00000000000000000000" or missing value [ 855.307943][T30516] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 855.307966][T30516] ? ___might_sleep+0x163/0x280 [ 855.307988][T30516] __should_failslab+0x121/0x190 [ 855.346920][T30516] should_failslab+0x9/0x14 [ 855.351439][T30516] __kmalloc_track_caller+0x2d8/0x740 [ 855.356846][T30516] ? vfs_parse_fs_string+0xe8/0x170 [ 855.362055][T30516] kmemdup_nul+0x31/0xa0 [ 855.366325][T30516] vfs_parse_fs_string+0xe8/0x170 [ 855.371374][T30516] ? vfs_parse_fs_param+0x510/0x510 [ 855.376600][T30516] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 855.382863][T30516] ? alloc_fs_context+0x3bb/0x640 [ 855.387917][T30516] do_mount+0x6e9/0x2c40 [ 855.392175][T30516] ? copy_mount_string+0x40/0x40 [ 855.397124][T30516] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 855.403362][T30516] ? copy_mount_options+0x30e/0x440 [ 855.408570][T30516] ksys_mount+0xdb/0x150 [ 855.412819][T30516] __x64_sys_mount+0xbe/0x150 [ 855.417514][T30516] do_syscall_64+0x103/0x610 [ 855.422125][T30516] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 855.428041][T30516] RIP: 0033:0x45a89a [ 855.431952][T30516] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 855.451586][T30516] RSP: 002b:00007fedcf4bea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 855.460006][T30516] RAX: ffffffffffffffda RBX: 00007fedcf4beb30 RCX: 000000000045a89a [ 855.467983][T30516] RDX: 00007fedcf4bead0 RSI: 00000000200004c0 RDI: 00007fedcf4beaf0 [ 855.475960][T30516] RBP: 00000000200004c0 R08: 00007fedcf4beb30 R09: 00007fedcf4bead0 [ 855.483944][T30516] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 855.491935][T30516] R13: 0000000000000000 R14: 00000000004dbbf0 R15: 0000000000000003 18:29:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x40000000, 0x0) [ 855.662166][T30631] JFS: Cannot determine volume size [ 855.669368][T30631] JFS: discard option not supported on device [ 855.701223][T30631] JFS: Cannot determine volume size 18:29:54 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat)', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:54 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x13, 0x80f, 0x8e) connect$bt_sco(r0, &(0x7f00000010c0)={0x1f, {0x5, 0x40, 0x7, 0x80, 0x6, 0x236}}, 0x8) r1 = dup(0xffffffffffffffff) ioctl$VT_DISALLOCATE(r1, 0x5608) r2 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r3, &(0x7f0000000000)={0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) recvmmsg(r3, &(0x7f0000001200), 0x0, 0xb, &(0x7f0000001240)={0x77359400}) r4 = accept(r3, &(0x7f0000000400)=@ipx, &(0x7f0000000040)=0x80) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000001100)={'TPROXY\x00'}, &(0x7f0000001380)=0xffffffffffffff49) r5 = syz_open_dev$dri(&(0x7f0000001080)='/dev/dri/card#\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$vbi(&(0x7f0000001600)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_S_MODULATOR(r7, 0x40445637, &(0x7f00000016c0)={0x6, "6690ce55a0d4076f7f0df0ecb0a78d1d1b0639334621fdd2219506d8827db944", 0x200, 0xf1a3, 0xfffffffffffffdb3, 0x2, 0x3}) getxattr(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)=@known='system.advise\x00', &(0x7f0000001280)=""/85, 0x55) pread64(r5, &(0x7f0000000080)=""/4096, 0x20001080, 0x0) r8 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000022c0)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000017c0)={0x0, 0x18, 0xfa00, {0x20000000000000, &(0x7f0000001800)={0xffffffffffffffff}, 0x13f, 0x1000}}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001300)={0xffffffffffffffff, r8, 0x0, 0x1, &(0x7f0000001200)='\x00'}, 0x30) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001500)={r8, 0x48, &(0x7f0000001480)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001540)={r10, r6, 0x0, 0x16, &(0x7f0000001440)='/proc/capi/capi20ncci\x00', r11}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r8, &(0x7f00000013c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x0, @rand_addr="4729a6d0f8f2f53397d6002878d18b85", 0x1}, {0xa, 0x4e20, 0x4, @mcast2, 0xffffffff80000000}, r9, 0x800}}, 0x48) ioctl$VIDIOC_G_MODULATOR(r8, 0xc0445636, &(0x7f0000002300)={0x10000, "b72afbc07915be1656788473b66ee259715ffaa3fa914b04e86484a4e91066b8", 0x400, 0x81, 0x9, 0x1c, 0x5}) gettid() getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000001580)={0x0, 0x7fff}, &(0x7f00000015c0)=0x8) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f00000011c0)={0x4, 0x40, 0xffffffff00000000, 0x4}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000001680)=ANY=[@ANYBLOB="2a0d4de97e8956dd82e38567e90000007ad28fa70385e1e07a71d7960e68f88142e1a65e31ec141092686fa7dddc9f7518774cda000000000000"], 0x0) [ 855.742808][T30631] jfs: Unrecognized mount option "discard=0x0000000000000008Leuid=00000000000000000000" or missing value [ 855.868537][T30636] XFS (loop4): Invalid superblock magic number 18:29:55 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:55 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001780)={0xffffffffffffffff}) recvmsg(0xffffffffffffffff, 0x0, 0xfffffffffffffffd) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r3 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x800000000080000, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000006c0)) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) sendmsg$kcm(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x20000000) ioctl$TUNSETLINK(r4, 0x400454cd, 0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, 0x0, 0x2060) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0xfe80, 'c\x86\xdd'}]}, 0xfdef) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000100)) 18:29:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x42534658, 0x0) 18:29:55 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}, 0x63}], [{@euid_eq={'euid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:55 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='%fs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat*', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 856.360971][T30742] JFS: Cannot determine volume size [ 856.366751][T30742] JFS: discard option not supported on device [ 856.405730][T30742] JFS: Cannot determine volume size [ 856.429386][T30742] jfs: Unrecognized mount option "discard=0x0000000000000008ceuid=00000000000000000000" or missing value 18:29:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x48000000, 0x0) 18:29:55 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'\nuid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 856.649361][T30779] XFS (loop4): Invalid superblock magic number 18:29:55 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000380)='/dev/qat_adf_ctl\x00') r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x200001, 0x0) ioctl$VIDIOC_S_EDID(r1, 0xc0285629, &(0x7f00000002c0)={0x0, 0x403, 0x7fffffff, [], &(0x7f0000000140)=0x9}) r2 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)=@known='trusted.overlay.redirect\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f00000004c0)={&(0x7f0000000480)=[0xfffffffffffffffe], 0x1, 0x4, 0x5, 0x8000, 0x81, 0x7e5, {0x8, 0x0, 0xfe38, 0x5, 0x3, 0xffffffff, 0x7, 0x8, 0xfff, 0x9, 0xffff, 0x0, 0xa24, 0x400, "a89561fb1d160172bd0691aeb413e72e189df097f8013c78d13355fe09e1748b"}}) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740), 0x0, &(0x7f0000000040)=ANY=[]}, 0x0) ioctl$void(0xffffffffffffffff, 0x5450) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)=0x107ff) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r4 = getpgrp(0xffffffffffffffff) getpgid(0x0) io_cancel(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x7, 0x10001, 0xffffffffffffffff, &(0x7f00000003c0)="de58e51aff1057e54fbc865bf604429cebf3fcd2889108b4cc790335983979209bcd29c5dff6a0a32b0c2fc69b644234853ba5ffa5186aa3fd6c712dcc96ab2e835013f324ca871246dd2c36c213bb3e194e31a2e459bca5b131f287d5fb0d0c62c4d0", 0x63, 0x5}, 0x0) write$apparmor_exec(r3, &(0x7f0000000080)={'exec ', '/group.stat\x00'}, 0x11) kcmp(r4, r4, 0x3, 0xffffffffffffffff, r3) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f0000000540)={0x3, 0x1, 0x401, 0xff, 'syz0\x00', 0x6}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='/group.stat\x00', 0x2761, 0x0) 18:29:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat+', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:55 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) geteuid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)}, 0x10000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) socket$key(0xf, 0x3, 0x2) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x25a4, 0x48440) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f00000001c0)=0x20000, 0x4) ioctl$int_out(r0, 0x5462, &(0x7f0000000200)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r1, &(0x7f0000000040)=""/46, 0x39d918394178499c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 856.775414][T30797] JFS: Cannot determine volume size 18:29:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x4c000000, 0x0) 18:29:55 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='j.s\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 856.836616][T30797] JFS: discard option not supported on device [ 856.880534][T30797] JFS: Cannot determine volume size [ 856.934447][T30797] JFS: discard option not supported on device [ 856.978440][T30797] jfs: Unrecognized mount option " [ 856.978440][T30797] uid=00000000000000000000" or missing value 18:29:56 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat,', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000100)="cd9d10d3e042db2d1879c135c02123f3f6d589cce0e9a587e3528e4a51cb2c27fa0af9e358053331a1b095ddf8196bf4d8f43e3d6c7d9fe1352ccca92b0b4a81fac3741ea5da0d02d66d664d113f064ac53a19996f99", 0x56) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@session={'session', 0x3d, 0x8cffffff}}]}) [ 857.067194][T30855] XFS (loop4): Invalid superblock magic number 18:29:56 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'%uid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 857.232024][T30929] hfsplus: session requires an argument [ 857.255633][T30929] hfsplus: unable to parse mount options 18:29:56 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mixer\x00', 0x400940, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setregset(0x4205, r1, 0x207, &(0x7f0000000100)={&(0x7f0000000180)="efd7983a554132fbab7be19f92d6ca732d900420f66e10d498626cc440e4c0a6deb3b9a5bf150fac1f618c59ae10fde30be071b6664905253df7b4ea90054c8014ab63e2e2ea63aaadebbf19db5a3ed7d0864fdbd69483056d248246a5ac3404a0f4aca74de731a69cfc9904fb623cd0bb020e4a3d8933c051b34bb703ebe485c6a3b0caae837b472e7bde9d1b9e2d04abbcf610627bb8cee46d739c03cd2971a36700e5a4a23b8cc81f571b983371332c0bb154bc5850fe0438282467f800a29030078be9bf5cd32b406a7874be1525801e113cd13ce053681af2c48389f42003e89869e9a027dc5c8868270dfec274bee897", 0xf3}) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x35) ioctl$SIOCAX25NOUID(r0, 0x89e3, &(0x7f00000002c0)=0x1) r2 = syz_open_pts(0xffffffffffffffff, 0x2000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x800, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6, 0x0, 0x33}, 0x0, @in=@dev, 0x0, 0x0, 0x0, 0x10006, 0xffffffffffffffff, 0x10000000000}}, 0xe8) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), 0x4) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x190) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x1000000000, @mcast1, 0x80}, 0x6b) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) [ 857.342990][T30932] XFS (loop4): Invalid superblock magic number 18:29:56 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='j/s\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x50010000, 0x0) [ 857.470671][T30939] JFS: Cannot determine volume size [ 857.477188][T30939] JFS: discard option not supported on device [ 857.489434][T30939] JFS: Cannot determine volume size [ 857.494982][T30939] JFS: discard option not supported on device [ 857.517227][T30939] jfs: Unrecognized mount option "%uid=00000000000000000000" or missing value 18:29:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000000000), 0x400000000000070, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x200, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x88450089}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0xcc, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xb0, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffff45}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x43}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x8001}, 0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@loopback, 0x7fffffff, 0x0, 0xff, 0x0, 0x1}, 0x20) 18:29:56 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'e\nid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:56 executing program 0: clock_gettime(0xffffffffeffffffe, &(0x7f0000000040)) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x800, 0x0) write$FUSE_INIT(r0, &(0x7f0000000080)={0x50, 0x0, 0x3, {0x7, 0x1c, 0x3, 0x10000, 0xf4db, 0xff, 0x4fbb, 0x8}}, 0x50) 18:29:56 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat-', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 857.831579][T31066] JFS: Cannot determine volume size [ 857.842403][T31066] JFS: discard option not supported on device 18:29:57 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jf#\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:57 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0x404c534a, &(0x7f0000000580)={0x0, 0x0, 0xfdfdffff, 'queue0\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00', 0x0, [0x0, 0x0, 0x1f00]}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) setsockopt$inet6_buf(r2, 0x29, 0x45, &(0x7f0000000000)="31063448fb245a846fd38efd469a03e32a4d80817dc51d6117d7b4d0b8c0cbeda678c56a5ecf78a56b3e06b5da738bd06ddb32a40bef4a9093307af2b523d0e9f5ef4f808a0d17d91f4a21fe6744076306d38f38c87545029aeb6797b1aaeab96ea14bed086deda23f8939a9e6d0ee47cbcac61b3af48b7207d40eb67550be6f2ecd4b659ccd0857e3890dacf0b3bdc26e228316d109c6bedeba3c18caca59fd26ed1fe3091ef1319c0279df59139cdad07e6e3469f5", 0xb6) [ 857.872725][T31040] XFS (loop4): Invalid superblock magic number [ 857.890799][T31066] JFS: Cannot determine volume size [ 857.911647][T31066] JFS: discard option not supported on device 18:29:57 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x8000, 0x0) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000100)=0x6) fcntl$addseals(r0, 0x409, 0x3358bc37bff5fc40) r3 = epoll_create1(0x0) r4 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f00000000c0)={0x20000001}) dup3(r4, r3, 0x0) [ 857.929968][T31066] jfs: Unrecognized mount option "e [ 857.929968][T31066] id=00000000000000000000" or missing value 18:29:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x58465342, 0x0) 18:29:57 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'e#id'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:57 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x440, 0x0) write$P9_RWALK(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="230000006f020002000002fc85c5560000445a442b7125b932ee9891badd9b00000200000000880000000000010027b1fa5f8d9429e13c50b542bf98792a4ae190d4b40150f56a53cb47b7deb6d1b028f1803039900084dfa2bcb011ee906725fd357ca7242a990dba5685b435a031f1d9cdab69b0106c33d5b34574c5a9a07d4f971f0a1248843b473ee14c403512c53cce4157886230ded206c9b3aba308da11b2feccfa337c1d82178778b60333ba11d04c3aab05da4b3841fc58a9924b3db7b1610e9978879e04e39cbb19e84d6a68aaa7a5471929"], 0x23) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6, 0xffffff7f]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100, 0xf364010000000000]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback, 0x0, 0x0, 0x0, 0x500}) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000002c0)) socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000340)=""/80, &(0x7f00000003c0)=0x50) bind$alg(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x80100) setsockopt$inet_dccp_buf(r2, 0x21, 0xe, &(0x7f0000000180)="2c9b1228444f349cd6c8f61d2dc1056dd2700a09fdfa0b4a25c285c528d3ccd37d5c3cb02f3f6a67be553074694a114038f8f1f56d2fd3e183dc395b4d63bdf83a82d0597fa2a079d677589f9b3a4e741734409a2aa83151a5251c5f541783c5c75ff19849bfd5f14eedce3735b2224d0c11d880a3f350fb7964c5374fc4f3bfa0abf8035855ecada58c6243a6bbab6276d331728beb75572770210d7b6fc6e2b381bbf9dffbb3d7816429", 0xab) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) getsockopt$inet6_int(r2, 0x29, 0x4, &(0x7f0000000240), &(0x7f0000000300)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 18:29:57 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat.', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:57 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x8000, 0x0) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000100)=0x6) fcntl$addseals(r0, 0x409, 0x3358bc37bff5fc40) r3 = epoll_create1(0x0) r4 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f00000000c0)={0x20000001}) dup3(r4, r3, 0x0) 18:29:57 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jf%\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 858.296856][T31255] JFS: Cannot determine volume size [ 858.313469][T31255] JFS: discard option not supported on device [ 858.344587][T31255] JFS: Cannot determine volume size [ 858.375059][T31255] JFS: discard option not supported on device 18:29:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x60000000, 0x0) 18:29:57 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x8000, 0x0) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000100)=0x6) fcntl$addseals(r0, 0x409, 0x3358bc37bff5fc40) r3 = epoll_create1(0x0) r4 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f00000000c0)={0x20000001}) dup3(r4, r3, 0x0) [ 858.427799][T31255] jfs: Unrecognized mount option "e#id=00000000000000000000" or missing value 18:29:57 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x440, 0x0) write$P9_RWALK(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="230000006f020002000002fc85c5560000445a442b7125b932ee9891badd9b00000200000000880000000000010027b1fa5f8d9429e13c50b542bf98792a4ae190d4b40150f56a53cb47b7deb6d1b028f1803039900084dfa2bcb011ee906725fd357ca7242a990dba5685b435a031f1d9cdab69b0106c33d5b34574c5a9a07d4f971f0a1248843b473ee14c403512c53cce4157886230ded206c9b3aba308da11b2feccfa337c1d82178778b60333ba11d04c3aab05da4b3841fc58a9924b3db7b1610e9978879e04e39cbb19e84d6a68aaa7a5471929"], 0x23) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6, 0xffffff7f]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100, 0xf364010000000000]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback, 0x0, 0x0, 0x0, 0x500}) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000002c0)) socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000340)=""/80, &(0x7f00000003c0)=0x50) bind$alg(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x80100) setsockopt$inet_dccp_buf(r2, 0x21, 0xe, &(0x7f0000000180)="2c9b1228444f349cd6c8f61d2dc1056dd2700a09fdfa0b4a25c285c528d3ccd37d5c3cb02f3f6a67be553074694a114038f8f1f56d2fd3e183dc395b4d63bdf83a82d0597fa2a079d677589f9b3a4e741734409a2aa83151a5251c5f541783c5c75ff19849bfd5f14eedce3735b2224d0c11d880a3f350fb7964c5374fc4f3bfa0abf8035855ecada58c6243a6bbab6276d331728beb75572770210d7b6fc6e2b381bbf9dffbb3d7816429", 0xab) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) getsockopt$inet6_int(r2, 0x29, 0x4, &(0x7f0000000240), &(0x7f0000000300)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 18:29:57 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat/', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:57 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x8000, 0x0) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000100)=0x6) fcntl$addseals(r0, 0x409, 0x3358bc37bff5fc40) r3 = epoll_create1(0x0) r4 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f00000000c0)={0x20000001}) dup3(r4, r3, 0x0) 18:29:57 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'e%id'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:57 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jf*\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:57 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x8000, 0x0) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000100)=0x6) fcntl$addseals(r0, 0x409, 0x3358bc37bff5fc40) r3 = epoll_create1(0x0) r4 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f00000000c0)={0x20000001}) dup3(r4, r3, 0x0) [ 858.705331][T31329] XFS (loop4): Invalid superblock magic number 18:29:57 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x440, 0x0) write$P9_RWALK(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="230000006f020002000002fc85c5560000445a442b7125b932ee9891badd9b00000200000000880000000000010027b1fa5f8d9429e13c50b542bf98792a4ae190d4b40150f56a53cb47b7deb6d1b028f1803039900084dfa2bcb011ee906725fd357ca7242a990dba5685b435a031f1d9cdab69b0106c33d5b34574c5a9a07d4f971f0a1248843b473ee14c403512c53cce4157886230ded206c9b3aba308da11b2feccfa337c1d82178778b60333ba11d04c3aab05da4b3841fc58a9924b3db7b1610e9978879e04e39cbb19e84d6a68aaa7a5471929"], 0x23) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6, 0xffffff7f]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100, 0xf364010000000000]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback, 0x0, 0x0, 0x0, 0x500}) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000002c0)) socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000340)=""/80, &(0x7f00000003c0)=0x50) bind$alg(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x80100) setsockopt$inet_dccp_buf(r2, 0x21, 0xe, &(0x7f0000000180)="2c9b1228444f349cd6c8f61d2dc1056dd2700a09fdfa0b4a25c285c528d3ccd37d5c3cb02f3f6a67be553074694a114038f8f1f56d2fd3e183dc395b4d63bdf83a82d0597fa2a079d677589f9b3a4e741734409a2aa83151a5251c5f541783c5c75ff19849bfd5f14eedce3735b2224d0c11d880a3f350fb7964c5374fc4f3bfa0abf8035855ecada58c6243a6bbab6276d331728beb75572770210d7b6fc6e2b381bbf9dffbb3d7816429", 0xab) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) getsockopt$inet6_int(r2, 0x29, 0x4, &(0x7f0000000240), &(0x7f0000000300)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 18:29:57 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat0', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 858.828715][T31346] JFS: Cannot determine volume size [ 858.846751][T31346] JFS: discard option not supported on device 18:29:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x66030000, 0x0) [ 858.874673][T31346] JFS: Cannot determine volume size 18:29:58 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x8000, 0x0) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000100)=0x6) fcntl$addseals(r0, 0x409, 0x3358bc37bff5fc40) r3 = epoll_create1(0x0) r4 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f00000000c0)={0x20000001}) dup3(r4, r3, 0x0) [ 858.899672][T31346] JFS: discard option not supported on device [ 858.922517][T31346] jfs: Unrecognized mount option "e%id=00000000000000000000" or missing value 18:29:58 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000040)={0x80000001, 0x3, 0x11f}) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, &(0x7f0000000000)="bc", 0x1, 0x0, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000001840)="de", 0x1, 0x8800, 0x0, 0x0) dup3(r0, r1, 0x0) 18:29:58 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jf+\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0xa) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xca4f, 0x20000) connect$caif(r2, &(0x7f0000000080)=@rfm={0x25, 0xfffffffffffffffb, "55d7716cfd18a02fff1f38ea3d330268"}, 0x18) 18:29:58 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'e*id'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 859.148515][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:29:58 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@sha1={0x1, "0dc2c0e0677ccb228549baf60e33fcefdfaa5dda"}, 0x15, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6, 0x0, 0x3f, 0x0, "099d4229519f6e4fec9a4a13251551c57def2567646053845cc9d4aaf6f7c12652e366ad84d000312581134a4c0a9a88e9db29cefd2046a14b81cd655220c89c2f0419a4785594ccf842df9cb66245f3"}, 0xd8) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000020, &(0x7f00000000c0)=0xa, 0x4) [ 859.272917][T31472] JFS: Cannot determine volume size [ 859.278180][T31472] JFS: discard option not supported on device 18:29:58 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x18c, r1, 0x334, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5d7d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}]}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ff}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x64}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xafe}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x72d}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffffffffffda}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x18c}, 0x1, 0x0, 0x0, 0x40000}, 0x90) r2 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r2, 0x11b, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x18) 18:29:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x68000000, 0x0) [ 859.316646][T31472] JFS: Cannot determine volume size [ 859.333736][T31472] JFS: discard option not supported on device [ 859.353095][T31472] jfs: Unrecognized mount option "e*id=00000000000000000000" or missing value 18:29:58 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat1', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:58 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x4a}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000080)={0x0, 0x0, 0x77fffb, 0x0, 0x9002000004c, r0}, 0x2c) syz_init_net_socket$ax25(0x3, 0x3, 0x7) r1 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1, 0x8) connect$rxrpc(r1, &(0x7f0000000200)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e24, @loopback}}, 0x24) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f00000000c0)=0x1000, 0x8) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000100)={r2, 0x100000000, 0xf, "d208c7447e3d57762b3ade406f2b112419acd449605f951644b1f96d32df9ef58b7cf7b3a47ded9478182d82c83f52a4dfb046f0e02635b78cb43747ba32e3d29f7918e342bfcf7edefe421f6f56af29ddd085347cc088ce430016093ec52ade80b5f84561ce677b73d8542f6d0b72b6a9c8e31abd7fcee3aafa459c58faeecd405f45a1d17afced210cc5d3dffac3d7dedc8ad44273703e58517bb3145b7a68009ed8d4e9e86085a04d99"}) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000340)=@req={0xc21, 0x9, 0x0, 0x8}, 0x10) socket$bt_hidp(0x1f, 0x3, 0x6) write$P9_RREAD(r2, &(0x7f0000000240)={0xe2, 0x75, 0x2, {0xd7, "543dd64f92831380c18d1dd807cba56fbfb7924d01fa17a073e35b1cbc00c0c08fdc5e7445f056e777874c5eddda9d2041f0413e44ba569fcad444cc1f878aaa110b550e50f0dbc5ddfa86a409ea8e5ebb396aa2b2fee3e1e0c0000000000046a9fb381d796dd9d5be4095f580330586067b4e4b3513f422b5765c8fe07012cee5e1879b731af37b08bd1ce95ba7f4c52e0475c4ff05f78c3c861b0d2a1b968051dadc01dd58b0debf08f2f16ed870419de75194cebf1733102a71606a3ac879395a4cab19666c30ee15f930a14c0bb911156cbc3f1658"}}, 0xe2) 18:29:58 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'e+id'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:58 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jf-\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x50000, 0x0) r1 = add_key$user(&(0x7f0000000740)='user\x00', &(0x7f0000000880)={'syz', 0x1}, &(0x7f00000002c0)='X', 0x1, 0xfffffffffffffffe) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r3 = add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f00000000c0), 0xc6, 0xfffffffffffffffd) r4 = syz_open_dev$usb(&(0x7f0000000600)='/dev/bus/usb/00#/00#\x00', 0xffffffffffff8001, 0x40) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000680), 0x4) keyctl$dh_compute(0x17, &(0x7f0000000300)={r1, r3, r3}, &(0x7f0000000080)=""/107, 0x6b, &(0x7f0000000200)={&(0x7f0000000100)={'poly1305-generic\x00'}}) fcntl$getflags(0xffffffffffffffff, 0x401) ioctl$SIOCGSTAMPNS(r4, 0x8907, &(0x7f0000000000)={0x0, 0x0}) write$P9_RREADDIR(r2, &(0x7f0000000040)={0x2a, 0x29, 0x1, {0x6b2, [{{0x0, 0x1}, 0xb6d, 0x7ff, 0x7, './file0'}]}}, 0x2a) sysinfo(&(0x7f00000007c0)=""/154) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x11b400, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) connect$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x1}, 0x6e) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x8) ioctl$IOC_PR_PREEMPT(r6, 0x401870cb, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000340)=ANY=[@ANYRES64=r5], 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) gettid() write$cgroup_int(0xffffffffffffffff, &(0x7f00000005c0)=0x100, 0x12) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, 0xffffffffffffffff, &(0x7f0000000480)={0x8}) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000180)={'sy.'}, 0x0, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 859.590791][T31533] XFS (loop4): Invalid superblock magic number 18:29:58 executing program 5: r0 = socket$packet(0x11, 0x1000000000000003, 0x300) accept4$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @broadcast}, &(0x7f00000000c0)=0x10, 0x800) syz_genetlink_get_family_id$team(0x0) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000100)=0x800, 0x4) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 859.696113][T31611] JFS: Cannot determine volume size 18:29:58 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat2', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 859.728245][T31611] JFS: discard option not supported on device [ 859.735522][T31611] JFS: Cannot determine volume size [ 859.754408][T31611] JFS: discard option not supported on device [ 859.774189][T31611] jfs: Unrecognized mount option "e+id=00000000000000000000" or missing value 18:29:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x6c000000, 0x0) 18:29:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) fchown(r0, r1, r2) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) fcntl$setpipe(r3, 0x407, 0x6000000000000) bind$nfc_llcp(r3, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40fa8c8aa024d00000000ffffffff25fe48261e21ccf67e1d7b5510029663000000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x30}, 0x60) 18:29:59 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'e-id'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x50000, 0x0) r1 = add_key$user(&(0x7f0000000740)='user\x00', &(0x7f0000000880)={'syz', 0x1}, &(0x7f00000002c0)='X', 0x1, 0xfffffffffffffffe) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r3 = add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f00000000c0), 0xc6, 0xfffffffffffffffd) r4 = syz_open_dev$usb(&(0x7f0000000600)='/dev/bus/usb/00#/00#\x00', 0xffffffffffff8001, 0x40) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000680), 0x4) keyctl$dh_compute(0x17, &(0x7f0000000300)={r1, r3, r3}, &(0x7f0000000080)=""/107, 0x6b, &(0x7f0000000200)={&(0x7f0000000100)={'poly1305-generic\x00'}}) fcntl$getflags(0xffffffffffffffff, 0x401) ioctl$SIOCGSTAMPNS(r4, 0x8907, &(0x7f0000000000)={0x0, 0x0}) write$P9_RREADDIR(r2, &(0x7f0000000040)={0x2a, 0x29, 0x1, {0x6b2, [{{0x0, 0x1}, 0xb6d, 0x7ff, 0x7, './file0'}]}}, 0x2a) sysinfo(&(0x7f00000007c0)=""/154) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x11b400, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) connect$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x1}, 0x6e) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x8) ioctl$IOC_PR_PREEMPT(r6, 0x401870cb, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000340)=ANY=[@ANYRES64=r5], 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) gettid() write$cgroup_int(0xffffffffffffffff, &(0x7f00000005c0)=0x100, 0x12) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, 0xffffffffffffffff, &(0x7f0000000480)={0x8}) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000180)={'sy.'}, 0x0, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:29:59 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jf.\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) fchown(r0, r1, r2) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) fcntl$setpipe(r3, 0x407, 0x6000000000000) bind$nfc_llcp(r3, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40fa8c8aa024d00000000ffffffff25fe48261e21ccf67e1d7b5510029663000000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x30}, 0x60) [ 860.087762][T31739] XFS (loop4): Invalid superblock magic number [ 860.126315][T31754] JFS: Cannot determine volume size 18:29:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat|', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 860.137561][T31754] JFS: discard option not supported on device [ 860.173897][T31754] JFS: Cannot determine volume size 18:29:59 executing program 5: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x8300, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast2, @in6=@mcast2, 0x4e23, 0x8, 0x4e24, 0x0, 0x2, 0x20, 0xa0, 0x72, 0x0, r2}, {0xfffffffffffffffd, 0x6, 0xafa, 0x8fa, 0x9e, 0x3f, 0xe3, 0xb01}, {0xdc, 0x8000, 0x8}, 0x3, 0x6e6bb7, 0x1, 0x9397f5f010288962, 0x0, 0x3}, {{@in6=@mcast1, 0x4d5, 0x33}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x3500, 0x5, 0x1, 0x4, 0x2, 0x0, 0x3}}, 0xe8) [ 860.190501][T31754] JFS: discard option not supported on device [ 860.199570][T31754] jfs: Unrecognized mount option "e-id=00000000000000000000" or missing value [ 860.223470][T31765] XFS (loop4): Invalid superblock magic number 18:29:59 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x2000c0, 0x0) setsockopt$inet6_dccp_int(r0, 0x21, 0x3, &(0x7f0000000140)=0xffffffff80000000, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000040)=0x100000, 0x4) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000004c0)=0x5, 0x4) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000340), &(0x7f0000000380)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f00000001c0)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendfile(r1, r2, 0x0, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000200)={0x200000008000004, 0x0, 0x200000, '\x9e\xdez\x8cZ\xe9g,\x934\x0fdzfO\x1b\xee\xabe\xc02)\x01\xdck\x02\x00\xde,Q\xb7\xc3|r@\xf4v\xc8\xd7S\xd0\x00\xaa\x8f\xaf\x8f\xb5t\xdb\xcf\xa6\xdcM\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000480)={r3, 0x1}) r4 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r4, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r4, 0x0) sendfile(r4, r4, 0x0, 0x20) accept4$unix(r2, 0x0, &(0x7f0000000400), 0x800) sendfile(r4, r4, &(0x7f0000000100), 0x7f8) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000540)=0x7, 0x4) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000080)=""/17, &(0x7f00000000c0)=0x11) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000002c0)={0x0, 0x0, 0x10000, 0x8}) syz_open_dev$sndmidi(&(0x7f00000003c0)='/dev/snd/midiC#D#\x00', 0x80, 0x200) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f0000000300)={r5, 0x9523}) 18:29:59 executing program 5: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffffffffffb9, &(0x7f0000000080)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000000c0)="c7ccab78d09bc3462cc01abaf3528dd474477f82d72ef9078499016b6336cefed2be9f26399e5bf50b3b489145bfbe22e56f5e", 0x33) 18:29:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x6c020000, 0x0) 18:29:59 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jf0\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:59 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'e.id'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:29:59 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0xc8) bind$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x1000000000004) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(0x0) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") writev(r1, &(0x7f00000a8000)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) lookup_dcookie(0x3f, &(0x7f0000000040)=""/128, 0x80) 18:29:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat}', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 860.620662][T31796] JFS: Cannot determine volume size [ 860.638336][T31796] JFS: discard option not supported on device 18:29:59 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x4001, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000000c0)) [ 860.674511][T31796] JFS: Cannot determine volume size 18:29:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x72030000, 0x0) [ 860.711913][T31796] JFS: discard option not supported on device [ 860.718150][T31796] jfs: Unrecognized mount option "e.id=00000000000000000000" or missing value 18:30:00 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfX\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:00 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000040}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x803, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xd7b4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x13}}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x800) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x3c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 18:30:00 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x2000c0, 0x0) setsockopt$inet6_dccp_int(r0, 0x21, 0x3, &(0x7f0000000140)=0xffffffff80000000, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000040)=0x100000, 0x4) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000004c0)=0x5, 0x4) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000340), &(0x7f0000000380)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f00000001c0)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendfile(r1, r2, 0x0, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000200)={0x200000008000004, 0x0, 0x200000, '\x9e\xdez\x8cZ\xe9g,\x934\x0fdzfO\x1b\xee\xabe\xc02)\x01\xdck\x02\x00\xde,Q\xb7\xc3|r@\xf4v\xc8\xd7S\xd0\x00\xaa\x8f\xaf\x8f\xb5t\xdb\xcf\xa6\xdcM\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000480)={r3, 0x1}) r4 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r4, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r4, 0x0) sendfile(r4, r4, 0x0, 0x20) accept4$unix(r2, 0x0, &(0x7f0000000400), 0x800) sendfile(r4, r4, &(0x7f0000000100), 0x7f8) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000540)=0x7, 0x4) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000080)=""/17, &(0x7f00000000c0)=0x11) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000002c0)={0x0, 0x0, 0x10000, 0x8}) syz_open_dev$sndmidi(&(0x7f00000003c0)='/dev/snd/midiC#D#\x00', 0x80, 0x200) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f0000000300)={r5, 0x9523}) 18:30:00 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'e0id'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 861.084416][T31928] JFS: Cannot determine volume size [ 861.100374][T31928] JFS: discard option not supported on device 18:30:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x74000000, 0x0) [ 861.126373][T31928] JFS: Cannot determine volume size [ 861.144981][T31945] FAT-fs (loop2): bogus number of reserved sectors [ 861.154011][T31928] JFS: discard option not supported on device [ 861.165985][T31945] FAT-fs (loop2): Can't find a valid FAT filesystem [ 861.181853][T31928] jfs: Unrecognized mount option "e0id=00000000000000000000" or missing value 18:30:00 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfc\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:00 executing program 5: r0 = socket$packet(0x11, 0x8000000000003, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'greq\xa9Y\xe6\x00\x00\x00\x00\x00\x00\x00\x80\x00', r1}) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000001380)={0xfffffffffffffffe}, 0xffffffffffffff75) sendmmsg(r0, &(0x7f0000008a80)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}], 0x300, 0x0) socket$packet(0x11, 0x2, 0x300) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3, 0x208142) write$vnet(r3, &(0x7f0000000200)={0x1, {&(0x7f0000000080)=""/140, 0x8c, &(0x7f0000000340)=""/4096, 0x3, 0x2}}, 0x68) ioctl$DRM_IOCTL_AGP_UNBIND(r3, 0x40106437, &(0x7f00000002c0)={0x0, 0x8001}) 18:30:00 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x2000c0, 0x0) setsockopt$inet6_dccp_int(r0, 0x21, 0x3, &(0x7f0000000140)=0xffffffff80000000, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000040)=0x100000, 0x4) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000004c0)=0x5, 0x4) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000340), &(0x7f0000000380)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f00000001c0)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendfile(r1, r2, 0x0, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000200)={0x200000008000004, 0x0, 0x200000, '\x9e\xdez\x8cZ\xe9g,\x934\x0fdzfO\x1b\xee\xabe\xc02)\x01\xdck\x02\x00\xde,Q\xb7\xc3|r@\xf4v\xc8\xd7S\xd0\x00\xaa\x8f\xaf\x8f\xb5t\xdb\xcf\xa6\xdcM\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000480)={r3, 0x1}) r4 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r4, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r4, 0x0) sendfile(r4, r4, 0x0, 0x20) accept4$unix(r2, 0x0, &(0x7f0000000400), 0x800) sendfile(r4, r4, &(0x7f0000000100), 0x7f8) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000540)=0x7, 0x4) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000080)=""/17, &(0x7f00000000c0)=0x11) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000002c0)={0x0, 0x0, 0x10000, 0x8}) syz_open_dev$sndmidi(&(0x7f00000003c0)='/dev/snd/midiC#D#\x00', 0x80, 0x200) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f0000000300)={r5, 0x9523}) 18:30:00 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'eXid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 861.416317][T32019] XFS (loop4): Invalid superblock magic number 18:30:00 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x2000c0, 0x0) setsockopt$inet6_dccp_int(r0, 0x21, 0x3, &(0x7f0000000140)=0xffffffff80000000, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000040)=0x100000, 0x4) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000004c0)=0x5, 0x4) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000340), &(0x7f0000000380)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f00000001c0)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendfile(r1, r2, 0x0, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000200)={0x200000008000004, 0x0, 0x200000, '\x9e\xdez\x8cZ\xe9g,\x934\x0fdzfO\x1b\xee\xabe\xc02)\x01\xdck\x02\x00\xde,Q\xb7\xc3|r@\xf4v\xc8\xd7S\xd0\x00\xaa\x8f\xaf\x8f\xb5t\xdb\xcf\xa6\xdcM\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000480)={r3, 0x1}) r4 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r4, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r4, 0x0) sendfile(r4, r4, 0x0, 0x20) accept4$unix(r2, 0x0, &(0x7f0000000400), 0x800) sendfile(r4, r4, &(0x7f0000000100), 0x7f8) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000540)=0x7, 0x4) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000080)=""/17, &(0x7f00000000c0)=0x11) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000002c0)={0x0, 0x0, 0x10000, 0x8}) syz_open_dev$sndmidi(&(0x7f00000003c0)='/dev/snd/midiC#D#\x00', 0x80, 0x200) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f0000000300)={r5, 0x9523}) [ 861.485760][T32082] JFS: Cannot determine volume size [ 861.502045][T32082] JFS: discard option not supported on device [ 861.516241][T32082] JFS: Cannot determine volume size [ 861.531787][T32082] JFS: discard option not supported on device [ 861.548143][T32082] jfs: Unrecognized mount option "eXid=00000000000000000000" or missing value 18:30:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x78030000, 0x0) 18:30:00 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfd\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:00 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff7, 0x80) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x81, 0x6, 0xb000}, 0x4) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x6c, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast1, 0x8000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 18:30:00 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'ecid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 861.692862][T32178] FAT-fs (loop2): bogus number of reserved sectors [ 861.703636][T32178] FAT-fs (loop2): Can't find a valid FAT filesystem [ 861.749063][T32288] Started in network mode 18:30:00 executing program 0: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) bind$bt_sco(r0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f00000003c0)={0x100000001, 0x40, 0x2a40, 0xfffffffffffffff9, [], [], [], 0x7, 0x49, 0x1f, 0x8, "e37448a057eb9e7201f1ccb8ea847568"}) syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x44, 0x40000) syz_mount_image$ntfs(0x0, &(0x7f0000000200)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="75707065726469723d609f811d1cd9a1f92e2f66696c65302c6c6f7765726469723d2e2f6616bf7f282c776f726b6469723d2e2f66696c65315c00e4f172ee6f3f1748782975f41fa3d5ac7652d2b7f18f0e3b4353c23620a1996956004356cd337e24df68ed7714577cf02d13f06048f80134c8054ce316469e7358250813fa7604c2b979"]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="00400000c2581f"], 0x7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(r2, 0xc) sendfile(r2, r2, &(0x7f0000000140), 0xd1) [ 861.778759][T32288] Own node identity ff010000000000000000000000000001, cluster identity 4711 [ 861.805359][T32288] Enabling of bearer rejected, failed to enable media [ 861.831772][T32297] Enabling of bearer rejected, failed to enable media [ 861.860396][T32292] JFS: Cannot determine volume size 18:30:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x18001, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0x2, [0x0, 0x0]}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000100)={r2, 0x2, 0x7d}, 0x8) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000140)=ANY=[@ANYBLOB="0100000000000065bf34004001000000000000003040000000000041f8c9207677bd5020b3a7c94c2c21fbbf9c0caaefee53a42d6e7c9d411933c51f4af4b661d1a0128025c24b72ca4706afdae3cb1ca37c857f6b2c28b260c478ab5420c0d22585dde1379bc39add002298190d900d84da56eb63998acc4b0193e667815d48e9e1bb0e673fcf8c75f74fea1b366d190df7b63be9f76b97e4382749c903b2f88b3e5ead04984bcd91540000000000000000"]) syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x4, 0x40000) [ 861.892348][T32292] JFS: discard option not supported on device [ 861.907795][T32292] JFS: Cannot determine volume size [ 861.918316][T32298] FAT-fs (loop2): bogus number of reserved sectors [ 861.931204][T32292] JFS: discard option not supported on device [ 861.938107][T32298] FAT-fs (loop2): Can't find a valid FAT filesystem [ 861.945280][T32292] jfs: Unrecognized mount option "ecid=00000000000000000000" or missing value 18:30:01 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfi\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80000000, 0x20400) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000080)={@local}, &(0x7f00000000c0)=0x14) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130009006900000000000000ab008000200000004600010700000014190001c025000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 18:30:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x7a000000, 0x0) 18:30:01 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = dup2(r0, r1) connect$netlink(r2, &(0x7f0000000000)=@unspec, 0xc) pwritev(r0, &(0x7f0000000280)=[{&(0x7f0000000040)="5a6def474a3e8f1c9bb2330fd4f01cdeed2854b437626c35b9e15e2d98cf7537ba4f4929d4e2f9997eddf7ffee133c30ab0e6a5aed569d19ae73cbb8a01f866319de6fc45ec9ccc1aee98b93842c5295fdcd41ba4428599c166029f28b52802144c0ccfe999080059fdb25", 0x6b}, {&(0x7f00000000c0)="155b0045f8baf1b56b43080e8c1121c26b62a66655d9391dabcb1afe42a791705aefef57b33fdc01256bc51eaace5d89b475c53caf68ccfc452895d43562f8afe51a60f5573438c824b2d3bbbe509d76e4d91d707beb0d6a538f1724f6c493a44dd34956f28e269593d41ef1c3d03057f99ce47d6ac3fff24e5621d39a51ab82ad1e4702264a5b980d3c2d1337740028886359ae", 0x94}, {&(0x7f0000000180)="234295708c8293e0c7d2b3802b0f1b8b353b47a659fc033fbddc82db93308f217a71b974a162181db65b25001d23558de858c97489652efa914b8dad4066d2bf57f7550f93039c0e8f9d9c54a7c3418125c435f4c8160c16722c57d8bca425abb616c9db2ea8a21b0147a0c51a6d43506b477294ad17691affca04c621e6922447b5af99d6420b3500d7c2df969469b59a66a3cc4fc747f37487a18e62b0d848f0fb9baf586bd93d7d6457cc2e2a26074cf62fb2e4", 0xb5}, {&(0x7f0000000240)="2ae03d88fcf3ae6730bf5b2d335b406eb94f85d3ba3a84c9fe4467d73170a2d03031b17d5cfa6f44e973dbf41ca3124d252b414808", 0x35}], 0x4, 0x0) 18:30:01 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x802) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x50800, 0x0) getpgrp(0x0) r1 = fcntl$getown(r0, 0x9) sched_setaffinity(r1, 0xffffffffffffffa0, &(0x7f0000000840)=0x40000000000019) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) sendfile(r2, r2, &(0x7f0000b58000)=0x200000, 0xffff) 18:30:01 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'edid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 862.300074][T32423] FAT-fs (loop2): bogus number of reserved sectors [ 862.306623][T32423] FAT-fs (loop2): Can't find a valid FAT filesystem [ 862.328744][T32422] JFS: Cannot determine volume size [ 862.336379][T32422] JFS: discard option not supported on device [ 862.350295][T32422] JFS: Cannot determine volume size [ 862.356252][T32422] JFS: discard option not supported on device [ 862.370214][T32422] jfs: Unrecognized mount option "edid=00000000000000000000" or missing value 18:30:01 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfl\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 862.427373][T32416] XFS (loop4): Invalid superblock magic number 18:30:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000740)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-simd\x00'}, 0x58) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7, 0x100) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000180)=@sack_info={0x0, 0x8, 0x88f0}, &(0x7f0000000200)=0xc) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f00000000c0)={0x7, 0x80000000, 0x1, 0x1, 0x20}) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000240)={0xd7, 0x200, 0x9, 0x100, r2}, 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r1, 0x0, 0x3}, 0x14) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000140)=ANY=[], 0x0) readv(r3, &(0x7f00000007c0)=[{&(0x7f0000000800)=""/4096, 0x14e9}], 0x1) 18:30:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x800000, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r1 = open(&(0x7f0000000000)='./file0\x00', 0x20141042, 0x0) close(r1) 18:30:01 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'eiid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 862.560938][T32541] FAT-fs (loop2): bogus number of reserved sectors [ 862.567775][T32541] FAT-fs (loop2): Can't find a valid FAT filesystem 18:30:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x80020000, 0x0) [ 862.641782][T32597] FAT-fs (loop2): bogus number of reserved sectors [ 862.653783][T32597] FAT-fs (loop2): Can't find a valid FAT filesystem 18:30:01 executing program 5: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000072ff8)={0x7fffffff}, 0x0, 0x8) r2 = dup2(r1, r0) io_setup(0x3, &(0x7f00000000c0)=0x0) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000180)=0x7, 0x1) io_submit(r3, 0x1, &(0x7f0000000400)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000040)='n', 0x1}]) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000100)=0xb) 18:30:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=0x0, &(0x7f00000000c0)=0x4) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000100)={r2, 0x8109, 0x6}, 0x8) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0x9, 0x4) 18:30:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 862.800114][T32657] JFS: Cannot determine volume size [ 862.814478][T32657] JFS: discard option not supported on device [ 862.831416][T32657] JFS: Cannot determine volume size [ 862.838934][T32657] JFS: discard option not supported on device 18:30:01 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfo\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 862.850436][T32657] jfs: Unrecognized mount option "eiid=00000000000000000000" or missing value 18:30:02 executing program 5: r0 = socket$inet6(0xa, 0x7b194576d071a47f, 0x9689) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000fee000)=0x3fa, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r2, 0x1, 0x4000000000000002, &(0x7f0000d11000)=0x3fb, 0x4) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e20}, 0x1c) r3 = dup(r2) ioctl$PPPOEIOCSFWD(r3, 0x4008b100, &(0x7f00000000c0)={0x18, 0x0, {0x0, @broadcast, 'ip6gre0\x00'}}) listen(r2, 0x404) listen(r1, 0x3) getsockopt$inet6_tcp_int(r2, 0x6, 0x3f, &(0x7f0000000040), &(0x7f0000000080)=0x4) recvfrom$inet6(r0, &(0x7f0000000100)=""/11, 0xb, 0x101, &(0x7f0000000180)={0xa, 0x4e20, 0x2, @local, 0x6}, 0x1c) 18:30:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1143, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x20100, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000080)={0x4, 0x1, 0x4, 0x1000100, {r2, r3/1000+30000}, {0x1, 0xd, 0xa4, 0x400, 0x1, 0x6, "4634ef65"}, 0x3, 0x7, @userptr=0x7, 0x4}) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r4, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 18:30:02 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'elid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 863.089944][ T308] FAT-fs (loop2): bogus number of reserved sectors [ 863.108313][ T308] FAT-fs (loop2): Can't find a valid FAT filesystem 18:30:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r1, 0x29, 0x1b, &(0x7f00000000c0)="cf", 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1000000003c) fcntl$setstatus(r1, 0x4, 0x42803) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000100)=0x10000000007, 0x4) 18:30:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x80030000, 0x0) [ 863.233796][ T322] JFS: Cannot determine volume size [ 863.239622][ T323] FAT-fs (loop2): bogus number of reserved sectors [ 863.246154][ T323] FAT-fs (loop2): Can't find a valid FAT filesystem [ 863.276636][ T322] JFS: discard option not supported on device [ 863.313268][ T322] JFS: Cannot determine volume size 18:30:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x54) ioctl$IMGETDEVINFO(r0, 0x80044944, &(0x7f00000000c0)={0xff}) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) lseek(r0, 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x2002, 0x1) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="bf99b352d791", @ANYBLOB="2fc53a7bbc9bbca1b12cedb2e46c913bd27d586d233869417aeb01d5ea9b69710be5622038828d5b25125024197d3ec78c8c81446374c95b8e719f96aeea81720517baeebf53916c08e540e071d303c8b791964d8d07da0e06f63227e8857e1b6bfce7019ad38f8fb1d992eaea4d8f28db210fd3ca", @ANYBLOB="2d92e7fb586177d7c675dcfc5e3c2f6d61549a150556cff63c01a0d5923b566f09f981b4a8e45ad438408dac1958388ce5ec264b23036ae82fb5a2cb6bb70c9b353e041d7cb28a68c3405674829649bcd7b78e9be043a13a1a9f1ba1772c40bbc1b1073d99e583a072d04033d068a79dbce297003cba6b4ad0363d91f6bcc7f1168fce71452810cae5b2b4351ba3e24a55df344917f23e0d54e18cc396a828848659a16fefd4e50320455bd0a939748cb2f5"], 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x41400) 18:30:02 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfp\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 863.329188][ T322] JFS: discard option not supported on device [ 863.346576][ T322] jfs: Unrecognized mount option "elid=00000000000000000000" or missing value [ 863.485571][ T336] syz-executor.5 (336) used greatest stack depth: 21712 bytes left 18:30:02 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) eventfd(0x2) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x20000, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0}, &(0x7f0000000e40)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000e80)={@ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x5c, r3}) 18:30:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x80969800, 0x0) 18:30:02 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'eoid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 863.574921][ T340] FAT-fs (loop2): bogus number of reserved sectors [ 863.614374][ T340] FAT-fs (loop2): Can't find a valid FAT filesystem 18:30:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1143, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x20100, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000080)={0x4, 0x1, 0x4, 0x1000100, {r2, r3/1000+30000}, {0x1, 0xd, 0xa4, 0x400, 0x1, 0x6, "4634ef65"}, 0x3, 0x7, @userptr=0x7, 0x4}) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r4, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 18:30:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001ff) r1 = socket$nl_generic(0x10, 0x3, 0x10) mmap$xdp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000004, 0x10, r1, 0x80000000) sendmsg$nl_route(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000002500010000000000000000000700000008000300000000000400000008000100ac1414aa5be13c303c07ef19d887ab71cb948139edf2f0a8428ba5250688408782c68e95af157b7e9019d0892f3520d170aac5f55c5764ad87c1dab474cb1b5b0af48a987d4dca49126cceea2c6564476c54ac1fbb5c010301aaac5af23a5b2f71a2"], 0x28}}, 0x0) 18:30:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat ', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:02 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfu\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 863.818293][ T456] JFS: Cannot determine volume size [ 863.843770][ T456] JFS: discard option not supported on device [ 863.844893][ T464] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 863.867110][ T456] JFS: Cannot determine volume size [ 863.887127][ T470] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 18:30:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff, 0x0) [ 863.918094][ T456] JFS: discard option not supported on device [ 863.956029][ T456] jfs: Unrecognized mount option "eoid=00000000000000000000" or missing value 18:30:03 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r2, 0xc0485619, &(0x7f0000000040)={0x8, 0x0, "faadc62aeb8fe82f3c2f3c78442eed1e6e0e458bb0be1c62"}) 18:30:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:03 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'epid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:03 executing program 5: r0 = socket$inet6(0xa, 0xe, 0x8) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x9, 0x6, 0x5, 0x6, 0x7fffffff, 0x1f, 0x1800, {0x0, @in6={{0xa, 0x4e23, 0x0, @local, 0xffff}}, 0x8, 0x7, 0x1, 0x0, 0x1ff}}, &(0x7f0000000180)=0xb0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000001c0)={r2, 0x8}, &(0x7f0000000300)=0x8) ioctl(r0, 0x100000890f, &(0x7f0000000080)="0a5c2d023c126285718070") r3 = shmget$private(0x0, 0x1000, 0xc, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) r4 = socket(0x400000000010, 0x3, 0x0) write(r1, &(0x7f0000000200)="2400000021002551075c0165ff0ffc020a00000000100f0007e1000c0800060000000000bc0000008f3943793a5ea67658cb22d900000000d808c96ecc2ecec777433b00003ad4b97dc8f8b550e66a2bff77c4931da84157f7a733686a22fd8169f6b6b4f464e0c05df670d851f785ea2b85d32b3583d87124da3bb0b9e2cc000000dcce1fb4ac2cbd48c8378a3ad82a5b83c01295723da595c4831f65123819e204853d48a5a6bd525801d5cae983cf4544a9c4c396f36e85787a8efc32e0015c85ead2b748bc6a5fefc4e53543f9f65e3da31a110af1acb78ce510c7a70766", 0xe0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r4, 0x800442d4, &(0x7f0000000000)=0x1f) 18:30:03 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfx\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 864.236836][ T486] FAT-fs (loop2): bogus number of reserved sectors [ 864.251862][ T486] FAT-fs (loop2): Can't find a valid FAT filesystem 18:30:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xae010000, 0x0) 18:30:03 executing program 0: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0xfff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000100)={r3, @in={{0x2, 0x4e21, @remote}}, 0x5, 0x7fffffff}, &(0x7f00000001c0)=0x90) r4 = inotify_add_watch(r0, &(0x7f00005eaff6)='./control\x00', 0x8) inotify_rm_watch(r0, r4) msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000000)={0xffd1, 0x10000}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000d19ff4)={0x80000001}) [ 864.314885][ T493] JFS: Cannot determine volume size [ 864.331929][ T493] JFS: discard option not supported on device [ 864.353523][ T493] JFS: Cannot determine volume size 18:30:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$notify(r0, 0x402, 0x4) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x2}]]}}}]}, 0x3c}}, 0x0) [ 864.372511][ T500] FAT-fs (loop2): bogus number of reserved sectors [ 864.383131][ T493] JFS: discard option not supported on device [ 864.391030][ T500] FAT-fs (loop2): Can't find a valid FAT filesystem 18:30:03 executing program 0: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0xfff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000100)={r3, @in={{0x2, 0x4e21, @remote}}, 0x5, 0x7fffffff}, &(0x7f00000001c0)=0x90) r4 = inotify_add_watch(r0, &(0x7f00005eaff6)='./control\x00', 0x8) inotify_rm_watch(r0, r4) msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000000)={0xffd1, 0x10000}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000d19ff4)={0x80000001}) [ 864.423815][ T493] jfs: Unrecognized mount option "epid=00000000000000000000" or missing value 18:30:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:03 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) r2 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-twofish-3way\x00'}, 0x58) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'sit0\x00', 0x1}, 0x18) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x2201, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000000c0)) [ 864.473459][ T510] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 864.494203][ T511] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 18:30:03 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'esid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xbe010000, 0x0) 18:30:03 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x2008000) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000000), 0x4) sendfile(r0, r2, 0x0, 0x80000000000d) 18:30:03 executing program 5: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000040)={0x8001007, 0x2}) r1 = syz_open_dev$video4linux(&(0x7f0000000340)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915, 0x3}) 18:30:03 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x02', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 864.725209][ T519] FAT-fs (loop2): bogus number of reserved sectors [ 864.739046][ T525] JFS: Cannot determine volume size [ 864.748372][ T525] JFS: discard option not supported on device [ 864.756324][ T525] JFS: Cannot determine volume size [ 864.759119][ T519] FAT-fs (loop2): Can't find a valid FAT filesystem [ 864.765756][ T525] JFS: discard option not supported on device [ 864.795681][ T525] jfs: Unrecognized mount option "esid=00000000000000000000" or missing value 18:30:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xc0000001, 0x0) 18:30:04 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x140) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="ac1414aae0000001010000000600000000000000ac1414bbac1e0001ac14141a100000"], 0x1) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000440)=0xffffffffffffff91) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, 0x0) fremovexattr(r0, &(0x7f0000000080)=@random={'security.', '{\x1b:\x00'}) rt_sigprocmask(0x0, 0x0, &(0x7f0000000140), 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x80) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380)={0x3f, 0xc60, 0x202, 0xfffffffffffffffe, 0x200, 0x8, 0x5, 0x5}, 0x20) select(0x40, &(0x7f00000002c0)={0x8, 0x4, 0x401, 0x7f, 0x0, 0x2, 0x2, 0x7fffffff}, &(0x7f0000000300)={0xfffffffffffffe01, 0x5, 0x1, 0x3, 0x7, 0x4836, 0x8, 0x7}, &(0x7f0000000340)={0x0, 0x3, 0x400, 0x7cb, 0x2, 0x825, 0x40, 0x3}, &(0x7f0000000400)) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, 0x0, 0x0, 0x0) prctl$PR_GET_FP_MODE(0x2e) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) write$tun(r2, &(0x7f0000000500)=ANY=[@ANYRESDEC], 0x1) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x800028e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4fe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f0000000100)) close(r3) ioctl$int_in(0xffffffffffffffff, 0x80000080045017, 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000d00)=ANY=[@ANYBLOB="000059fdf68d2575ffd500193632cc350000000000e507000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700000000080000070000000000000000000000009000007903000000000000010000000000000000000000000000000000000000000000000000000000000008000000ffffff7f0100000000000000ff0000000000000003000000000000000600000000aa717814de14916b864d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a991f5410000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000cdbb0000000000000000000000000000000000004a23cdfe6cafdc13669de7192697bdb252e0d6b0197e26acc1c02b24c5173d7a6588f6b560cf453ff4a3b3e870879252138f1d1d5833ab18a5a8c391ae6c1e7d0ee401352d75cba3eb99c153f996317638fe19b54c23a7565f94c1c5fb081c87b1e2365805ba3b380939ee51419a40c5e297b8b7cc2016e3de3a70cd5fe2c4ded258fff2eb08fa9f0df502d440c3bf264a779afe812c5c7a10897ff3731917a13bb58a1b2326bfabafcc52ee30b890825cf15ebb96128db0da2ee83e718e0e904c935c7c6fd6c7b78ee12463852e39c28be1d92b2a6752a969682efc12ae81f4fbefcff8ee84008000000000000055ff82c841c65451d245799dc49cb33eb375c727b17163d93d90c113138a7f69"]) [ 864.898469][ T536] FAT-fs (loop2): bogus number of reserved sectors [ 864.933057][ T536] FAT-fs (loop2): Can't find a valid FAT filesystem 18:30:04 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'exid'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x10', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:05 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x140) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="ac1414aae0000001010000000600000000000000ac1414bbac1e0001ac14141a100000"], 0x1) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000440)=0xffffffffffffff91) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, 0x0) fremovexattr(r0, &(0x7f0000000080)=@random={'security.', '{\x1b:\x00'}) rt_sigprocmask(0x0, 0x0, &(0x7f0000000140), 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x80) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380)={0x3f, 0xc60, 0x202, 0xfffffffffffffffe, 0x200, 0x8, 0x5, 0x5}, 0x20) select(0x40, &(0x7f00000002c0)={0x8, 0x4, 0x401, 0x7f, 0x0, 0x2, 0x2, 0x7fffffff}, &(0x7f0000000300)={0xfffffffffffffe01, 0x5, 0x1, 0x3, 0x7, 0x4836, 0x8, 0x7}, &(0x7f0000000340)={0x0, 0x3, 0x400, 0x7cb, 0x2, 0x825, 0x40, 0x3}, &(0x7f0000000400)) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, 0x0, 0x0, 0x0) prctl$PR_GET_FP_MODE(0x2e) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) write$tun(r2, &(0x7f0000000500)=ANY=[@ANYRESDEC], 0x1) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x800028e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4fe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f0000000100)) close(r3) ioctl$int_in(0xffffffffffffffff, 0x80000080045017, 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"]) 18:30:05 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x03', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xc0ed0000, 0x0) [ 866.156736][ T653] JFS: Cannot determine volume size [ 866.162311][ T653] JFS: discard option not supported on device [ 866.182548][ T653] JFS: Cannot determine volume size [ 866.192658][ T653] JFS: discard option not supported on device 18:30:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000001c0)={0x0, r1/1000+30000}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000180)=0x80000000002, 0x93) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000240)={0x0, 0x0, 0x5}, 0x14) sendto$inet(r0, &(0x7f0000000100), 0xfffffffffffffdf4, 0x0, 0x0, 0x2400000000000000) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000280)="fae6432240c6faa44e4c036a13db2c1a820d9eacc57a7dd99bfb8d80924a0f081796ad2e61cc779acdae83b909e5c76c0404916579277e00596720a81e793d3d770543e018caca6bc0da0b0bf00630c972682073740fcb457f68c7521acf20672b19d288980341b0dfde2d8adcc7a5b6aed262d802b206aa7daa74166f56d9cfa05f70451a01f895d9f31f0f12b36a4e19570a9e06b7b4fa8118cc1ee67469532d9f17d5edb1556afa656fb8c69f826aff857d680b6edd2f4e70bd5cc5c0fd72c3767286705b63651362afa5af1376b59562a748970b41ee255d45b91ffb4664aca8addf43f0d46dc063fc857211ed59569e78b58e612c10ba1e0fb2ef7d", 0xfe}, {&(0x7f0000000380)="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", 0x1000}], 0x2) [ 866.199057][ T653] jfs: Unrecognized mount option "exid=00000000000000000000" or missing value 18:30:05 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'eu\nd'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:05 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$GETVAL(0x0, 0x1, 0xc, &(0x7f0000000340)=""/35) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video0\x00', 0x2, 0x0) fanotify_init(0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000002080)=""/4096) r1 = socket$inet(0x2b, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback, 0x8}, 0x1c) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001040)=ANY=[], 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x80000, 0x0) ioctl$VIDIOC_G_JPEGCOMP(r2, 0x808c563d, &(0x7f0000000380)) setsockopt$nfc_llcp_NFC_LLCP_RW(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) r3 = accept(r1, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000140), 0x4) [ 866.444239][ T679] JFS: Cannot determine volume size [ 866.454258][ T679] JFS: discard option not supported on device [ 866.485036][ T679] JFS: Cannot determine volume size [ 866.503029][ T679] JFS: discard option not supported on device [ 866.524048][ T679] jfs: Unrecognized mount option "eu [ 866.524048][ T679] d=00000000000000000000" or missing value [ 866.547162][ T667] XFS (loop4): Invalid superblock magic number 18:30:05 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x04', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x8, 0x0, &(0x7f0000000080)=0x36) getsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000), &(0x7f0000000040)=0x4) 18:30:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xc4000000, 0x0) 18:30:05 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'eu%d'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000003c0)=[@textreal={0x8, &(0x7f0000000240)="ba4300b00bee0f017edaf02114650f1ea7f07f0f20e06635040000000f22e03e0fc72dbaf80c66b80fb2578d66efbafc0cb001ee0fc75ba2f40f3805800060", 0x3f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000000c0)={0x60f9}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, 0x0, &(0x7f0000000380)) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r4, 0x1, 0x70bd26, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40800}, 0x48800) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000080)={0x0, 0xf8}, &(0x7f0000000100)=0x8) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 866.766345][ T689] FAT-fs (loop2): bogus number of reserved sectors [ 866.789498][ T689] FAT-fs (loop2): Can't find a valid FAT filesystem 18:30:05 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001980)={&(0x7f0000001940)={0x38, r1, 0x21, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x1c, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'team_slave_0\x00'}}}}}, 0x38}}, 0x0) poll(&(0x7f0000000040)=[{r0}, {r2, 0x2022}, {r2, 0x4}, {r0, 0x5000}], 0x4, 0x3) [ 866.908695][ T802] FAT-fs (loop2): bogus number of reserved sectors [ 866.937797][ T802] FAT-fs (loop2): Can't find a valid FAT filesystem 18:30:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xc9030000, 0x0) [ 867.000518][ T817] Failed to obtain node identity [ 867.000529][ T810] JFS: Cannot determine volume size [ 867.011145][ T810] JFS: discard option not supported on device [ 867.029981][ T810] JFS: Cannot determine volume size [ 867.033875][ T817] Enabling of bearer rejected, failed to enable media 18:30:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x03', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 867.055398][ T810] JFS: discard option not supported on device 18:30:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000003c0)=[@textreal={0x8, &(0x7f0000000240)="ba4300b00bee0f017edaf02114650f1ea7f07f0f20e06635040000000f22e03e0fc72dbaf80c66b80fb2578d66efbafc0cb001ee0fc75ba2f40f3805800060", 0x3f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000000c0)={0x60f9}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, 0x0, &(0x7f0000000380)) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r4, 0x1, 0x70bd26, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40800}, 0x48800) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000080)={0x0, 0xf8}, &(0x7f0000000100)=0x8) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 867.110849][ T810] jfs: Unrecognized mount option "eu%d=00000000000000000000" or missing value 18:30:06 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x05', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:06 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x3, 0x38400) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x8, {{0x2, 0x4e22, @remote}}}, 0x88) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000040)={0x8001002}) 18:30:06 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'eui\n'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xcc030000, 0x0) 18:30:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat6', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:06 executing program 5: pipe(&(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) flock(r0, 0x4000000002) flock(r0, 0x7fffffffffeffffd) [ 867.418393][ T1011] JFS: Cannot determine volume size 18:30:06 executing program 0: r0 = socket(0x2, 0x3, 0x80000000000f) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f00000000c0)="1f0000000104ff00fd4354c007110000f305010008000300060423dcffdf00", 0x1f) [ 867.448778][ T1011] JFS: discard option not supported on device [ 867.474145][ T1011] JFS: Cannot determine volume size 18:30:06 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x301, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x4000, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x2, 0x80) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f00000000c0)=r2) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f0000000100)) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xa4, r3, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x4}, @NBD_ATTR_SOCKETS={0x24, 0x7, [{0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r2}, {0x8, 0x1, r0}]}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x2}, @NBD_ATTR_SOCKETS={0x2c, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r2}, {0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r1}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0xa4}, 0x1, 0x0, 0x0, 0x814}, 0x4000000) socketpair(0x7, 0x802, 0xfffffffffffffff7, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000340)) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000400)=0xffffffff00000001) prctl$PR_SET_TIMERSLACK(0x1d, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000440)='trusted.overlay.redirect\x00', &(0x7f0000000480)='./file0\x00', 0x8, 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000500)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000640)={@empty, 0xc, r6}) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000680)={0x1, 0xfffffffffffff801, 0x8, 0x0, 0x0, [{r4, 0x0, 0x1ff}, {r1, 0x0, 0x7}, {r5, 0x0, 0x57ff}, {r4, 0x0, 0x68}, {r1, 0x0, 0x800}, {r2, 0x0, 0x3}, {r2, 0x0, 0x100000001}, {r4}]}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000007c0), &(0x7f0000000800)=0x4) fsetxattr$security_smack_transmute(r1, &(0x7f0000000840)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000880)='TRUE', 0x4, 0x2) ioctl$VIDIOC_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f00000008c0)={0x0, 0x0, [], @raw_data=[0x506, 0x3a4511c4, 0x5, 0x7ff, 0x9, 0xffffffffffffc134, 0x4, 0x2, 0xffff, 0x1, 0x1, 0x80000000, 0x4, 0xffffffffffff8730, 0x7, 0x78000000000, 0x101, 0x8000, 0xe576, 0x4, 0x303, 0x4, 0x100, 0x5, 0x1, 0x4a, 0x40, 0x53, 0x3, 0x0, 0x200, 0xffffffff]}) prctl$PR_GET_TSC(0x19, &(0x7f0000000980)) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000a00)={0x0, {0x2, 0x4e20, @empty}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x4, 0x0, 0x0, 0x0, 0xf0, &(0x7f00000009c0)='veth0_to_hsr\x00', 0x4, 0x3, 0x1}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000a80)={0x0, 0x5}, &(0x7f0000000ac0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000b00)={r7, @in6={{0xa, 0x4e20, 0x993, @mcast2, 0x7}}, 0x9, 0x7, 0x94}, 0x98) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000bc0)={0xb78d}) r8 = syz_open_dev$vbi(&(0x7f0000000c00)='/dev/vbi#\x00', 0x1, 0x2) ioctl$IMGETDEVINFO(r4, 0x80044944, &(0x7f0000000c40)={0x1}) userfaultfd(0x800) ioctl$KVM_GET_MP_STATE(r1, 0x8004ae98, &(0x7f0000000cc0)) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r8, 0x110, 0x5, &(0x7f0000000d00)=[0x3, 0x3], 0x2) fcntl$F_GET_FILE_RW_HINT(r5, 0x40d, &(0x7f0000000d40)) [ 867.499138][ T1011] JFS: discard option not supported on device [ 867.517723][ T1011] jfs: Unrecognized mount option "eui [ 867.517723][ T1011] =00000000000000000000" or missing value 18:30:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000340)) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40080, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f0000000080)={0x2, 0x3}) 18:30:06 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x06', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:06 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'eui%'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:06 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000400)='tls\x00', 0xfffffffffffffe73) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, 0x0) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000940)={{}, {}, [], {}, [{0x8, 0x2}, {0x8, 0x0, r3}, {0x8, 0x2, r3}, {}], {0x10, 0x2}}, 0x44, 0x1) chdir(&(0x7f0000000340)='./file0\x00') ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000680)=ANY=[@ANYBLOB="0100dc00a1e00915523755a7a722c06087d4298eae88a722ee35db87f7f62b66bd0a8dbaaa5f247f16c3dcf4b43a085cbcb5d3f1f18f6556b3163defcd9ae2e06ca9b4f837465745a705808d17cd072985d2407195e18ba8d52db4775cbded74a3b124e583a5226f46159802d0f5c67b7a26491d55e5d0ce19945dcf9e9ebfc15733674ed103d8074097d4e451a1c6eda96df31ce136f9385e5f73d5ffffa4e16d7bc15a5be75cfc1e2610b822492ce7ce67d6925f2cd7087caa64a9987480c0f2d1e9d4a88afa5919c2e0be17c3202f804114e58963a77a64cfeef49dc32cd2"]) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') setsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f00000004c0)="1356cf5b7f18c0bc3ea00a1158887ae1def895d5bf7f2c40dd57ae7d174493361d9809c28b74a4f738e2802ec6b7ae73ad8f672dda6841bb2e9fb86b7362345125d7deccb16eef400ce3c5ec546b", 0x4e) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) bind$xdp(r1, &(0x7f0000000100)={0x2c, 0x6, r4, 0xe, r1}, 0x10) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000900)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x10) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x53, 0x2, 0x0, 0x9, 0x5, 0xaf4}, 0x20) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000540)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0/file0\x00', 0x0, 0x8}, 0x10) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000000)={0x0, 0x2}) 18:30:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xe4030000, 0x0) 18:30:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 867.814598][ T1191] JFS: Cannot determine volume size [ 867.832728][ T1191] JFS: discard option not supported on device [ 867.867860][ T1191] JFS: Cannot determine volume size 18:30:07 executing program 5: setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x765) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) close(r0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000000c0)={'ip6gretap0\x00', 0xd87}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x140, 0x0) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f0000000080)={0x1ff, 0x9, 0x8, 0x80000001, 0x43, 0x10001}) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000180)=0x6, 0xffffffffffffffe9) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000140)={0x0, @speck128, 0x1, "cf8996581e842f77"}) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000000000000000000cb6cbeb7ba08080dec551ad5bdd01091fed88e127b9c08b8e34fe6353939e36936a3a29d4dce5b968a94b851ff2cc61820a96d477643b9da64e4589e77d725fec60169d27d65994ce4c66bd2538ec734c0007ce2b0298811c0c68b0974028bdd29c1"], 0x1}}, 0x5000000) [ 867.914920][ T1191] JFS: discard option not supported on device [ 867.939569][ T1191] jfs: Unrecognized mount option "eui%=00000000000000000000" or missing value 18:30:07 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x406042, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000080)={0x3e, @loopback, 0x4e24, 0x2, 'lblcr\x00', 0x10, 0x5, 0x43}, 0x2c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xb, &(0x7f0000000000), 0x4) 18:30:07 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\a', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:07 executing program 5: setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x765) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) close(r0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000000c0)={'ip6gretap0\x00', 0xd87}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x140, 0x0) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f0000000080)={0x1ff, 0x9, 0x8, 0x80000001, 0x43, 0x10001}) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000180)=0x6, 0xffffffffffffffe9) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000140)={0x0, @speck128, 0x1, "cf8996581e842f77"}) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000000000000000000cb6cbeb7ba08080dec551ad5bdd01091fed88e127b9c08b8e34fe6353939e36936a3a29d4dce5b968a94b851ff2cc61820a96d477643b9da64e4589e77d725fec60169d27d65994ce4c66bd2538ec734c0007ce2b0298811c0c68b0974028bdd29c1"], 0x1}}, 0x5000000) 18:30:07 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'eui.'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:07 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) syz_init_net_socket$rose(0xb, 0x5, 0x0) poll(&(0x7f0000000000)=[{r1}], 0x1, 0x1) 18:30:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f0000000080)={@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x3, 0x6, 0x5, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @default, @default, @default, @default, @bcast]}) r1 = socket$inet6(0xa, 0x1000000000003, 0x3) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000140)={'bridge0\x00\x0f\x00\x00\x80\x00', &(0x7f0000000100)=@ethtool_cmd={0x7, 0x0, 0x709000, 0x0, 0x0, 0x0, 0x2}}) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000180)={'filter\x00', 0x7, 0x4, 0x448, 0x248, 0x0, 0x118, 0x360, 0x360, 0x360, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x5, 0x7fff}}}, {{@uncond, 0xf0, 0x130}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x3, 0x5}}}, {{@arp={@local, @broadcast, 0x0, 0x0, @mac, {[0xff, 0x0, 0xff, 0x0, 0xff]}, @mac=@random="485ced55787c", {[0x0, 0xff, 0x0, 0xff, 0xff, 0xff]}, 0xffff, 0x8, 0x5, 0x3, 0x8, 0x6, 'irlan0\x00', 'bond0\x00', {0xff}, {0xff}, 0x0, 0x80}, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x498) setsockopt$inet6_buf(r1, 0x29, 0xec, &(0x7f0000000640)="e3147a6121654eb5febe359847834d5519ae3b549b2b64ff1fe77f878b3a4283047cee4ceb1ff0623c3b31b914013812db7997b0a5c500a342fdfd602bc76fe1647a57668c1bc989cf3b818400d557633a219f4fa633e722fb9d6b94b50774923a30ca989fdbda4489487eb13b3b24f6b56f48fec668e6b05cee49b368ea77e50f66293a684bcc5fedeebbb48026779413ebc45592eabaf26c188337b571575b0693a14b852c5a22edc396208d1c3259b701ded74d92e92a6eb4dc672e0578c4c298917de89a581331e1ca46e379a08e617771dc2256b0fdd0e75abead97e930d190ccfb772de4c7619917707613ccb39c6e99916c", 0xf5) 18:30:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xf4000000, 0x0) 18:30:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:07 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x14, 0x4, 0x4000000004, 0x200003605, 0x4, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x17) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7ff, 0x8800) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000040)={0x3ff, 0x7, 0x5, 0x80}, 0x10) 18:30:07 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r1 = open(0x0, 0x0, 0x4) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) getresuid(&(0x7f0000000240), 0x0, &(0x7f00000002c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0xa94, 0x0, 0xffffffffffffffff, 0x0, [0x7, 0x0, 0x0, 0x0, 0x320]}, 0x2c) clock_gettime(0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000540)=ANY=[@ANYBLOB="59cc9ee6e8e1164f1c10fcad86dd6006f5260008110000f40000000000000000386b00000000ff0200000000000000b5a5fa493130eeac468721000000000000010000000000089078ecfd301f26c77a02c9a24e85b9c147ecd94362bd8fc8371839d9e53dca44a2d5796b068c6c3f6b19b4f220affad5e94cd274fb868df4915f47edaf7d8d41f7313e811c3a70f50b49cd0de4519aff24b00ccc2af6c0893aad01474cf117ca3eb29b5b663b3e807dc6ad3d7a482e8871343b020e4f627f753f314665515d1d03822ddafe433e713f3404a91d27452093c17020b41afe06fe1cb7fb9fd98295d7d70719ff196e86c68be1c4cccdf8fdb2bfa212a9c091f7137ad879a33700abed265327d9c97e53a19a9ae77103955402990cf4271163c55b8480c04eabbe8e37a97f3acc56c54ed6ce78a2e512466801db1e12aee9f688b0577a8f9eb1e91880f8f30aee0a85e2415dd534bbc16a6bd441e4b56d4d15ecd2f731d20904aa65ac4a3437c737299d2497d248271a51781a76f66402759b39652467986b95f7"], 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f00000000c0)={0x4923, 0x0, 0x4000, 0x400, 0xfff, 0xfff, 0x3, 0x100, 0x1ff, 0xffffffffffffffff}, 0x10) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x101800, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8000, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000380)={'ip6gre0\x00', @remote}) setsockopt$llc_int(r3, 0x10c, 0x8, &(0x7f0000000300), 0x4) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000000)={0x1, 0x2}) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000100)) r5 = getpgrp(0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000700)={0x2234, 0x13, 0xa, 0xc00, 0x70bd29, 0x25dfdbfe, {0x5, 0x0, 0xa}, [@generic="ab5debce2ca03f812f808b6991dff16ade82b332d3b59bfb5c438cebffa361342e7531b00bfd47cc21c6693c1a2d130eddc6821a59f2cc3ce3803c38c77278825fece83c6249f0e95d808a83a51c4d063a950e0916675c3be4cac9e34a92d4376a", @generic="0d2af5a6b0ce2437ea2d12ddbd8a8978b2e1e592f5e35b58b39f19850bab9ea58af6b14dbedecf92c48548fff185d551bf6ec1d73fdce55886202ffc99f0da3c13913f2f61c89522a0da99f24034a8d10320b8379e8936cb3165cbefd165c99e4a4d1090414b04ecd49f222f77a6f92875931b78", @nested={0x102c, 0x1e, [@generic="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", @generic="72fa16e44bdc0d268a2c18b31491129c04315dbb73a551162f1bc625a0b81c", @typed={0x8, 0x1c, @pid=r5}]}, @nested={0x10a0, 0x84, [@generic="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", @generic="2c2fde461630dece644ea3a1927897d95625bf19b6714ccb64438b0703ff64daf068e3c91f90894221913e9904f1ccbd5b59ef38e6f074e9d0a42be592ace45bfd589f00c34b17fd7beae02de2f6166e824f1acf0127e30ab8dfd9ab389918fc9d566b37c2cf86923f95f940e870232055bbfc4d18448af1ec19174a0fc64ecb75f6753f0910055b77fd3dd74c1e49b344405cdbb9", @typed={0x4, 0x28}]}, @typed={0x8, 0x16, @ipv4=@multicast2}, @generic="3464692947c240368efe0cc37bb526d4e85b49918a8c7fb044a0ef12ca0171f060454f7fb0d56d4d36744d114c2ecb4a34521982870345be3ae78f273927e2f1727cdf556b3930ab16c466e6918355d6928ecb9b316274b925ac410736e90f05b9157ea1ae4ef29f2d39a17c7a5799951f346d80ec"]}, 0x2234}, 0x1, 0x0, 0x0, 0x200000c0}, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000080)={0x0, 0x2, 0xffffffff}) ioctl$SIOCX25GCAUSEDIAG(r4, 0x89e6, &(0x7f0000000140)={0x7, 0x8000}) 18:30:07 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\b', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 868.399978][ T1434] JFS: Cannot determine volume size [ 868.416489][ T1434] JFS: discard option not supported on device 18:30:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x84000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, &(0x7f0000000080)="66f30f6f531666b9850400000f32260f015bcc0f20529a255cd20066b9800000c00f326635000800000f3066b8000000000f23c80f21f866350c00e0000f23f8650fc76f0d660feac43e0f608178e8", 0x4f}], 0x1, 0x0, 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2, 0x0) sendmsg$rds(r3, &(0x7f0000000840)={0xfffffffffffffffe, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000200)=""/18, 0x12}, {&(0x7f0000000240)}, {&(0x7f0000000280)=""/6, 0x6}, {&(0x7f00000002c0)=""/143, 0x8f}, {&(0x7f0000000380)=""/202, 0xca}, {&(0x7f0000000480)=""/245, 0xf5}, {&(0x7f0000000580)=""/210, 0xd2}, {&(0x7f0000000680)=""/57, 0x39}], 0x8, &(0x7f00000007c0)=[@fadd={0x58, 0x114, 0x6, {{0x7c5d, 0x81}, &(0x7f0000000740)=0x8, &(0x7f0000000780)=0x8, 0x4, 0x0, 0x1, 0x6, 0x0, 0x7f}}], 0x58}, 0x800) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x2) pause() [ 868.449532][ T1434] JFS: Cannot determine volume size [ 868.455013][ T1434] JFS: discard option not supported on device [ 868.478168][ T1434] jfs: Unrecognized mount option "eui.=00000000000000000000" or missing value 18:30:07 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r1 = open(0x0, 0x0, 0x4) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) getresuid(&(0x7f0000000240), 0x0, &(0x7f00000002c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0xa94, 0x0, 0xffffffffffffffff, 0x0, [0x7, 0x0, 0x0, 0x0, 0x320]}, 0x2c) clock_gettime(0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000540)=ANY=[@ANYBLOB="59cc9ee6e8e1164f1c10fcad86dd6006f5260008110000f40000000000000000386b00000000ff0200000000000000b5a5fa493130eeac468721000000000000010000000000089078ecfd301f26c77a02c9a24e85b9c147ecd94362bd8fc8371839d9e53dca44a2d5796b068c6c3f6b19b4f220affad5e94cd274fb868df4915f47edaf7d8d41f7313e811c3a70f50b49cd0de4519aff24b00ccc2af6c0893aad01474cf117ca3eb29b5b663b3e807dc6ad3d7a482e8871343b020e4f627f753f314665515d1d03822ddafe433e713f3404a91d27452093c17020b41afe06fe1cb7fb9fd98295d7d70719ff196e86c68be1c4cccdf8fdb2bfa212a9c091f7137ad879a33700abed265327d9c97e53a19a9ae77103955402990cf4271163c55b8480c04eabbe8e37a97f3acc56c54ed6ce78a2e512466801db1e12aee9f688b0577a8f9eb1e91880f8f30aee0a85e2415dd534bbc16a6bd441e4b56d4d15ecd2f731d20904aa65ac4a3437c737299d2497d248271a51781a76f66402759b39652467986b95f7"], 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f00000000c0)={0x4923, 0x0, 0x4000, 0x400, 0xfff, 0xfff, 0x3, 0x100, 0x1ff, 0xffffffffffffffff}, 0x10) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x101800, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8000, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000380)={'ip6gre0\x00', @remote}) setsockopt$llc_int(r3, 0x10c, 0x8, &(0x7f0000000300), 0x4) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000000)={0x1, 0x2}) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000100)) r5 = getpgrp(0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000700)={0x2234, 0x13, 0xa, 0xc00, 0x70bd29, 0x25dfdbfe, {0x5, 0x0, 0xa}, [@generic="ab5debce2ca03f812f808b6991dff16ade82b332d3b59bfb5c438cebffa361342e7531b00bfd47cc21c6693c1a2d130eddc6821a59f2cc3ce3803c38c77278825fece83c6249f0e95d808a83a51c4d063a950e0916675c3be4cac9e34a92d4376a", @generic="0d2af5a6b0ce2437ea2d12ddbd8a8978b2e1e592f5e35b58b39f19850bab9ea58af6b14dbedecf92c48548fff185d551bf6ec1d73fdce55886202ffc99f0da3c13913f2f61c89522a0da99f24034a8d10320b8379e8936cb3165cbefd165c99e4a4d1090414b04ecd49f222f77a6f92875931b78", @nested={0x102c, 0x1e, [@generic="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", @generic="72fa16e44bdc0d268a2c18b31491129c04315dbb73a551162f1bc625a0b81c", @typed={0x8, 0x1c, @pid=r5}]}, @nested={0x10a0, 0x84, [@generic="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", @generic="2c2fde461630dece644ea3a1927897d95625bf19b6714ccb64438b0703ff64daf068e3c91f90894221913e9904f1ccbd5b59ef38e6f074e9d0a42be592ace45bfd589f00c34b17fd7beae02de2f6166e824f1acf0127e30ab8dfd9ab389918fc9d566b37c2cf86923f95f940e870232055bbfc4d18448af1ec19174a0fc64ecb75f6753f0910055b77fd3dd74c1e49b344405cdbb9", @typed={0x4, 0x28}]}, @typed={0x8, 0x16, @ipv4=@multicast2}, @generic="3464692947c240368efe0cc37bb526d4e85b49918a8c7fb044a0ef12ca0171f060454f7fb0d56d4d36744d114c2ecb4a34521982870345be3ae78f273927e2f1727cdf556b3930ab16c466e6918355d6928ecb9b316274b925ac410736e90f05b9157ea1ae4ef29f2d39a17c7a5799951f346d80ec"]}, 0x2234}, 0x1, 0x0, 0x0, 0x200000c0}, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000080)={0x0, 0x2, 0xffffffff}) ioctl$SIOCX25GCAUSEDIAG(r4, 0x89e6, &(0x7f0000000140)={0x7, 0x8000}) 18:30:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xf4010000, 0x0) 18:30:07 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'eui/'}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 868.809780][ T1678] JFS: Cannot determine volume size 18:30:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:07 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x0) r1 = socket(0x1d, 0x2, 0x6) getsockopt$inet_tcp_int(r1, 0x6, 0x9, &(0x7f0000000100), &(0x7f0000000280)=0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'veth0\x00', 0x0}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x100, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, &(0x7f0000000080)=0x7, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$HCIINQUIRY(r0, 0x800448d2, &(0x7f00000001c0)={r3}) name_to_handle_at(r5, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="2100000000000000070000faffffffaaff3f5af77f971e73fa0ab5812a69546d95c4e54a0450bf08"], &(0x7f0000000240), 0x3fc) setsockopt$bt_hci_HCI_FILTER(r5, 0x0, 0x2, &(0x7f00000000c0)={0x2, 0x4, 0x4, 0x80000000}, 0x10) [ 868.830881][ T1678] JFS: discard option not supported on device [ 868.838251][ T1678] JFS: Cannot determine volume size [ 868.855464][ T1678] JFS: discard option not supported on device [ 868.867528][ T1678] jfs: Unrecognized mount option "eui/=00000000000000000000" or missing value 18:30:08 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\t', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xf5ffffff, 0x0) [ 869.024962][ T1689] can: request_module (can-proto-6) failed. 18:30:08 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid', 0xa}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:08 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x2) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r2, &(0x7f0000000000)=@hat={'changehat ', 0x1, 0x5e, ['.GPLppp0posix_acl_access\x00']}, 0xfffffffffffffead) 18:30:08 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 869.281280][ T1802] JFS: Cannot determine volume size [ 869.304764][ T1802] JFS: discard option not supported on device [ 869.319587][ T1802] JFS: Cannot determine volume size [ 869.329571][ T1802] JFS: discard option not supported on device [ 869.341174][ T1802] jfs: Unrecognized mount option "euid [ 869.341174][ T1802] 00000000000000000000" or missing value 18:30:08 executing program 5: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f0000000080)="145865835c4489e8ceabb12995f9608f96f7ff92963d8833b5f7238963c24c2ca8f4e64112e9767b0c2e9258cc19cfef68", 0x31) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) poll(&(0x7f0000000000)=[{}], 0x1, 0x0) 18:30:08 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)=0x0) sched_setscheduler(r0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x0}, {}]}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000300)={r3, 0x3, &(0x7f0000000180)=[0x9, 0x9, 0x501], &(0x7f00000001c0)=[0x7fffffff, 0x8], 0x42, 0x1, 0x2, &(0x7f0000000240)=[0x7], &(0x7f00000002c0)=[0x3, 0x8, 0x1, 0xa8, 0x991cb3a, 0x3, 0x7fffffff, 0xe7e0]}) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @rand_addr, 0x3}, 0x1c) listen(r2, 0x18) r4 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 18:30:08 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\n', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xf6000000, 0x0) 18:30:08 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid', 0x43}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:08 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r0, 0x0) semop(0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_pts(r1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r2, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0xffffffffffffffff, 0x6}) time(0x0) socket$nl_generic(0x10, 0x3, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67724fdf75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount(&(0x7f00000008c0)=@md0='/dev/md0\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x2000023, &(0x7f00000006c0)='\x8auU{-\x154\x05-\xab\xc0\xcb\x1an\xd76*5\xec2c\x9f\xcf\xb8\xb6v\x9aA\x06K\x95\xd4dx#\xf8\x90\r\xf1S\xc4\xc2\a\b\x03^\xe6b\x03\xaal)eb,z4\xc9\xe8\x11Y\xacV') 18:30:08 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff, 0x0) [ 869.756926][ T1934] JFS: Cannot determine volume size [ 869.768854][ T1934] JFS: discard option not supported on device [ 869.780429][ T1934] JFS: Cannot determine volume size [ 869.787260][ T1934] JFS: discard option not supported on device [ 869.794317][ T1934] jfs: Unrecognized mount option "euidC00000000000000000000" or missing value 18:30:08 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)=0x0) sched_setscheduler(r0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x0}, {}]}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000300)={r3, 0x3, &(0x7f0000000180)=[0x9, 0x9, 0x501], &(0x7f00000001c0)=[0x7fffffff, 0x8], 0x42, 0x1, 0x2, &(0x7f0000000240)=[0x7], &(0x7f00000002c0)=[0x3, 0x8, 0x1, 0xa8, 0x991cb3a, 0x3, 0x7fffffff, 0xe7e0]}) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @rand_addr, 0x3}, 0x1c) listen(r2, 0x18) r4 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 18:30:09 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x10', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:09 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r0, 0x0) semop(0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_pts(r1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r2, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0xffffffffffffffff, 0x6}) time(0x0) socket$nl_generic(0x10, 0x3, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67724fdf75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount(&(0x7f00000008c0)=@md0='/dev/md0\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x2000023, &(0x7f00000006c0)='\x8auU{-\x154\x05-\xab\xc0\xcb\x1an\xd76*5\xec2c\x9f\xcf\xb8\xb6v\x9aA\x06K\x95\xd4dx#\xf8\x90\r\xf1S\xc4\xc2\a\b\x03^\xe6b\x03\xaal)eb,z4\xc9\xe8\x11Y\xacV') 18:30:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:09 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid', 0x63}}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xf9fdffff, 0x0) 18:30:09 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs#', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 870.367732][ T2066] JFS: Cannot determine volume size [ 870.376258][ T2066] JFS: discard option not supported on device 18:30:09 executing program 0: r0 = memfd_create(&(0x7f0000000400)='[\x00', 0x7) write$cgroup_int(r0, &(0x7f0000000040), 0x5) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) getsockopt$inet_tcp_int(r1, 0x6, 0x3f, &(0x7f00000000c0), &(0x7f0000000100)=0x4) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ppoll(0x0, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0, 0x0) [ 870.418637][ T2066] JFS: Cannot determine volume size [ 870.439439][ T2066] JFS: discard option not supported on device [ 870.445710][ T2066] jfs: Unrecognized mount option "euidc00000000000000000000" or missing value 18:30:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xfc030000, 0x0) 18:30:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:09 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}, 0x39}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:09 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f0000000080)={0x3, 0x1, [0x4, 0x8, 0x68, 0xffffffff80000001, 0xfffe00, 0x9, 0x215]}) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x400, 0x4000) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000300)=""/204) 18:30:09 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfffffffffffffffd, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x44000) prctl$PR_SVE_SET_VL(0x32, 0x2da2b) [ 870.681896][ T2186] JFS: Cannot determine volume size [ 870.696771][ T2186] JFS: discard option not supported on device [ 870.709307][ T2186] JFS: Cannot determine volume size [ 870.714786][ T2186] JFS: discard option not supported on device [ 870.722536][ T2186] jfs: Unrecognized mount option "euid=000000000000000000009subj_type=ip6tnl0" or missing value 18:30:09 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfsH', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xfcfdffff, 0x0) 18:30:10 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}, 0x43}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:10 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:10 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="1a605ca56f2e01a48703821e0a57fa201ce337f664013df224d0cd15ecbf8e7ad9c712787fe08108c8019552fb76cb317ed13887a6fed2914f46a5a4a77fad525aa0a5777ea8514ed0a2ff3337b0d590ce9b2a503188c9529006590fe2262513a0885df5bf6098e77a8d20037cdcb7cb74a2d6acbec14615a3602161b655598aa2bdd0d776896efcf158608d5aa45a4f49e17b29bf09e6ef11dc96048e1e3036cd60c18f19945b71ce4adb1ff7068a0caa7ef5e208c6813fa14e53e07ce7af3b0f84cf97d0f0b4072da56642c0b5fd128bc195e34e0e0f758bb6e33aaa9280ea8c84e9b01dfcae9270c24f0b"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, &(0x7f0000000140)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, 0x0, &(0x7f0000000600)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000500)={0x7, 0x26, 0x2, 0x10001, 0x0, 0x4, 0x400, 0x2}, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x80, 0x0) io_cancel(0x0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x7, 0x0, r1, 0x0, 0x0, 0x6651, 0x0, 0x0, r2}, 0x0) keyctl$join(0x1, &(0x7f0000000000)={'syz'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40042406, &(0x7f0000000280)='/dev/ion\x00') r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000080)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x40086200, &(0x7f0000000240)=0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @remote}, 0x1c) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000400)={0x2, &(0x7f00000002c0)=[{}, {}]}) r5 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r5, 0x114, 0x3, &(0x7f00000001c0)={{0x3ac, 0x1}}, 0x10) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in=@remote, @in6=@local}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x40, &(0x7f0000000040), 0x111, 0xb}}, 0x20) ioctl$VIDIOC_QUERY_DV_TIMINGS(0xffffffffffffffff, 0x80845663, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0) 18:30:10 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x11) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xfffffffffffffffe, 0x2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) r3 = getgid() r4 = geteuid() r5 = getgid() r6 = getuid() r7 = getgid() fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000340)={0x2a0, 0x0, 0x7, [{{0x6, 0x3, 0x2dd, 0x9, 0x4000000000000, 0xffffffffffff4c76, {0x1, 0x3, 0x0, 0x0, 0x0, 0x8, 0xffffffff, 0x800, 0x210569df, 0x4, 0x0, r2, r3, 0x100, 0x5}}, {0x3, 0x2, 0xa, 0xfff, '/dev/ptmx\x00'}}, {{0x5, 0x1, 0x9, 0xc60, 0x8, 0x3, {0x0, 0x4a0, 0x9, 0x98e, 0x20, 0x4, 0xb62, 0xff, 0x5, 0x7f, 0x7, r4, r5, 0x9a1, 0x800}}, {0x4, 0x4040000000, 0xa, 0x744, '/dev/ptmx\x00'}}, {{0x6, 0x0, 0x6, 0x8, 0x7ff, 0x1, {0x4, 0x2, 0x0, 0x100000000, 0x7, 0x358, 0x5, 0x5, 0x3, 0x5, 0x2, r6, r7, 0x9, 0x8cc}}, {0x5, 0xfffffffffffffffe, 0xa, 0x6, '/dev/ptmx\x00'}}, {{0x4, 0x2, 0x80000000, 0x3, 0x7f, 0xfffffffffffffc01, {0xff, 0x8000, 0x1, 0x6, 0x0, 0x3, 0x3, 0x9, 0x9, 0x8, 0xc21d, r8, r9, 0x4, 0x6}}, {0x5, 0x100000001, 0x0, 0xe1fe}}]}, 0x2a0) ioctl$TCFLSH(r0, 0x40087101, 0x0) [ 871.071214][ T2313] JFS: Cannot determine volume size [ 871.106109][ T2313] JFS: discard option not supported on device [ 871.133599][ T2313] JFS: Cannot determine volume size 18:30:10 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfsL', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 871.154818][ T2313] JFS: discard option not supported on device 18:30:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xfd030000, 0x0) [ 871.188553][ T2313] jfs: Unrecognized mount option "euid=00000000000000000000Csubj_type=ip6tnl0" or missing value 18:30:10 executing program 5: set_mempolicy(0x4002, &(0x7f0000000380), 0x9) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x1) fcntl$setstatus(r0, 0x4, 0x44000) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000080)={0x92b0cd8e16f854d, {}, 0x200000000010001, 0x4000000000400}) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000100)=0x0) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f0000000140)={0x42, "80078da067331c997e0db0213475cab391fee187302101ffeca81f64c8d50a6f418e55f701afc35873257bb4512a3397435e6e98a591a79bcc385a482b3ea6ae5d88dc0be0869d1f0d6f09db90585126bf1f8e008a7404c7f028fca67fabb5ea365edb21b361626ba1ea1f1aa002586b39ee64c218d344f13da02a0fbd5f4feb"}) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x8040000a70c0300, 0x0, 0x8, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) r2 = request_key(&(0x7f0000000280)='ceph\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000440)=',,\x00', 0x0) keyctl$set_timeout(0xf, r2, 0x100000080) 18:30:10 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:10 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}, 0x4c}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xfdfdffff, 0x0) 18:30:10 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfsh', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 871.562158][ T2448] JFS: Cannot determine volume size [ 871.567823][ T2448] JFS: discard option not supported on device [ 871.639451][ T2448] JFS: Cannot determine volume size [ 871.663108][ T2448] JFS: discard option not supported on device [ 871.708536][ T2448] jfs: Unrecognized mount option "euid=00000000000000000000Lsubj_type=ip6tnl0" or missing value 18:30:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000200)='tracefs\x00', 0x0, 0x0) 18:30:11 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:11 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}, 0x63}, {@subj_type={'subj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 871.930747][ T3428] ion_buffer_destroy: buffer still mapped in the kernel 18:30:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f0000, 0x0) [ 872.108348][ T2469] JFS: Cannot determine volume size [ 872.143192][ T2469] JFS: discard option not supported on device 18:30:11 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfsl', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f00000002c0)="7a809c883e51116b02f8ca9205fe69571b622eaf91a6f03fba1916bc15e63525a3c60285fab28756fd503123a1f26190bde30a614240c681d4e4ac73fdce3e767d25420dbfd7d33bdec586052df61fa18655dd0cc8e8def5d378634e29d6bac544145d994d44251095270b50a27f854f4313c4dd125aed11a224ba07d07754a2e0d808171a5413931011e7c70baecbcb", 0x90) write$P9_RSTAT(r1, &(0x7f0000000000)={0x7f, 0x7d, 0x1, {0x0, 0x78, 0x1, 0x7f, {0x0, 0x2, 0x7}, 0x0, 0x0, 0x1, 0x924b, 0x7, 'system#', 0x5, '-proc', 0x1b, '^vboxnet1]ppp1+GPLtrusted]{', 0x1e, 'cpuset(userwlan0,proc%vboxnet1'}}, 0x7f) [ 872.204892][ T2469] JFS: Cannot determine volume size [ 872.211263][ T2469] JFS: discard option not supported on device [ 872.228950][ T2469] jfs: Unrecognized mount option "euid=00000000000000000000csubj_type=ip6tnl0" or missing value 18:30:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdf9, 0x0) 18:30:11 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) 18:30:11 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'\nubj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:11 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000000)='./control\x00', 0x9) inotify_rm_watch(r0, r1) 18:30:11 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdfc, 0x0) [ 872.696351][ T2503] JFS: Cannot determine volume size [ 872.703496][ T2503] JFS: discard option not supported on device [ 872.703509][ T2503] JFS: Cannot determine volume size [ 872.733028][ T2503] JFS: discard option not supported on device 18:30:11 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) 18:30:11 executing program 0: r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @multicast2}, @in6}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f00000000c0)=0x16) getresuid(&(0x7f0000000100), &(0x7f0000000340), 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@local, @in=@local, 0x4e22, 0x401, 0x4e24, 0x81, 0xa, 0x0, 0x20, 0x3c}, {0x8, 0x2, 0x7, 0xffffffffffffff5c, 0x80000001, 0x3, 0x1ff}, {0x9, 0x0, 0x9, 0x7}, 0x9, 0x0, 0x0, 0x1}, {{@in=@rand_addr=0x9, 0x4d2}, 0x2, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x26}}, 0x34ff, 0x2, 0x2, 0x0, 0x3, 0x0, 0x200020}}, 0xe8) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r2, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 872.739607][ T2503] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 18:30:11 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfst', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xb, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x27}}, &(0x7f0000000240)='GPL\x00\x83\xff\x13\x0f_\xb0\x0e][dCT\xb6\xe2wp\xc5\xa6$\x1e\x8d\xef\xd6S>*\xe1\x06\xbee\\lRcI!l0\xbb\x1f\x80\xfbE\x0e\xc0\xd5\xbe', 0x1, 0x99, &(0x7f0000000440)=""/153}, 0x48) 18:30:12 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat&', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:12 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'#ubj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdfd, 0x0) 18:30:12 executing program 0: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(0x0, &(0x7f0000000340), &(0x7f0000000440)) socket$netlink(0x10, 0x3, 0xa) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) getpid() getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') 18:30:12 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) [ 873.161199][ T2750] JFS: Cannot determine volume size [ 873.166444][ T2750] JFS: discard option not supported on device [ 873.201492][ T2750] JFS: Cannot determine volume size 18:30:12 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfsz', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 873.226035][ T2750] JFS: discard option not supported on device [ 873.251781][ T2750] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 18:30:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff3f, 0x0) 18:30:12 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:12 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'%ubj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:12 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) [ 873.628096][ T2879] FAT-fs (loop2): bogus number of reserved sectors [ 873.653917][ T2879] FAT-fs (loop2): Can't find a valid FAT filesystem [ 873.669909][ T2883] JFS: Cannot determine volume size [ 873.675325][ T2883] JFS: discard option not supported on device 18:30:12 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f, 0x0) [ 873.699541][ T2883] JFS: Cannot determine volume size [ 873.720636][ T2883] JFS: discard option not supported on device [ 873.740547][ T2883] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 18:30:12 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 18:30:12 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:13 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'*ubj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) 18:30:13 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 18:30:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff8c, 0x0) [ 874.005766][ T2903] FAT-fs (loop2): bogus number of reserved sectors [ 874.015788][ T2903] FAT-fs (loop2): Can't find a valid FAT filesystem [ 874.027466][ T2908] JFS: Cannot determine volume size [ 874.033208][ T2908] JFS: discard option not supported on device [ 874.040207][ T2908] JFS: Cannot determine volume size [ 874.052023][ T2908] JFS: discard option not supported on device [ 874.058529][ T2908] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 18:30:13 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:13 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 18:30:13 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'+ubj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:13 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000440)='./bus\x00', 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000001b70880ad002b9a426"]) 18:30:13 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 874.171100][ T2989] FAT-fs (loop2): bogus number of reserved sectors [ 874.190484][ T2989] FAT-fs (loop2): Can't find a valid FAT filesystem [ 874.253321][ T26] audit: type=1804 audit(1550687413.357:51): pid=3030 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir264561459/syzkaller.QqB6G9/1280/bus" dev="sda1" ino=16696 res=1 18:30:13 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 874.299314][ T26] audit: type=1804 audit(1550687413.377:52): pid=3030 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir264561459/syzkaller.QqB6G9/1280/bus" dev="sda1" ino=16696 res=1 18:30:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff5, 0x0) [ 874.380049][ T3028] JFS: Cannot determine volume size [ 874.399671][ T3028] JFS: discard option not supported on device [ 874.405768][ T3028] JFS: Cannot determine volume size 18:30:13 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x400000000000) 18:30:13 executing program 0: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) 18:30:13 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 874.465673][ T3028] JFS: discard option not supported on device [ 874.475547][ T3028] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 18:30:13 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'-ubj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 874.523924][ T3162] FAT-fs (loop2): bogus number of reserved sectors [ 874.550962][ T3162] FAT-fs (loop2): Can't find a valid FAT filesystem 18:30:13 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 874.567331][ T3170] binder: 3169:3170 ERROR: BC_REGISTER_LOOPER called without request 18:30:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff6, 0x0) 18:30:13 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x400000000000) 18:30:13 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 874.715728][ T3179] JFS: Cannot determine volume size [ 874.730369][ T3179] JFS: discard option not supported on device [ 874.741116][ T3183] FAT-fs (loop2): bogus number of reserved sectors [ 874.748608][ T3183] FAT-fs (loop2): Can't find a valid FAT filesystem [ 874.751881][ T3179] JFS: Cannot determine volume size 18:30:13 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000000c0)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 874.766871][ T3179] JFS: discard option not supported on device [ 874.776070][ T3179] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 18:30:13 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:14 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 18:30:14 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'.ubj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000, 0x0) [ 875.166529][ T3204] FAT-fs (loop2): bogus number of reserved sectors [ 875.175147][ T3209] JFS: Cannot determine volume size [ 875.185906][ T3209] JFS: discard option not supported on device [ 875.195080][ T3204] FAT-fs (loop2): Can't find a valid FAT filesystem [ 875.209320][ T3209] JFS: Cannot determine volume size [ 875.214534][ T3209] JFS: discard option not supported on device [ 875.239302][ T3209] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 875.399201][ T3306] FAT-fs (loop2): bogus number of reserved sectors [ 875.405860][ T3306] FAT-fs (loop2): Can't find a valid FAT filesystem 18:30:14 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f00000000c0)={0x5f, 0x0, 0xb, 0xa}) connect$x25(r0, &(0x7f0000000200)={0x9, @null=' \x00'}, 0x12) 18:30:14 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 18:30:14 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x5204ca947b, 0x0) 18:30:14 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'0ubj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:14 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:14 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000280)={r0}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f00000018c0)=ANY=[@ANYBLOB="1f000600ff03ffffd200000008e60500"], 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000001940)={0x0, 0x8000, 0x30}, &(0x7f0000001980)=0xc) ioctl(r0, 0x20000000008912, &(0x7f0000000b40)="0a5c2d02401162a381173bbd4b1032aa85717070251d83edc57bb18591212b17454a7fe23a10f975365546723ad67aa6e79ad2acc23ede1c3ef32546fb867612811e807780235820036696e3ec1d0157d367903d69f4a60cb2403695b68b7448de62e704ae358fe13babc28ae56cb5c9c9c33ab54f89f0019d56f8f12a01bbade151ba31adf70476701a06a48cc28f7d983e19b0da3e8208d9f37992586bc8d281aca5bdd155d34a20ee3039c81a3105804750ae8874f37d8371de7c161bbec4a5147ded541702b61d0245db0cb9c570f4abc6e697979b") r2 = socket$inet6(0xa, 0x803, 0x3) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = accept$packet(r1, &(0x7f0000000940)={0x11, 0x0, 0x0}, &(0x7f00000008c0)=0x14) setsockopt$packet_buf(r4, 0x107, 0x16, &(0x7f00000002c0)="39cfadf367badb9e816e3e76ae323db964d8539d2afd6877d97e0386d29cb179d46bee2a0f12c43ce76909dc60d18273a7770da8f16a55378d8f27c7fd75eac0a7710f8fa1f3a1c74eeb207fc0f8630cae69faa07e1d5cf6e8479ed2ccdb402666d4f362cf5eba9de917dc6a3bac5cf3830e9b4bffa70ef0ad6b5b340060b4d403b177f53f7ef02a21766b9461228ed95ddbaf957db977489376b954d1e502db865b6cd947e18bcef08c63b9f6a6c9333d4ff0a1e9eed9618cae", 0xba) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000400)={{0x3, 0x20}, 0x3}, 0xfffffffffffffe78) clock_gettime(0xfffffffffffffffe, &(0x7f0000001540)={0x0, 0x0}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000780)={0x8, &(0x7f0000000740)=[{0x80, 0x7, 0x3897f796, 0xa028}, {0x5, 0x4, 0x7, 0x9}, {0x80000001, 0x1f, 0x5, 0x8d3}, {0x0, 0x2, 0x6, 0x210a}, {0x9, 0xfff, 0xd973, 0x80}, {0x8, 0x9, 0x5, 0xffffffffffffffff}, {0x0, 0x7, 0x7, 0x20}, {0x7fffffff, 0x0, 0x9, 0x5}]}, 0x10) pselect6(0x40, &(0x7f0000000200)={0x8, 0x1, 0x6, 0x2, 0x7, 0x10001, 0x0, 0x8000}, &(0x7f0000000380)={0xe2, 0x6, 0x5, 0x3ff, 0x2, 0xfffffffffffffffa, 0xfffffffffffffb93, 0x1000}, &(0x7f00000003c0)={0x7ff, 0x0, 0x57b9171d, 0x0, 0x0, 0x5, 0x4, 0x3}, &(0x7f0000000440)={r6, r7+30000000}, &(0x7f00000004c0)={&(0x7f0000000480)={0x3}, 0x8}) r8 = accept4$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, &(0x7f0000000540)=0x10, 0x80800) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000240)={@mcast2, 0x7, 0x0, 0x2, 0x4, 0x80, 0x401}, 0x20) r9 = accept4(r2, &(0x7f00000009c0)=@in={0x2, 0x0, @initdev}, &(0x7f0000000840)=0xfffffffffffffd3e, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000880)={'vcan0\x00', r5}) setsockopt$inet_opts(r8, 0x0, 0x80002, &(0x7f0000000580)="567a3d7471b27fc548d9684a6744718ec73c4e479329d351d251580c453db9c7b884da0ed4e78d865ff1faf4041f187a84dafe331013fcfb6a2035430004863954f1f9357cd49dca34423d975827ece195a2bb892ea9e3af86b33a1f08", 0x5d) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000500)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000900)='pids.events\x00', 0x0, 0x0) pipe(&(0x7f0000001580)) r10 = openat$cgroup_ro(r1, &(0x7f0000001b00)='memory.current\x00', 0x0, 0x0) r11 = openat$cgroup_ro(r10, &(0x7f0000001ac0)='memory.current\x00', 0x0, 0x0) openat$cgroup_ro(r11, &(0x7f0000000640)='cpu.stat\x00', 0x0, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x0, 0x0) r13 = syz_genetlink_get_family_id$tipc(&(0x7f0000000980)='TIPC\x00') write$binfmt_aout(r12, &(0x7f0000001b40)=ANY=[@ANYBLOB="0b0103ff580200007b000000010000004c020000ff0100000000000000000000f9939c3b12d5b632b799db72de774fac7eba07c794fe2269385d569178eab87765d821195f42a74d1c912c256a9700c38304e0ca756e66b89f754132accd3dca4b2c59798abe9398622eaf5b538376fdc93249cad362f0af5288f82a17948831754c3327b00fb63d3f4b591a4197ef7996beac9a21e6c478d9ca871156be4f0763c6aed7107156e1297ce7e4e0975c3b02b2430e4f80af36f4d6794c67273f722fe894d383d7354df58ead20b7edf2f3a528c1864bdb65bddcf14b15a80b2f864afbcb2d3b8488e4fbd284c33a9adef33de760891b493095ea824e95e47abcc8c592de52db6ac2a72c99a6ad2061f76c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000029aebcaa2253db33ef00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a5d003390b48a8cb139e9f822c27e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000080000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bf66000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000000000000e3ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d531118cfa86825b971c7c241aaa2c4906c7e08794933d36da3ad09fc7249c9002713704ca6c33a77c7514035dd4febd4310476b45f7c11ccead77feae32b48fdd654491d63966d64d586ebc9af7e9dfe91533d4fc8d50fbf471878aff804a7dc00edf158dbdca118ed767afd814b5705a785f79bf1d1c964b4bd3628780a676d9e13ddd356287b058626cbbc28408b4f18d98b602f1980134a67417a09bf7caf6c7a5de0ec49e3bf9ba7209ded8da7c512a20d69ff73aecb817c4319f2e20cc5bcb21000000000092530dedd11b2e7d5983d2f3fef70096b0562acb21a988269ab6d668a83d5eedfe295b7b36538a7fd53e45a626e5e597819a87fb7636143dbe82158777f9710894b54209612d4945733ccce78c524f69150281e0634fb8407f918200000000000000000000000000000000"], 0xb36) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r12, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20100}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r13, 0x310, 0x70bd27, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x40040}, 0x812e4d9ba1024ffd) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r12, 0x0, 0x61, &(0x7f00000007c0)={'filter\x00', 0x4}, 0xfffffe4d) setsockopt$inet6_int(r3, 0x29, 0xc8, &(0x7f0000000000), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f0000000040)={{0xa, 0x4e23, 0xfffffffffffffc1b, @mcast2, 0x6}, {0xa, 0x4e21, 0xff, @mcast1, 0x1}, 0x0, [0x252a, 0x0, 0x5, 0x3, 0x2dc, 0x1, 0xffffffff, 0x5]}, 0x5c) close(r3) 18:30:14 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 18:30:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x520650b4a3, 0x0) [ 875.603279][ T3368] JFS: Cannot determine volume size [ 875.608681][ T3368] JFS: discard option not supported on device [ 875.615218][ T3368] JFS: Cannot determine volume size [ 875.622637][ T3368] JFS: discard option not supported on device [ 875.634478][ T3368] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 875.674213][ T3464] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 18:30:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) syz_execute_func(&(0x7f0000000140)="cd8075fcb0b06969ef69dc00d9c4017d50ee8adcd0d01192000880410fd1b0b5d90000797c2a0f0fcdc4e3a95fd965eae23c3b4d4d408064797f41dfdf400f01efe5e59d7d2f2f1c0a1a63460fc4c161fccddfde9f") syz_execute_func(&(0x7f0000000140)="cd80c20000b0b06969ef69dc00d9c4017d50ee8adcd0d01192000880410fd1b02db5d90000007cc481c653fb0fcdc4e3a95fd965eabe3c3b4d4d408064797f41dfdf400e01efc4a1fd28d29d7d2f67450f483b1c0a1a63460fc4c1610f4d96040476789f") 18:30:14 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 875.809354][ T3465] FAT-fs (loop2): bogus number of reserved sectors [ 875.832462][ T3574] BUG: assuming atomic context at kernel/seccomp.c:271 [ 875.845443][ T3465] FAT-fs (loop2): Can't find a valid FAT filesystem 18:30:14 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'Xubj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:15 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 875.850607][ T3574] in_atomic(): 0, irqs_disabled(): 0, pid: 3574, name: syz-executor.0 [ 875.902868][ T3574] no locks held by syz-executor.0/3574. [ 875.942544][ T3574] CPU: 1 PID: 3574 Comm: syz-executor.0 Not tainted 5.0.0-rc7-next-20190220 #39 [ 875.951626][ T3574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 875.961682][ T3574] Call Trace: [ 875.964984][ T3574] dump_stack+0x172/0x1f0 [ 875.969343][ T3574] __cant_sleep.cold+0xa3/0xbb [ 875.974129][ T3574] __seccomp_filter+0x12b/0x12b0 [ 875.979115][ T3574] ? seccomp_notify_release+0x280/0x280 [ 875.984691][ T3574] ? kasan_check_write+0x14/0x20 [ 875.989644][ T3574] ? _raw_spin_unlock_irq+0x28/0x90 [ 875.994843][ T3574] ? do_seccomp+0xa5a/0x2250 [ 875.999441][ T3574] ? _raw_spin_unlock_irq+0x28/0x90 [ 876.004640][ T3574] ? lockdep_hardirqs_on+0x418/0x5d0 [ 876.009924][ T3574] ? trace_hardirqs_on+0x67/0x230 [ 876.014960][ T3574] ? kasan_check_read+0x11/0x20 [ 876.019829][ T3574] ? _raw_spin_unlock_irq+0x5e/0x90 [ 876.025041][ T3574] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 876.031298][ T3574] ? do_seccomp+0x389/0x2250 [ 876.035919][ T3574] __secure_computing+0x101/0x360 [ 876.040974][ T3574] syscall_trace_enter+0x5bf/0xe10 [ 876.046098][ T3574] ? trace_event_raw_event_sys_exit+0x290/0x290 [ 876.052350][ T3574] ? lockdep_hardirqs_on+0x418/0x5d0 [ 876.057640][ T3574] ? trace_hardirqs_on+0x67/0x230 [ 876.062674][ T3574] do_syscall_64+0x479/0x610 [ 876.067294][ T3574] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 876.073190][ T3574] RIP: 0033:0x45ac8a [ 876.077102][ T3574] Code: 25 18 00 00 00 00 74 01 f0 48 0f b1 3d df ba 5f 00 48 39 c2 75 da f3 c3 0f 1f 84 00 00 00 00 00 48 63 ff b8 e4 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 06 f3 c3 0f 1f 40 00 48 c7 c2 d4 ff ff ff f7 [ 876.096711][ T3574] RSP: 002b:00007fbd640e5c58 EFLAGS: 00000246 ORIG_RAX: 00000000000000e4 [ 876.105124][ T3574] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045ac8a [ 876.113092][ T3574] RDX: 0000000000008d7c RSI: 00007fbd640e5c60 RDI: 0000000000000001 [ 876.121071][ T3574] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 876.129059][ T3574] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 876.137044][ T3574] R13: 00000000004c4cd5 R14: 00000000004d8890 R15: 00000000ffffffff 18:30:15 executing program 5: r0 = syz_open_procfs(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 18:30:15 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:15 executing program 0: [ 876.160339][ T26] audit: type=1326 audit(1550687415.267:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3573 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0xffff0000 18:30:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x5207a39093, 0x0) [ 876.240051][ T3609] JFS: Cannot determine volume size [ 876.245297][ T3609] JFS: discard option not supported on device [ 876.269868][ T3609] JFS: Cannot determine volume size [ 876.275328][ T3609] JFS: discard option not supported on device [ 876.286759][ T3609] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 18:30:15 executing program 5: r0 = syz_open_procfs(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 18:30:15 executing program 0: 18:30:15 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'cubj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 876.410521][ T3691] FAT-fs (loop2): bogus number of reserved sectors [ 876.417083][ T3691] FAT-fs (loop2): Can't find a valid FAT filesystem 18:30:15 executing program 5: r0 = syz_open_procfs(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 18:30:15 executing program 0: 18:30:15 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 18:30:15 executing program 0: 18:30:15 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs!', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:15 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 876.690560][ T3710] JFS: Cannot determine volume size [ 876.691100][ T3712] FAT-fs (loop2): bogus number of reserved sectors [ 876.706491][ T3710] JFS: discard option not supported on device [ 876.728523][ T3710] JFS: Cannot determine volume size [ 876.734038][ T3712] FAT-fs (loop2): Can't find a valid FAT filesystem 18:30:15 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:15 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 876.749419][ T3710] JFS: discard option not supported on device [ 876.769331][ T3710] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 18:30:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x10000000000, 0x0) 18:30:16 executing program 0: 18:30:16 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 18:30:16 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'dubj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:16 executing program 0: 18:30:16 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 877.013864][ T3733] FAT-fs (loop2): bogus number of reserved sectors [ 877.029689][ T3733] FAT-fs (loop2): Can't find a valid FAT filesystem 18:30:16 executing program 0: 18:30:16 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs ', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 877.100112][ T3739] JFS: Cannot determine volume size [ 877.108820][ T3739] JFS: discard option not supported on device [ 877.126375][ T3739] JFS: Cannot determine volume size [ 877.142125][ T3739] JFS: discard option not supported on device 18:30:16 executing program 0: 18:30:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xedc000000000, 0x0) [ 877.175072][ T3739] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 877.207600][ T3748] FAT-fs (loop2): bogus number of reserved sectors [ 877.229154][ T3748] FAT-fs (loop2): Can't find a valid FAT filesystem 18:30:16 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:16 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 18:30:16 executing program 0: 18:30:16 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'iubj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:16 executing program 5: syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x400000000000) 18:30:16 executing program 0: 18:30:16 executing program 5: syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 877.560482][ T3762] JFS: Cannot determine volume size [ 877.569471][ T3762] JFS: discard option not supported on device [ 877.585405][ T3762] JFS: Cannot determine volume size [ 877.601445][ T3762] JFS: discard option not supported on device 18:30:16 executing program 0: 18:30:16 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 877.607729][ T3762] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 18:30:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000000, 0x0) 18:30:16 executing program 5: syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x400000000000) 18:30:16 executing program 0: [ 877.736604][ T3772] FAT-fs (loop2): bogus number of reserved sectors [ 877.749125][ T3772] FAT-fs (loop2): Can't find a valid FAT filesystem 18:30:17 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:17 executing program 0: 18:30:17 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'lubj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:17 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, 0x0, 0x0, 0x400000000000) 18:30:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000000, 0x0) 18:30:17 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, 0x0, 0x0, 0x400000000000) 18:30:17 executing program 0: [ 878.101843][ T3798] FAT-fs (loop2): bogus number of reserved sectors [ 878.106185][ T3791] JFS: Cannot determine volume size [ 878.108392][ T3798] FAT-fs (loop2): Can't find a valid FAT filesystem [ 878.134856][ T3791] JFS: discard option not supported on device 18:30:17 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:17 executing program 0: [ 878.152905][ T3791] JFS: Cannot determine volume size [ 878.171238][ T3791] JFS: discard option not supported on device [ 878.177693][ T3791] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 18:30:17 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, 0x0, 0x0, 0x400000000000) 18:30:17 executing program 0: [ 878.222543][ T3806] FAT-fs (loop2): bogus number of reserved sectors [ 878.229553][ T3806] FAT-fs (loop2): Can't find a valid FAT filesystem 18:30:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x3000000000000, 0x0) 18:30:17 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:17 executing program 0: 18:30:17 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'oubj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:17 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 18:30:17 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x10', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:17 executing program 0: 18:30:17 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 18:30:17 executing program 0: [ 878.665763][ T3827] JFS: Cannot determine volume size [ 878.677297][ T3827] JFS: discard option not supported on device 18:30:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000, 0x0) 18:30:17 executing program 0: 18:30:17 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) [ 878.705910][ T3827] JFS: Cannot determine volume size [ 878.724872][ T3827] JFS: discard option not supported on device [ 878.736062][ T3827] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 18:30:17 executing program 0: 18:30:17 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:17 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x0f', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:17 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'pubj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:18 executing program 5: 18:30:18 executing program 0: 18:30:18 executing program 5: 18:30:18 executing program 0: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80003, 0xc) write(r0, &(0x7f00000000c0)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000080)="1f0000000104ff04fd4354c007110000f305010008000300020423dcffdf00", 0x1f) 18:30:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xd, 0x4, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000000000000061129c44000000009500000000000000"], 0x0, 0x1, 0xfb, &(0x7f0000000680)=""/251, 0x0, 0x1}, 0x48) r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x2, 0x40000) write$P9_RFSYNC(r0, &(0x7f0000000140)={0x7, 0x33, 0x1}, 0x7) write$P9_RATTACH(r0, &(0x7f00000000c0)={0x14, 0x69, 0x2, {0x80, 0x1, 0x7}}, 0x14) 18:30:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xe000000000000, 0x0) [ 879.067926][ T3859] JFS: Cannot determine volume size [ 879.076288][ T3859] JFS: discard option not supported on device [ 879.087835][ T3859] JFS: Cannot determine volume size [ 879.106067][ T3859] JFS: discard option not supported on device [ 879.115340][ T3859] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 879.140669][ T3866] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 18:30:18 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$invalidate(0x15, 0x0) getpeername(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) getresuid(0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) [ 879.187444][ T3866] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 18:30:18 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'uubj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:18 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:18 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:18 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3a, &(0x7f00000001c0)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0xffffff89, 0x3}]}}, @icmp=@timestamp_reply}}}}, 0x0) 18:30:18 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) bind$unix(r0, &(0x7f0000003100)=@file={0x1, './file0\x00'}, 0x1e) dup3(r1, r0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r2, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 879.522070][ T3983] JFS: Cannot determine volume size [ 879.527483][ T3983] JFS: discard option not supported on device [ 879.550479][ T3983] JFS: Cannot determine volume size [ 879.555994][ T3983] JFS: discard option not supported on device 18:30:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x40000000000000, 0x0) [ 879.576863][ T3983] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 879.611160][ T3992] FAT-fs (loop2): bogus number of reserved sectors 18:30:18 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'xubj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 879.627380][ T3992] FAT-fs (loop2): Can't find a valid FAT filesystem 18:30:18 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="1a605ca56f2e01a48703821e0a57fa201ce337f664013df224d0cd15ecbf8e7ad9c712787fe08108c8019552fb76cb317ed13887a6fed2914f46a5a4a77fad525aa0a5777ea8514ed0a2ff3337b0d590ce9b2a503188c9529006590fe2262513a0885df5bf6098e77a8d20037cdcb7cb74a2d6acbec14615a3602161b655598aa2bdd0d776896efcf158608d5aa45a4f49e17b29bf09e6ef11dc96048e1e3036cd60c18f19945b71ce4adb1ff7068a0caa7ef5e208c6813fa14e53e07ce7af3b0f84cf97d0f0b4072da56642c0b5fd128bc195e34e0e0f758bb6e33aaa9280ea8c84e9b01dfcae9270c24f0b"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, &(0x7f0000000140)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, 0x0, &(0x7f0000000600)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000500)={0x7, 0x26, 0x2, 0x10001, 0x0, 0x4, 0x400, 0x2}, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x80, 0x0) io_cancel(0x0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x7, 0x0, r1, 0x0, 0x0, 0x6651, 0x0, 0x0, r2}, 0x0) keyctl$join(0x1, &(0x7f0000000000)={'syz'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40042406, &(0x7f0000000280)='/dev/ion\x00') r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000080)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x40086200, &(0x7f0000000240)=0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @remote}, 0x1c) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000400)={0x2, &(0x7f00000002c0)=[{}, {}]}) r5 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r5, 0x114, 0x3, &(0x7f00000001c0)={{0x3ac, 0x1}}, 0x10) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in=@remote, @in6=@local}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x40, &(0x7f0000000040), 0x111, 0xb}}, 0x20) ioctl$VIDIOC_QUERY_DV_TIMINGS(0xffffffffffffffff, 0x80845663, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0) 18:30:18 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="1a605ca56f2e01a48703821e0a57fa201ce337f664013df224d0cd15ecbf8e7ad9c712787fe08108c8019552fb76cb317ed13887a6fed2914f46a5a4a77fad525aa0a5777ea8514ed0a2ff3337b0d590ce9b2a503188c9529006590fe2262513a0885df5bf6098e77a8d20037cdcb7cb74a2d6acbec14615a3602161b655598aa2bdd0d776896efcf158608d5aa45a4f49e17b29bf09e6ef11dc96048e1e3036cd60c18f19945b71ce4adb1ff7068a0caa7ef5e208c6813fa14e53e07ce7af3b0f84cf97d0f0b4072da56642c0b5fd128bc195e34e0e0f758bb6e33aaa9280ea8c84e9b01dfcae9270c24f0b"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, &(0x7f0000000140)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, 0x0, &(0x7f0000000600)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000500)={0x7, 0x26, 0x2, 0x10001, 0x0, 0x4, 0x400, 0x2}, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x80, 0x0) io_cancel(0x0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x7, 0x0, r1, 0x0, 0x0, 0x6651, 0x0, 0x0, r2}, 0x0) keyctl$join(0x1, &(0x7f0000000000)={'syz'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40042406, &(0x7f0000000280)='/dev/ion\x00') r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000080)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x40086200, &(0x7f0000000240)=0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @remote}, 0x1c) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000400)={0x2, &(0x7f00000002c0)=[{}, {}]}) r5 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r5, 0x114, 0x3, &(0x7f00000001c0)={{0x3ac, 0x1}}, 0x10) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in=@remote, @in6=@local}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x40, &(0x7f0000000040), 0x111, 0xb}}, 0x20) ioctl$VIDIOC_QUERY_DV_TIMINGS(0xffffffffffffffff, 0x80845663, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0) 18:30:18 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 879.842154][ T4101] FAT-fs (loop2): bogus number of reserved sectors [ 879.859774][ T4105] JFS: Cannot determine volume size [ 879.875673][ T4105] JFS: discard option not supported on device [ 879.884713][ T4101] FAT-fs (loop2): Can't find a valid FAT filesystem [ 879.906522][ T4105] JFS: Cannot determine volume size [ 879.926076][ T4105] JFS: discard option not supported on device [ 879.947241][ T4105] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 18:30:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, 0x0) 18:30:19 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\xc0', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:19 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'s\nbj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:19 executing program 0 (fault-call:2 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 18:30:19 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 880.362891][ T4224] JFS: Cannot determine volume size 18:30:19 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="1a605ca56f2e01a48703821e0a57fa201ce337f664013df224d0cd15ecbf8e7ad9c712787fe08108c8019552fb76cb317ed13887a6fed2914f46a5a4a77fad525aa0a5777ea8514ed0a2ff3337b0d590ce9b2a503188c9529006590fe2262513a0885df5bf6098e77a8d20037cdcb7cb74a2d6acbec14615a3602161b655598aa2bdd0d776896efcf158608d5aa45a4f49e17b29bf09e6ef11dc96048e1e3036cd60c18f19945b71ce4adb1ff7068a0caa7ef5e208c6813fa14e53e07ce7af3b0f84cf97d0f0b4072da56642c0b5fd128bc195e34e0e0f758bb6e33aaa9280ea8c84e9b01dfcae9270c24f0b"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, &(0x7f0000000140)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, 0x0, &(0x7f0000000600)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000500)={0x7, 0x26, 0x2, 0x10001, 0x0, 0x4, 0x400, 0x2}, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x80, 0x0) io_cancel(0x0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x7, 0x0, r1, 0x0, 0x0, 0x6651, 0x0, 0x0, r2}, 0x0) keyctl$join(0x1, &(0x7f0000000000)={'syz'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40042406, &(0x7f0000000280)='/dev/ion\x00') r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000080)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x40086200, &(0x7f0000000240)=0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @remote}, 0x1c) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000400)={0x2, &(0x7f00000002c0)=[{}, {}]}) r5 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r5, 0x114, 0x3, &(0x7f00000001c0)={{0x3ac, 0x1}}, 0x10) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in=@remote, @in6=@local}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x40, &(0x7f0000000040), 0x111, 0xb}}, 0x20) ioctl$VIDIOC_QUERY_DV_TIMINGS(0xffffffffffffffff, 0x80845663, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0) [ 880.384059][ T4224] JFS: discard option not supported on device [ 880.412495][ T4230] FAULT_INJECTION: forcing a failure. [ 880.412495][ T4230] name failslab, interval 1, probability 0, space 0, times 0 [ 880.418359][ T4224] JFS: Cannot determine volume size [ 880.430048][ T4230] CPU: 1 PID: 4230 Comm: syz-executor.0 Tainted: G W 5.0.0-rc7-next-20190220 #39 [ 880.437899][ T4224] JFS: discard option not supported on device [ 880.441382][ T4230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 880.441390][ T4230] Call Trace: [ 880.441418][ T4230] dump_stack+0x172/0x1f0 [ 880.441443][ T4230] should_fail.cold+0xa/0x15 [ 880.441462][ T4230] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 880.441484][ T4230] ? ___might_sleep+0x163/0x280 [ 880.441507][ T4230] __should_failslab+0x121/0x190 [ 880.441527][ T4230] should_failslab+0x9/0x14 [ 880.441542][ T4230] __kmalloc+0x2dc/0x740 [ 880.441558][ T4230] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 880.441587][ T4230] ? _kstrtoull+0x14c/0x200 [ 880.441606][ T4230] ? _parse_integer+0x190/0x190 [ 880.441626][ T4230] ? rw_copy_check_uvector+0x28c/0x330 [ 880.441648][ T4230] rw_copy_check_uvector+0x28c/0x330 [ 880.441667][ T4230] ? mark_held_locks+0xf0/0xf0 [ 880.441684][ T4230] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 880.441710][ T4230] ? kstrtouint+0x142/0x1a0 [ 880.457824][ T4230] import_iovec+0xbf/0x200 [ 880.457843][ T4230] ? dup_iter+0x260/0x260 [ 880.457860][ T4230] ? __fget+0x35a/0x550 [ 880.457881][ T4230] vfs_readv+0xc6/0x160 [ 880.457896][ T4230] ? lock_downgrade+0x880/0x880 [ 880.457917][ T4230] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 880.462586][ T4224] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 880.465693][ T4230] ? kasan_check_read+0x11/0x20 [ 880.465715][ T4230] ? __fget+0x381/0x550 [ 880.465736][ T4230] ? ksys_dup3+0x3e0/0x3e0 [ 880.465755][ T4230] ? wait_for_completion+0x440/0x440 [ 880.465779][ T4230] ? __fget_light+0x1a9/0x230 [ 880.476180][ T4230] do_preadv+0x1c4/0x280 [ 880.476200][ T4230] ? do_readv+0x290/0x290 [ 880.476217][ T4230] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 880.476232][ T4230] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 880.476248][ T4230] ? do_syscall_64+0x26/0x610 [ 880.476273][ T4230] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 880.626174][ T4230] ? do_syscall_64+0x26/0x610 [ 880.630988][ T4230] __x64_sys_preadv+0x9a/0xf0 [ 880.635697][ T4230] do_syscall_64+0x103/0x610 [ 880.640297][ T4230] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 880.646187][ T4230] RIP: 0033:0x457e29 [ 880.650109][ T4230] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 880.669716][ T4230] RSP: 002b:00007fbd640e5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 18:30:19 executing program 0 (fault-call:2 fault-nth:1): r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 880.678232][ T4230] RAX: ffffffffffffffda RBX: 00007fbd640e5c90 RCX: 0000000000457e29 [ 880.686216][ T4230] RDX: 00000000000001fe RSI: 00000000200017c0 RDI: 0000000000000003 [ 880.694195][ T4230] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 880.702171][ T4230] R10: 0000400000000000 R11: 0000000000000246 R12: 00007fbd640e66d4 [ 880.710138][ T4230] R13: 00000000004c4933 R14: 00000000004d8170 R15: 0000000000000004 [ 880.846719][ T4236] FAULT_INJECTION: forcing a failure. [ 880.846719][ T4236] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 880.859967][ T4236] CPU: 0 PID: 4236 Comm: syz-executor.0 Tainted: G W 5.0.0-rc7-next-20190220 #39 [ 880.870987][ T4236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 880.881056][ T4236] Call Trace: [ 880.884372][ T4236] dump_stack+0x172/0x1f0 [ 880.888763][ T4236] should_fail.cold+0xa/0x15 [ 880.893378][ T4236] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 880.899241][ T4236] should_fail_alloc_page+0x50/0x60 [ 880.904463][ T4236] __alloc_pages_nodemask+0x1a1/0x7e0 [ 880.909852][ T4236] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 880.915593][ T4236] ? find_held_lock+0x35/0x130 [ 880.920393][ T4236] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 880.926225][ T4236] cache_grow_begin+0x9c/0x850 [ 880.931027][ T4236] ? rw_copy_check_uvector+0x28c/0x330 [ 880.936510][ T4236] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 880.942775][ T4236] __kmalloc+0x67f/0x740 [ 880.947031][ T4236] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 880.953288][ T4236] ? _kstrtoull+0x14c/0x200 [ 880.957803][ T4236] ? rw_copy_check_uvector+0x28c/0x330 [ 880.963267][ T4236] rw_copy_check_uvector+0x28c/0x330 [ 880.968595][ T4236] ? mark_held_locks+0xf0/0xf0 [ 880.973375][ T4236] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 880.979119][ T4236] ? kstrtouint+0x142/0x1a0 [ 880.983664][ T4236] import_iovec+0xbf/0x200 [ 880.988112][ T4236] ? dup_iter+0x260/0x260 [ 880.992457][ T4236] ? __fget+0x35a/0x550 [ 880.996630][ T4236] vfs_readv+0xc6/0x160 [ 881.000793][ T4236] ? lock_downgrade+0x880/0x880 [ 881.005653][ T4236] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 881.011725][ T4236] ? kasan_check_read+0x11/0x20 [ 881.016606][ T4236] ? __fget+0x381/0x550 [ 881.020792][ T4236] ? ksys_dup3+0x3e0/0x3e0 [ 881.025223][ T4236] ? wait_for_completion+0x440/0x440 [ 881.030534][ T4236] ? __fget_light+0x1a9/0x230 [ 881.035246][ T4236] do_preadv+0x1c4/0x280 [ 881.039529][ T4236] ? do_readv+0x290/0x290 [ 881.043893][ T4236] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 881.049367][ T4236] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 881.054833][ T4236] ? do_syscall_64+0x26/0x610 [ 881.059522][ T4236] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 881.065602][ T4236] ? do_syscall_64+0x26/0x610 [ 881.070298][ T4236] __x64_sys_preadv+0x9a/0xf0 [ 881.074996][ T4236] do_syscall_64+0x103/0x610 [ 881.079626][ T4236] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 881.085536][ T4236] RIP: 0033:0x457e29 [ 881.089449][ T4236] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 881.109057][ T4236] RSP: 002b:00007fbd640e5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 881.117478][ T4236] RAX: ffffffffffffffda RBX: 00007fbd640e5c90 RCX: 0000000000457e29 [ 881.125465][ T4236] RDX: 00000000000001fe RSI: 00000000200017c0 RDI: 0000000000000003 [ 881.133456][ T4236] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 18:30:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x0f', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:20 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'s#bj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x10000c0ffffffff, 0x0) [ 881.141442][ T4236] R10: 0000400000000000 R11: 0000000000000246 R12: 00007fbd640e66d4 [ 881.149422][ T4236] R13: 00000000004c4933 R14: 00000000004d8170 R15: 0000000000000004 18:30:20 executing program 0 (fault-call:2 fault-nth:2): r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 881.267725][ T4244] JFS: Cannot determine volume size [ 881.282432][ T4244] JFS: discard option not supported on device [ 881.302383][ T4244] JFS: Cannot determine volume size [ 881.307784][ T4244] JFS: discard option not supported on device [ 881.318706][ T4244] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 881.359608][ T4254] FAULT_INJECTION: forcing a failure. [ 881.359608][ T4254] name failslab, interval 1, probability 0, space 0, times 0 [ 881.390702][ T4254] CPU: 0 PID: 4254 Comm: syz-executor.0 Tainted: G W 5.0.0-rc7-next-20190220 #39 [ 881.401164][ T4254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 881.411417][ T4254] Call Trace: [ 881.414733][ T4254] dump_stack+0x172/0x1f0 [ 881.419090][ T4254] should_fail.cold+0xa/0x15 [ 881.423709][ T4254] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 881.429542][ T4254] ? ___might_sleep+0x163/0x280 [ 881.434649][ T4254] __should_failslab+0x121/0x190 [ 881.439631][ T4254] should_failslab+0x9/0x14 [ 881.444153][ T4254] kmem_cache_alloc_node_trace+0x270/0x720 [ 881.449978][ T4254] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 881.456244][ T4254] __kmalloc_node+0x3d/0x70 [ 881.460948][ T4254] kvmalloc_node+0x68/0x100 [ 881.465474][ T4254] traverse+0x401/0x760 [ 881.469650][ T4254] ? seq_dentry+0x2d0/0x2d0 [ 881.474259][ T4254] seq_read+0x8f8/0x1130 [ 881.478526][ T4254] ? seq_dentry+0x2d0/0x2d0 [ 881.483062][ T4254] proc_reg_read+0x1fe/0x2c0 [ 881.487691][ T4254] ? proc_reg_compat_ioctl+0x2a0/0x2a0 [ 881.493177][ T4254] ? rw_verify_area+0x118/0x360 [ 881.498072][ T4254] do_iter_read+0x4a9/0x660 [ 881.502608][ T4254] ? dup_iter+0x260/0x260 [ 881.506963][ T4254] vfs_readv+0xf0/0x160 [ 881.511132][ T4254] ? lock_downgrade+0x880/0x880 [ 881.515990][ T4254] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 881.522077][ T4254] ? kasan_check_read+0x11/0x20 [ 881.526957][ T4254] ? ksys_dup3+0x3e0/0x3e0 [ 881.531398][ T4254] ? wait_for_completion+0x440/0x440 [ 881.536710][ T4254] ? __fget_light+0x1a9/0x230 [ 881.541412][ T4254] do_preadv+0x1c4/0x280 [ 881.545674][ T4254] ? do_readv+0x290/0x290 [ 881.550010][ T4254] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 881.555472][ T4254] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 881.561371][ T4254] ? do_syscall_64+0x26/0x610 [ 881.566297][ T4254] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 881.572360][ T4254] ? do_syscall_64+0x26/0x610 [ 881.577062][ T4254] __x64_sys_preadv+0x9a/0xf0 [ 881.581808][ T4254] do_syscall_64+0x103/0x610 [ 881.586439][ T4254] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 881.592343][ T4254] RIP: 0033:0x457e29 [ 881.596257][ T4254] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 881.615879][ T4254] RSP: 002b:00007fbd640e5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 881.624310][ T4254] RAX: ffffffffffffffda RBX: 00007fbd640e5c90 RCX: 0000000000457e29 [ 881.632300][ T4254] RDX: 00000000000001fe RSI: 00000000200017c0 RDI: 0000000000000003 [ 881.640293][ T4254] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 881.648284][ T4254] R10: 0000400000000000 R11: 0000000000000246 R12: 00007fbd640e66d4 18:30:20 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 881.656262][ T4254] R13: 00000000004c4933 R14: 00000000004d8170 R15: 0000000000000004 18:30:20 executing program 0 (fault-call:2 fault-nth:3): r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 881.840180][ T4259] FAULT_INJECTION: forcing a failure. [ 881.840180][ T4259] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 881.853436][ T4259] CPU: 0 PID: 4259 Comm: syz-executor.0 Tainted: G W 5.0.0-rc7-next-20190220 #39 [ 881.853469][ T4259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 881.853475][ T4259] Call Trace: [ 881.853499][ T4259] dump_stack+0x172/0x1f0 [ 881.853521][ T4259] should_fail.cold+0xa/0x15 [ 881.853541][ T4259] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 881.853568][ T4259] ? mark_held_locks+0xf0/0xf0 [ 881.896971][ T4259] should_fail_alloc_page+0x50/0x60 [ 881.902198][ T4259] __alloc_pages_nodemask+0x1a1/0x7e0 [ 881.907613][ T4259] ? find_held_lock+0x35/0x130 [ 881.907633][ T4259] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 881.907666][ T4259] cache_grow_begin+0x9c/0x850 [ 881.922929][ T4259] ? __kmalloc_node+0x3d/0x70 [ 881.927646][ T4259] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 881.933940][ T4259] kmem_cache_alloc_node_trace+0x658/0x720 [ 881.933960][ T4259] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 881.933984][ T4259] __kmalloc_node+0x3d/0x70 [ 881.934001][ T4259] kvmalloc_node+0x68/0x100 [ 881.934017][ T4259] traverse+0x401/0x760 [ 881.934035][ T4259] ? seq_dentry+0x2d0/0x2d0 [ 881.934049][ T4259] seq_read+0x8f8/0x1130 [ 881.934072][ T4259] ? seq_dentry+0x2d0/0x2d0 [ 881.934088][ T4259] proc_reg_read+0x1fe/0x2c0 [ 881.934116][ T4259] ? proc_reg_compat_ioctl+0x2a0/0x2a0 [ 881.946195][ T4259] ? rw_verify_area+0x118/0x360 18:30:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, 0x0) 18:30:21 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'s%bj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 881.946215][ T4259] do_iter_read+0x4a9/0x660 [ 881.946231][ T4259] ? dup_iter+0x260/0x260 [ 881.946254][ T4259] vfs_readv+0xf0/0x160 [ 881.946278][ T4259] ? lock_downgrade+0x880/0x880 [ 882.006500][ T4259] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 882.012759][ T4259] ? kasan_check_read+0x11/0x20 [ 882.017662][ T4259] ? ksys_dup3+0x3e0/0x3e0 [ 882.022219][ T4259] ? wait_for_completion+0x440/0x440 [ 882.027651][ T4259] ? __fget_light+0x1a9/0x230 [ 882.032380][ T4259] do_preadv+0x1c4/0x280 [ 882.036948][ T4259] ? do_readv+0x290/0x290 [ 882.041312][ T4259] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 882.046930][ T4259] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 882.052417][ T4259] ? do_syscall_64+0x26/0x610 [ 882.057282][ T4259] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 882.063543][ T4259] ? do_syscall_64+0x26/0x610 [ 882.068344][ T4259] __x64_sys_preadv+0x9a/0xf0 [ 882.073058][ T4259] do_syscall_64+0x103/0x610 [ 882.077688][ T4259] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 882.083632][ T4259] RIP: 0033:0x457e29 [ 882.087729][ T4259] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 882.107541][ T4259] RSP: 002b:00007fbd640e5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 882.116004][ T4259] RAX: ffffffffffffffda RBX: 00007fbd640e5c90 RCX: 0000000000457e29 [ 882.124002][ T4259] RDX: 00000000000001fe RSI: 00000000200017c0 RDI: 0000000000000003 [ 882.132000][ T4259] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 882.140006][ T4259] R10: 0000400000000000 R11: 0000000000000246 R12: 00007fbd640e66d4 [ 882.148004][ T4259] R13: 00000000004c4933 R14: 00000000004d8170 R15: 0000000000000004 18:30:21 executing program 0 (fault-call:2 fault-nth:4): r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 18:30:21 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:21 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="1a605ca56f2e01a48703821e0a57fa201ce337f664013df224d0cd15ecbf8e7ad9c712787fe08108c8019552fb76cb317ed13887a6fed2914f46a5a4a77fad525aa0a5777ea8514ed0a2ff3337b0d590ce9b2a503188c9529006590fe2262513a0885df5bf6098e77a8d20037cdcb7cb74a2d6acbec14615a3602161b655598aa2bdd0d776896efcf158608d5aa45a4f49e17b29bf09e6ef11dc96048e1e3036cd60c18f19945b71ce4adb1ff7068a0caa7ef5e208c6813fa14e53e07ce7af3b0f84cf97d0f0b4072da56642c0b5fd128bc195e34e0e0f758bb6e33aaa9280ea8c84e9b01dfcae9270c24f0b"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, &(0x7f0000000140)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, 0x0, &(0x7f0000000600)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000500)={0x7, 0x26, 0x2, 0x10001, 0x0, 0x4, 0x400, 0x2}, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x80, 0x0) io_cancel(0x0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x7, 0x0, r1, 0x0, 0x0, 0x6651, 0x0, 0x0, r2}, 0x0) keyctl$join(0x1, &(0x7f0000000000)={'syz'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40042406, &(0x7f0000000280)='/dev/ion\x00') r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000080)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x40086200, &(0x7f0000000240)=0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @remote}, 0x1c) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000400)={0x2, &(0x7f00000002c0)=[{}, {}]}) r5 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r5, 0x114, 0x3, &(0x7f00000001c0)={{0x3ac, 0x1}}, 0x10) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in=@remote, @in6=@local}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x40, &(0x7f0000000040), 0x111, 0xb}}, 0x20) ioctl$VIDIOC_QUERY_DV_TIMINGS(0xffffffffffffffff, 0x80845663, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0) [ 882.308472][ T4266] JFS: Cannot determine volume size [ 882.313903][ T4266] JFS: discard option not supported on device [ 882.320092][ T4266] JFS: Cannot determine volume size [ 882.325314][ T4266] JFS: discard option not supported on device [ 882.325326][ T4266] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 18:30:21 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:21 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'s*bj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) [ 882.455487][ T4276] FAT-fs (loop2): bogus number of reserved sectors 18:30:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x300000000000000, 0x0) [ 882.529487][ T4276] FAT-fs (loop2): Can't find a valid FAT filesystem 18:30:21 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 18:30:21 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 882.613719][ T4284] JFS: Cannot determine volume size [ 882.631929][ T4284] JFS: discard option not supported on device [ 882.648296][ T4289] FAT-fs (loop2): bogus number of reserved sectors 18:30:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0xfffffffffffffffd, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'bridge_slave_1\x00', 0x800008000}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x8923, &(0x7f0000000700)={'eql\x00', @ifru_flags=0x3301}) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x2000, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r2, 0xc1205531, &(0x7f0000000140)={0x0, 0x326c, 0x6, 0xffffffff, [], [], [], 0x5d7, 0xdc0, 0x7ff, 0x400, "6ff7b0b30bc07dde7ce01f90b70762b3"}) [ 882.663516][ T4284] JFS: Cannot determine volume size [ 882.683639][ T4284] JFS: discard option not supported on device [ 882.683654][ T4284] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 882.700680][ T4289] FAT-fs (loop2): Can't find a valid FAT filesystem 18:30:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x400000000000000, 0x0) 18:30:21 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'s+bj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:21 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:21 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x2, 0x400000000000) 18:30:22 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:22 executing program 5: syz_mount_image$reiserfs(&(0x7f0000001980)='reiserfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000000)={0x1, 0x7, 0x7, 0x8, 'syz1\x00', 0xffffffff}) getpeername$ax25(r0, &(0x7f0000000100)={{0x3, @rose}, [@remote, @null, @null, @rose, @bcast, @remote, @rose, @default]}, &(0x7f0000000180)=0x48) ioctl(r0, 0x6, &(0x7f00000001c0)="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") 18:30:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x3, 0x400000000000) [ 883.025156][ T4354] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 883.081377][ T4344] FAT-fs (loop2): bogus number of reserved sectors [ 883.094277][ T4344] FAT-fs (loop2): Can't find a valid FAT filesystem 18:30:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x500000000000000, 0x0) [ 883.170393][ T4382] JFS: Cannot determine volume size [ 883.193265][ T4382] JFS: discard option not supported on device [ 883.214119][ T4382] JFS: Cannot determine volume size 18:30:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x4, 0x400000000000) [ 883.236024][ T4382] JFS: discard option not supported on device [ 883.255649][ T4382] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 883.275479][ T4354] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 18:30:22 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x880000}, 0xc, &(0x7f0000000100)={&(0x7f00000007c0)=ANY=[@ANYBLOB="30010000", @ANYRES16=r1, @ANYBLOB="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"], 0x130}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$inet6_dccp_int(r0, 0x21, 0xa, &(0x7f0000000140)=0xfff, 0x4) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f00000001c0), &(0x7f0000000240)=0x4) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)) bind$inet(0xffffffffffffffff, 0x0, 0x0) timer_create(0x20000000000000, &(0x7f0000000580)={0x0, 0x200000000039}, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000015c0)='ip6_vti0\x00', 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000380)={0x6, 0x24, 0x2, 0x3}, 0x10) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, 0x0, &(0x7f0000000340)) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f00000004c0)=[{&(0x7f0000000480)="a8", 0x1}], 0x1, 0x81004) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r3, r3, &(0x7f00000ddff8), 0x102000000) socket$alg(0x26, 0x5, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 883.304427][ T4513] FAT-fs (loop2): bogus number of reserved sectors [ 883.314287][ T4513] FAT-fs (loop2): Can't find a valid FAT filesystem 18:30:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x5, 0x400000000000) 18:30:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:22 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, 0x0, 0x40, &(0x7f0000001a80)={[{@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0xcb}}, {@resize_size={'resize', 0x3d, 0x1f}}, {@resize='resize'}, {@discard='discard'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@euid_eq={'euid'}}, {@subj_type={'s-bj_type', 0x3d, 'ip6tnl0\x00'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, '\'system\x00'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}) 18:30:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x6, 0x400000000000) 18:30:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x600000000000000, 0x0) [ 883.725007][ T4745] JFS: Cannot determine volume size [ 883.730877][ T4745] JFS: discard option not supported on device [ 883.745080][ T4709] page:ffffea00024ddd80 count:0 mapcount:0 mapping:0000000000000000 index:0x0 [ 883.747991][ T4745] JFS: Cannot determine volume size [ 883.765522][ T4709] flags: 0x1fffc0000000000() [ 883.778119][ T4709] raw: 01fffc0000000000 ffffea0002918948 ffffea000284d9c8 0000000000000000 [ 883.778382][ T4745] JFS: discard option not supported on device [ 883.800093][ T4745] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 883.801782][ T4754] FAT-fs (loop2): bogus number of reserved sectors [ 883.818631][ T4709] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 18:30:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x7, 0x400000000000) [ 883.846151][ T4709] page dumped because: VM_BUG_ON_PAGE(page_ref_count(page) == 0) [ 883.859475][ T4754] FAT-fs (loop2): Can't find a valid FAT filesystem [ 883.872487][ T4709] ------------[ cut here ]------------ [ 883.877997][ T4709] kernel BUG at include/linux/mm.h:579! [ 883.902423][ T4709] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 883.908549][ T4709] CPU: 1 PID: 4709 Comm: syz-executor.5 Tainted: G W 5.0.0-rc7-next-20190220 #39 [ 883.919009][ T4709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 883.929305][ T4709] RIP: 0010:generic_pipe_buf_release+0x120/0x160 [ 883.935665][ T4709] Code: bd ff 4c 89 e7 e8 a0 44 db ff e8 2b 29 bd ff 5b 41 5c 41 5d 5d c3 e8 1f 29 bd ff 48 c7 c6 60 97 75 87 4c 89 e7 e8 70 dc e4 ff <0f> 0b e8 09 29 bd ff 4d 8d 65 ff e9 3d ff ff ff 48 89 df e8 58 f9 [ 883.955385][ T4709] RSP: 0018:ffff88808c8ff920 EFLAGS: 00010216 [ 883.961461][ T4709] RAX: 0000000000040000 RBX: ffffea00024dddb4 RCX: ffffc90010884000 [ 883.969448][ T4709] RDX: 000000000003d373 RSI: ffffffff819816a2 RDI: ffffea00024dddb8 [ 883.977431][ T4709] RBP: ffff88808c8ff938 R08: 000000000000003e R09: ffffed1015d25011 [ 883.985476][ T4709] R10: ffffed1015d25010 R11: ffff8880ae928087 R12: ffffea00024ddd80 [ 883.993552][ T4709] R13: 0000000000000000 R14: ffff888093c19580 R15: ffff8880902e9240 [ 884.001561][ T4709] FS: 00007f900aec1700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 884.010516][ T4709] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 884.017115][ T4709] CR2: 0000000000bac978 CR3: 00000000a85fb000 CR4: 00000000001426e0 [ 884.025107][ T4709] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 884.033343][ T4709] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 884.041335][ T4709] Call Trace: [ 884.044661][ T4709] iter_file_splice_write+0x7d1/0xbe0 [ 884.050052][ T4709] ? atime_needs_update+0x5f0/0x5f0 [ 884.055409][ T4709] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 884.061399][ T4709] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 884.066881][ T4709] ? retint_kernel+0x2d/0x2d [ 884.071500][ T4709] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 884.077505][ T4709] direct_splice_actor+0x126/0x1a0 [ 884.082793][ T4709] splice_direct_to_actor+0x369/0x970 [ 884.088198][ T4709] ? generic_pipe_buf_nosteal+0x10/0x10 [ 884.093960][ T4709] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 884.100264][ T4709] ? do_splice_to+0x190/0x190 [ 884.104955][ T4709] ? rw_verify_area+0x118/0x360 [ 884.109813][ T4709] do_splice_direct+0x1da/0x2a0 [ 884.114676][ T4709] ? splice_direct_to_actor+0x970/0x970 [ 884.120243][ T4709] ? rw_verify_area+0x118/0x360 [ 884.125105][ T4709] do_sendfile+0x597/0xd00 [ 884.129651][ T4709] ? do_compat_pwritev64+0x1c0/0x1c0 [ 884.135022][ T4709] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 884.141534][ T4709] ? _copy_from_user+0xdd/0x150 [ 884.146404][ T4709] __x64_sys_sendfile64+0x15a/0x220 [ 884.151634][ T4709] ? __ia32_sys_sendfile+0x230/0x230 [ 884.156935][ T4709] do_syscall_64+0x103/0x610 [ 884.161539][ T4709] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 884.167460][ T4709] RIP: 0033:0x457e29 [ 884.171372][ T4709] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 884.190989][ T4709] RSP: 002b:00007f900aec0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 884.199417][ T4709] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457e29 [ 884.207621][ T4709] RDX: 00000000200ddff8 RSI: 0000000000000005 RDI: 0000000000000005 [ 884.215624][ T4709] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 884.223757][ T4709] R10: 0000000102000000 R11: 0000000000000246 R12: 00007f900aec16d4 [ 884.231960][ T4709] R13: 00000000004c4dce R14: 00000000004d8a58 R15: 00000000ffffffff [ 884.240043][ T4709] Modules linked in: [ 884.244605][ T4814] kobject: 'loop4' (000000002e7d38ba): kobject_uevent_env 18:30:23 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 884.252136][ T4814] kobject: 'loop4' (000000002e7d38ba): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 884.264644][ T3874] kobject: 'loop0' (00000000e9596c05): kobject_uevent_env [ 884.271200][ T4709] ---[ end trace eb124bc15ad39c04 ]--- [ 884.277964][ T3874] kobject: 'loop0' (00000000e9596c05): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 884.278230][ T4709] RIP: 0010:generic_pipe_buf_release+0x120/0x160 [ 884.295897][ T4709] Code: bd ff 4c 89 e7 e8 a0 44 db ff e8 2b 29 bd ff 5b 41 5c 41 5d 5d c3 e8 1f 29 bd ff 48 c7 c6 60 97 75 87 4c 89 e7 e8 70 dc e4 ff <0f> 0b e8 09 29 bd ff 4d 8d 65 ff e9 3d ff ff ff 48 89 df e8 58 f9 [ 884.316116][ T4709] RSP: 0018:ffff88808c8ff920 EFLAGS: 00010216 [ 884.321762][ T4745] kobject: 'loop1' (000000009db19e76): kobject_uevent_env [ 884.322988][ T4709] RAX: 0000000000040000 RBX: ffffea00024dddb4 RCX: ffffc90010884000 [ 884.337515][ T4745] kobject: 'loop1' (000000009db19e76): fill_kobj_path: path = '/devices/virtual/block/loop1' 18:30:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x8, 0x400000000000) [ 884.338161][ T4709] RDX: 000000000003d373 RSI: ffffffff819816a2 RDI: ffffea00024dddb8 [ 884.356947][ T4709] RBP: ffff88808c8ff938 R08: 000000000000003e R09: ffffed1015d25011 [ 884.365390][ T4709] R10: ffffed1015d25010 R11: ffff8880ae928087 R12: ffffea00024ddd80 [ 884.370104][ T3874] kobject: 'loop1' (000000009db19e76): kobject_uevent_env [ 884.384172][ T3874] kobject: 'loop1' (000000009db19e76): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 884.386693][ T4709] R13: 0000000000000000 R14: ffff888093c19580 R15: ffff8880902e9240 [ 884.406421][ T4709] FS: 00007f900aec1700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 884.415931][ T4709] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 884.423762][ T4754] kobject: 'loop2' (000000001b9132d2): kobject_uevent_env [ 884.434951][ T4754] kobject: 'loop2' (000000001b9132d2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 884.451268][ T4709] CR2: 0000000000bac978 CR3: 00000000a85fb000 CR4: 00000000001426e0 [ 884.460479][ T3874] kobject: 'loop2' (000000001b9132d2): kobject_uevent_env [ 884.460907][ T4709] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 884.467898][ T3874] kobject: 'loop2' (000000001b9132d2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 884.480760][ T4709] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 884.494908][ T4709] Kernel panic - not syncing: Fatal exception [ 884.502256][ T4709] Kernel Offset: disabled [ 884.506606][ T4709] Rebooting in 86400 seconds..