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"]) poll(0x0, 0x0, 0x1ff) 22:17:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xb000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 158.389603][T11718] loop5: detected capacity change from 0 to 512 [ 158.426470][T11718] FAULT_INJECTION: forcing a failure. [ 158.426470][T11718] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 158.439605][T11718] CPU: 1 PID: 11718 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 158.449805][T11718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 158.459856][T11718] Call Trace: [ 158.463135][T11718] [ 158.466061][T11718] dump_stack_lvl+0xd6/0x122 [ 158.470655][T11718] dump_stack+0x11/0x1b [ 158.474808][T11718] should_fail+0x23c/0x250 [ 158.479302][T11718] should_fail_usercopy+0x16/0x20 [ 158.484410][T11718] strncpy_from_user+0x21/0x250 22:17:01 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(0x0, 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 158.489309][T11718] getname_flags+0xb8/0x3f0 [ 158.493887][T11718] __x64_sys_mkdir+0x31/0x50 [ 158.498490][T11718] do_syscall_64+0x44/0xd0 [ 158.502908][T11718] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 158.508809][T11718] RIP: 0033:0x7fef4d19ec07 [ 158.513223][T11718] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 22:17:01 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xc000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfeffffff, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 158.532839][T11718] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 158.541251][T11718] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d19ec07 [ 158.549221][T11718] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 158.557188][T11718] RBP: 00007fef4c916040 R08: 0000000000000000 R09: ffffffffffffffff [ 158.565173][T11718] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 158.573312][T11718] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 158.581395][T11718] 22:17:02 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x10000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:02 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xd000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffe000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 41) 22:17:02 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 159.245098][T12153] loop5: detected capacity change from 0 to 512 [ 159.282488][T12153] FAULT_INJECTION: forcing a failure. [ 159.282488][T12153] name failslab, interval 1, probability 0, space 0, times 0 [ 159.295168][T12153] CPU: 1 PID: 12153 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 159.305330][T12153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.315432][T12153] Call Trace: [ 159.318707][T12153] [ 159.321627][T12153] dump_stack_lvl+0xd6/0x122 [ 159.326253][T12153] dump_stack+0x11/0x1b [ 159.330407][T12153] should_fail+0x23c/0x250 [ 159.334817][T12153] ? __d_alloc+0x36/0x370 [ 159.339201][T12153] __should_failslab+0x81/0x90 [ 159.343968][T12153] should_failslab+0x5/0x20 [ 159.348479][T12153] kmem_cache_alloc+0x4f/0x320 [ 159.353325][T12153] __d_alloc+0x36/0x370 [ 159.357484][T12153] d_alloc+0x2a/0x110 [ 159.361548][T12153] __lookup_hash+0x8f/0x180 [ 159.366314][T12153] filename_create+0xfc/0x270 [ 159.371017][T12153] do_mkdirat+0x53/0x2c0 [ 159.375255][T12153] __x64_sys_mkdir+0x40/0x50 [ 159.379860][T12153] do_syscall_64+0x44/0xd0 [ 159.384281][T12153] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 159.390182][T12153] RIP: 0033:0x7fef4d19ec07 [ 159.394591][T12153] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 159.414223][T12153] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 159.422706][T12153] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d19ec07 [ 159.430667][T12153] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 22:17:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x10000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 159.438622][T12153] RBP: 00007fef4c916040 R08: 0000000000000000 R09: ffffffffffffffff [ 159.446572][T12153] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 159.454527][T12153] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 159.462487][T12153] 22:17:02 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 42) [ 159.605038][T12281] loop5: detected capacity change from 0 to 512 [ 159.613237][T12281] FAULT_INJECTION: forcing a failure. [ 159.613237][T12281] name failslab, interval 1, probability 0, space 0, times 0 [ 159.625894][T12281] CPU: 0 PID: 12281 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 159.636052][T12281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.646102][T12281] Call Trace: [ 159.649374][T12281] [ 159.652296][T12281] dump_stack_lvl+0xd6/0x122 [ 159.656913][T12281] dump_stack+0x11/0x1b [ 159.661073][T12281] should_fail+0x23c/0x250 [ 159.665634][T12281] ? ext4_alloc_inode+0x27/0x300 [ 159.670569][T12281] __should_failslab+0x81/0x90 [ 159.675432][T12281] ? set_qf_name+0x230/0x230 [ 159.680063][T12281] should_failslab+0x5/0x20 [ 159.684641][T12281] kmem_cache_alloc+0x4f/0x320 [ 159.689468][T12281] ? set_qf_name+0x230/0x230 [ 159.694062][T12281] ext4_alloc_inode+0x27/0x300 [ 159.698891][T12281] ? set_qf_name+0x230/0x230 [ 159.703476][T12281] new_inode_pseudo+0x38/0x190 [ 159.708304][T12281] new_inode+0x21/0x100 [ 159.712454][T12281] __ext4_new_inode+0x13f/0x2fc0 [ 159.717537][T12281] ? avc_has_perm+0xd5/0x160 [ 159.722139][T12281] ext4_mkdir+0x28a/0x760 [ 159.726619][T12281] vfs_mkdir+0x2c8/0x3d0 [ 159.730927][T12281] do_mkdirat+0x12e/0x2c0 [ 159.735259][T12281] __x64_sys_mkdir+0x40/0x50 [ 159.739875][T12281] do_syscall_64+0x44/0xd0 [ 159.744337][T12281] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 159.750232][T12281] RIP: 0033:0x7fef4d19ec07 [ 159.754726][T12281] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 159.774586][T12281] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 159.783468][T12281] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d19ec07 [ 159.791434][T12281] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 159.799398][T12281] RBP: 00007fef4c916040 R08: 0000000000000000 R09: ffffffffffffffff [ 159.807372][T12281] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 159.815598][T12281] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 159.823765][T12281] 22:17:03 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x20100000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x11000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:03 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c4139909265e15587fca777d663de0c61dc72195bde12b1ddb5ad22de8a6d736f10361fafb20f915cb437a5843812b29138e02a81cbe9a1e7efad9b20ccb1ab1785661b87f59205afecc47022b53ce8f48179517123c269364427d53ff5617eb0f68e521d6a84264077a987c9c4a57613cd27464ebb962f9c9967da2deb310cc0b8e8e0d902a3c05e1c3d985699eb06fe0c07e1e5f74aa63e30ea5924c012cfd53c15727d28ff3db5d82dbe0c2175f59b146873"]) poll(0x0, 0x0, 0x1ff) 22:17:03 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 43) [ 160.110418][T12489] EXT4-fs: 78 callbacks suppressed [ 160.110432][T12489] EXT4-fs (sda1): Unrecognized mount option "d" or missing value [ 160.143245][T12499] loop5: detected capacity change from 0 to 512 [ 160.149819][T12499] FAULT_INJECTION: forcing a failure. [ 160.149819][T12499] name failslab, interval 1, probability 0, space 0, times 0 [ 160.162468][T12499] CPU: 0 PID: 12499 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 160.172617][T12499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.172658][T12494] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 160.182674][T12499] Call Trace: [ 160.182686][T12499] [ 160.182693][T12499] dump_stack_lvl+0xd6/0x122 [ 160.202025][T12499] dump_stack+0x11/0x1b [ 160.206263][T12499] should_fail+0x23c/0x250 [ 160.210725][T12499] ? security_inode_alloc+0x30/0x180 [ 160.216023][T12499] __should_failslab+0x81/0x90 [ 160.220797][T12499] should_failslab+0x5/0x20 [ 160.225300][T12499] kmem_cache_alloc+0x4f/0x320 [ 160.230158][T12499] security_inode_alloc+0x30/0x180 [ 160.235267][T12499] inode_init_always+0x214/0x3e0 [ 160.240218][T12499] ? set_qf_name+0x230/0x230 [ 160.244820][T12499] new_inode_pseudo+0x6f/0x190 [ 160.249581][T12499] new_inode+0x21/0x100 [ 160.253775][T12499] __ext4_new_inode+0x13f/0x2fc0 [ 160.258731][T12499] ? avc_has_perm+0xd5/0x160 [ 160.263311][T12499] ext4_mkdir+0x28a/0x760 [ 160.267635][T12499] vfs_mkdir+0x2c8/0x3d0 [ 160.271941][T12499] do_mkdirat+0x12e/0x2c0 [ 160.276341][T12499] __x64_sys_mkdir+0x40/0x50 [ 160.280923][T12499] do_syscall_64+0x44/0xd0 [ 160.285337][T12499] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 160.291399][T12499] RIP: 0033:0x7fef4d19ec07 [ 160.295819][T12499] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 160.315458][T12499] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 160.323954][T12499] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d19ec07 [ 160.331920][T12499] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 160.339880][T12499] RBP: 00007fef4c916040 R08: 0000000000000000 R09: ffffffffffffffff [ 160.347846][T12499] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 160.355877][T12499] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 160.363857][T12499] [ 160.377694][T12515] EXT4-fs (sda1): Unrecognized mount option "d" or missing value 22:17:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 44) 22:17:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x12000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffffe, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:03 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x22000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 160.406117][T12604] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 160.433952][T12606] loop5: detected capacity change from 0 to 512 [ 160.446879][T12608] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 160.477187][T12611] EXT4-fs (sda1): Unrecognized mount option "d" or missing value [ 160.479526][T12606] FAULT_INJECTION: forcing a failure. [ 160.479526][T12606] name failslab, interval 1, probability 0, space 0, times 0 [ 160.497616][T12606] CPU: 1 PID: 12606 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 160.507838][T12606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.518066][T12606] Call Trace: [ 160.521338][T12606] 22:17:03 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c4139909265e15587fca777d663de0c61dc72195bde12b1ddb5ad22de8a6d736f10361fafb20f915cb437a5843812b29138e02a81cbe9a1e7efad9b20ccb1ab1785661b87f59205afecc47022b53ce8f48179517123c269364427d53ff5617eb0f68e521d6a84264077a987c9c4a57613cd27464ebb962f9c9967da2deb310cc0b8e8e0d902a3c05e1c3d985699eb06fe0c07e1e5f74aa63e30ea5924c012cfd53c15727d28ff3db5d82dbe0c2175f59b146873"]) poll(0x0, 0x0, 0x1ff) [ 160.524318][T12606] dump_stack_lvl+0xd6/0x122 [ 160.528910][T12606] dump_stack+0x11/0x1b [ 160.533091][T12606] should_fail+0x23c/0x250 [ 160.537522][T12606] ? jbd2__journal_start+0xf7/0x3f0 [ 160.542718][T12606] __should_failslab+0x81/0x90 [ 160.547487][T12606] should_failslab+0x5/0x20 [ 160.552005][T12606] kmem_cache_alloc+0x4f/0x320 [ 160.556782][T12606] ? find_group_orlov+0x52d/0x840 [ 160.561817][T12606] jbd2__journal_start+0xf7/0x3f0 [ 160.566840][T12606] __ext4_journal_start_sb+0x159/0x310 [ 160.572386][T12606] __ext4_new_inode+0xd95/0x2fc0 [ 160.577368][T12606] ext4_mkdir+0x28a/0x760 [ 160.581798][T12606] vfs_mkdir+0x2c8/0x3d0 [ 160.586047][T12606] do_mkdirat+0x12e/0x2c0 [ 160.590373][T12606] __x64_sys_mkdir+0x40/0x50 [ 160.594964][T12606] do_syscall_64+0x44/0xd0 [ 160.599409][T12606] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 160.605322][T12606] RIP: 0033:0x7fef4d19ec07 22:17:03 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c4139909265e15587fca777d663de0c61dc72195bde12b1ddb5ad22de8a6d736f10361fafb20f915cb437a5843812b29138e02a81cbe9a1e7efad9b20ccb1ab1785661b87f59205afecc47022b53ce8f48179517123c269364427d53ff5617eb0f68e521d6a84264077a987c9c4a57613cd27464ebb962f9c9967da2deb310cc0b8e8e0d902a3c05e1c3d985699eb06fe0c07e1e5f74aa63e30ea5924c012cfd53c15727d28ff3db5d82dbe0c2175f59b146873"]) poll(0x0, 0x0, 0x1ff) [ 160.609736][T12606] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 160.629342][T12606] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 160.637774][T12606] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d19ec07 [ 160.645753][T12606] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 160.653723][T12606] RBP: 00007fef4c916040 R08: 0000000000000000 R09: ffffffffffffffff [ 160.661690][T12606] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 160.669654][T12606] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 22:17:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x80000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:03 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c4139909265e15587fca777d663de0c61dc72195bde12b1ddb5ad22de8a6d736f10361fafb20f915cb437a5843812b29138e02a81cbe9a1e7efad9b20ccb1ab1785661b87f59205afecc47022b53ce8f48179517123c269364427d53ff5617eb0f68e521d6a84264077a987c9c4a57613cd27464ebb962f9c9967da2deb310cc0b8e8e0d902a3c05e1c3d985699eb06fe0c07e1e5f74aa63e30ea5924c012cfd53c15727d28ff3db5d82dbe0c2175f59b146873"]) poll(0x0, 0x0, 0x1ff) 22:17:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 160.677690][T12606] [ 160.680873][T12606] EXT4-fs error (device sda1) in __ext4_new_inode:1085: Out of memory [ 160.689364][T12638] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 160.710667][T12823] EXT4-fs (sda1): Unrecognized mount option "d" or missing value 22:17:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 45) 22:17:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x22000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 160.754444][T12827] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 160.764922][T12835] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value 22:17:03 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x25000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 160.821823][T12935] loop5: detected capacity change from 0 to 512 [ 160.850162][T12935] FAULT_INJECTION: forcing a failure. [ 160.850162][T12935] name failslab, interval 1, probability 0, space 0, times 0 22:17:03 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 160.862846][T12935] CPU: 1 PID: 12935 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 160.873145][T12935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.883200][T12935] Call Trace: [ 160.886518][T12935] [ 160.889449][T12935] dump_stack_lvl+0xd6/0x122 [ 160.894043][T12935] dump_stack+0x11/0x1b [ 160.898215][T12935] should_fail+0x23c/0x250 [ 160.902701][T12935] ? sidtab_sid2str_get+0xb0/0x140 [ 160.907921][T12935] __should_failslab+0x81/0x90 [ 160.912708][T12935] should_failslab+0x5/0x20 [ 160.917325][T12935] __kmalloc_track_caller+0x6d/0x370 [ 160.922685][T12935] kmemdup+0x21/0x50 [ 160.926580][T12935] sidtab_sid2str_get+0xb0/0x140 [ 160.931594][T12935] security_sid_to_context_core+0x1d0/0x2d0 [ 160.937509][T12935] security_sid_to_context_force+0x2f/0x40 [ 160.943391][T12935] selinux_inode_init_security+0x4e4/0x590 [ 160.949202][T12935] security_inode_init_security+0xe4/0x260 [ 160.955078][T12935] ? ext4_init_security+0x40/0x40 [ 160.960131][T12935] ext4_init_security+0x30/0x40 [ 160.965006][T12935] __ext4_new_inode+0x29a3/0x2fc0 [ 160.970099][T12935] ext4_mkdir+0x28a/0x760 [ 160.974718][T12935] vfs_mkdir+0x2c8/0x3d0 [ 160.978972][T12935] do_mkdirat+0x12e/0x2c0 [ 160.983349][T12935] __x64_sys_mkdir+0x40/0x50 [ 160.987964][T12935] do_syscall_64+0x44/0xd0 [ 160.992385][T12935] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 160.998374][T12935] RIP: 0033:0x7fef4d19ec07 [ 161.002780][T12935] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 161.022412][T12935] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 161.030819][T12935] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d19ec07 [ 161.038790][T12935] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 161.046754][T12935] RBP: 00007fef4c916040 R08: 0000000000000000 R09: ffffffffffffffff [ 161.054723][T12935] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 161.062702][T12935] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 161.070761][T12935] 22:17:04 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x8cffffff, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe0ffff00000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2e000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:04 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 46) 22:17:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x40000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 161.328667][T13162] loop5: detected capacity change from 0 to 512 [ 161.373641][T13162] FAULT_INJECTION: forcing a failure. [ 161.373641][T13162] name failslab, interval 1, probability 0, space 0, times 0 [ 161.386314][T13162] CPU: 0 PID: 13162 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 161.396489][T13162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 161.406595][T13162] Call Trace: [ 161.409866][T13162] [ 161.412805][T13162] dump_stack_lvl+0xd6/0x122 [ 161.417397][T13162] dump_stack+0x11/0x1b [ 161.421595][T13162] should_fail+0x23c/0x250 [ 161.426027][T13162] ? sidtab_sid2str_get+0xb0/0x140 [ 161.431307][T13162] __should_failslab+0x81/0x90 [ 161.436075][T13162] should_failslab+0x5/0x20 [ 161.440582][T13162] __kmalloc_track_caller+0x6d/0x370 [ 161.445889][T13162] kmemdup+0x21/0x50 [ 161.449912][T13162] sidtab_sid2str_get+0xb0/0x140 [ 161.454852][T13162] security_sid_to_context_core+0x1d0/0x2d0 [ 161.460758][T13162] security_sid_to_context_force+0x2f/0x40 [ 161.466590][T13162] selinux_inode_init_security+0x4e4/0x590 [ 161.472501][T13162] security_inode_init_security+0xe4/0x260 [ 161.478340][T13162] ? ext4_init_security+0x40/0x40 [ 161.483761][T13162] ext4_init_security+0x30/0x40 [ 161.488608][T13162] __ext4_new_inode+0x29a3/0x2fc0 [ 161.493695][T13162] ext4_mkdir+0x28a/0x760 [ 161.498042][T13162] vfs_mkdir+0x2c8/0x3d0 [ 161.502331][T13162] do_mkdirat+0x12e/0x2c0 [ 161.506695][T13162] __x64_sys_mkdir+0x40/0x50 [ 161.511335][T13162] do_syscall_64+0x44/0xd0 [ 161.515752][T13162] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 161.521659][T13162] RIP: 0033:0x7fef4d19ec07 [ 161.526130][T13162] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 161.545742][T13162] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 161.554154][T13162] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d19ec07 [ 161.562146][T13162] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 22:17:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x420e0000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 161.570217][T13162] RBP: 00007fef4c916040 R08: 0000000000000000 R09: ffffffffffffffff [ 161.578191][T13162] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 161.586162][T13162] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 161.594138][T13162] 22:17:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 47) 22:17:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x48000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 161.668873][T13283] loop5: detected capacity change from 0 to 512 [ 161.683285][T13283] FAULT_INJECTION: forcing a failure. [ 161.683285][T13283] name failslab, interval 1, probability 0, space 0, times 0 [ 161.696037][T13283] CPU: 0 PID: 13283 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 161.706271][T13283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 161.716370][T13283] Call Trace: [ 161.719673][T13283] [ 161.722597][T13283] dump_stack_lvl+0xd6/0x122 [ 161.727190][T13283] dump_stack+0x11/0x1b [ 161.731348][T13283] should_fail+0x23c/0x250 [ 161.735831][T13283] ? __es_insert_extent+0x546/0xe80 [ 161.741023][T13283] __should_failslab+0x81/0x90 [ 161.745837][T13283] should_failslab+0x5/0x20 [ 161.750417][T13283] kmem_cache_alloc+0x4f/0x320 [ 161.755190][T13283] ? delay_tsc+0x96/0xe0 [ 161.759449][T13283] __es_insert_extent+0x546/0xe80 [ 161.764549][T13283] ext4_es_insert_extent+0x1cb/0x19c0 [ 161.769920][T13283] ext4_ext_map_blocks+0xff7/0x2120 [ 161.775122][T13283] ? jbd2_journal_dirty_metadata+0x218/0x690 [ 161.781194][T13283] ext4_map_blocks+0x1cf/0xf00 [ 161.785956][T13283] ? __ext4_mark_inode_dirty+0x502/0x5f0 [ 161.791588][T13283] ext4_getblk+0xc6/0x3e0 [ 161.795910][T13283] ext4_bread+0x28/0x100 [ 161.800150][T13283] ext4_append+0xd1/0x1c0 [ 161.804533][T13283] ext4_init_new_dir+0x177/0x500 [ 161.809485][T13283] ext4_mkdir+0x329/0x760 [ 161.813921][T13283] vfs_mkdir+0x2c8/0x3d0 [ 161.818203][T13283] do_mkdirat+0x12e/0x2c0 [ 161.822608][T13283] __x64_sys_mkdir+0x40/0x50 [ 161.827192][T13283] do_syscall_64+0x44/0xd0 [ 161.831608][T13283] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 161.837506][T13283] RIP: 0033:0x7fef4d19ec07 [ 161.841971][T13283] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 161.861607][T13283] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 22:17:04 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:04 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0xc0ed0000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:04 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, 0x0, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 161.870022][T13283] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d19ec07 [ 161.877994][T13283] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 161.886015][T13283] RBP: 00007fef4c916040 R08: 0000000000000000 R09: ffffffffffffffff [ 161.893984][T13283] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 161.901952][T13283] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 161.909924][T13283] 22:17:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 48) 22:17:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x60000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 161.930252][T13283] EXT4-fs warning (device loop5): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 161.990160][T13310] loop5: detected capacity change from 0 to 512 [ 162.004683][T13310] FAULT_INJECTION: forcing a failure. [ 162.004683][T13310] name failslab, interval 1, probability 0, space 0, times 0 [ 162.017347][T13310] CPU: 1 PID: 13310 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 162.027501][T13310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 22:17:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x68000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 162.037562][T13310] Call Trace: [ 162.040957][T13310] [ 162.043885][T13310] dump_stack_lvl+0xd6/0x122 [ 162.048482][T13310] dump_stack+0x11/0x1b [ 162.052673][T13310] should_fail+0x23c/0x250 [ 162.057161][T13310] ? kcalloc+0x32/0x50 [ 162.061232][T13310] __should_failslab+0x81/0x90 [ 162.066017][T13310] should_failslab+0x5/0x20 [ 162.070529][T13310] __kmalloc+0x6f/0x370 [ 162.074692][T13310] kcalloc+0x32/0x50 [ 162.078627][T13310] ext4_find_extent+0x19f/0x7e0 [ 162.083552][T13310] ? kfree+0xf8/0x1f0 [ 162.087530][T13310] ext4_ext_map_blocks+0x115/0x2120 [ 162.092805][T13310] ? jbd2_journal_dirty_metadata+0x218/0x690 [ 162.098815][T13310] ext4_map_blocks+0x71e/0xf00 [ 162.103583][T13310] ext4_getblk+0xc6/0x3e0 [ 162.107911][T13310] ext4_bread+0x28/0x100 [ 162.112300][T13310] ext4_append+0xd1/0x1c0 [ 162.116641][T13310] ext4_init_new_dir+0x177/0x500 [ 162.121582][T13310] ext4_mkdir+0x329/0x760 [ 162.125914][T13310] vfs_mkdir+0x2c8/0x3d0 [ 162.130262][T13310] do_mkdirat+0x12e/0x2c0 [ 162.134629][T13310] __x64_sys_mkdir+0x40/0x50 22:17:05 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, 0x0, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 162.139284][T13310] do_syscall_64+0x44/0xd0 [ 162.143700][T13310] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 162.149734][T13310] RIP: 0033:0x7fef4d19ec07 [ 162.154145][T13310] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 162.173749][T13310] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 162.182161][T13310] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d19ec07 22:17:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 162.190134][T13310] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 162.198103][T13310] RBP: 00007fef4c916040 R08: 0000000000000000 R09: ffffffffffffffff [ 162.206071][T13310] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 162.214056][T13310] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 162.222027][T13310] 22:17:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:05 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0xf6ffffff, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 49) 22:17:05 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:05 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, 0x0, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x74000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 162.769019][T13542] loop5: detected capacity change from 0 to 512 [ 162.791455][T13542] FAULT_INJECTION: forcing a failure. [ 162.791455][T13542] name failslab, interval 1, probability 0, space 0, times 0 [ 162.804105][T13542] CPU: 0 PID: 13542 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 162.814345][T13542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.824401][T13542] Call Trace: [ 162.827698][T13542] [ 162.830622][T13542] dump_stack_lvl+0xd6/0x122 [ 162.835287][T13542] dump_stack+0x11/0x1b [ 162.839561][T13542] should_fail+0x23c/0x250 [ 162.843977][T13542] ? ext4_mb_new_blocks+0x328/0x1ee0 [ 162.849308][T13542] __should_failslab+0x81/0x90 [ 162.854091][T13542] should_failslab+0x5/0x20 [ 162.858599][T13542] kmem_cache_alloc+0x4f/0x320 [ 162.863364][T13542] ext4_mb_new_blocks+0x328/0x1ee0 [ 162.868529][T13542] ? kcalloc+0x32/0x50 [ 162.872649][T13542] ? ext4_find_extent+0x6d7/0x7e0 [ 162.877727][T13542] ? ext4_ext_search_right+0x301/0x4f0 [ 162.883174][T13542] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 162.888884][T13542] ext4_ext_map_blocks+0x1658/0x2120 [ 162.894239][T13542] ext4_map_blocks+0x71e/0xf00 [ 162.899030][T13542] ? __ext4_mark_inode_dirty+0x502/0x5f0 [ 162.904717][T13542] ext4_getblk+0xc6/0x3e0 [ 162.909094][T13542] ext4_bread+0x28/0x100 [ 162.913322][T13542] ext4_append+0xd1/0x1c0 [ 162.917637][T13542] ext4_init_new_dir+0x177/0x500 [ 162.922583][T13542] ext4_mkdir+0x329/0x760 [ 162.927004][T13542] vfs_mkdir+0x2c8/0x3d0 [ 162.931233][T13542] do_mkdirat+0x12e/0x2c0 [ 162.935545][T13542] __x64_sys_mkdir+0x40/0x50 [ 162.940132][T13542] do_syscall_64+0x44/0xd0 [ 162.944582][T13542] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 162.950532][T13542] RIP: 0033:0x7fef4d19ec07 [ 162.954929][T13542] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 162.974609][T13542] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 162.983054][T13542] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d19ec07 [ 162.991096][T13542] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 162.999066][T13542] RBP: 00007fef4c916040 R08: 0000000000000000 R09: ffffffffffffffff [ 163.007079][T13542] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 22:17:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:05 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0xfeffffff, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 163.015035][T13542] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 163.023071][T13542] 22:17:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 50) 22:17:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:06 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 163.114436][T13674] loop5: detected capacity change from 0 to 512 [ 163.137866][T13674] FAULT_INJECTION: forcing a failure. [ 163.137866][T13674] name failslab, interval 1, probability 0, space 0, times 0 [ 163.150585][T13674] CPU: 0 PID: 13674 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 163.160741][T13674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.170792][T13674] Call Trace: [ 163.174063][T13674] [ 163.176988][T13674] dump_stack_lvl+0xd6/0x122 [ 163.181594][T13674] dump_stack+0x11/0x1b [ 163.185747][T13674] should_fail+0x23c/0x250 [ 163.190187][T13674] ? ext4_mb_new_blocks+0x73e/0x1ee0 [ 163.195482][T13674] __should_failslab+0x81/0x90 [ 163.200296][T13674] should_failslab+0x5/0x20 [ 163.204809][T13674] kmem_cache_alloc+0x4f/0x320 [ 163.209576][T13674] ext4_mb_new_blocks+0x73e/0x1ee0 [ 163.214776][T13674] ? kcalloc+0x32/0x50 [ 163.218845][T13674] ? ext4_find_extent+0x6d7/0x7e0 [ 163.223895][T13674] ? ext4_ext_search_right+0x301/0x4f0 [ 163.229358][T13674] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 163.235184][T13674] ext4_ext_map_blocks+0x1658/0x2120 [ 163.240482][T13674] ext4_map_blocks+0x71e/0xf00 [ 163.245264][T13674] ? __ext4_mark_inode_dirty+0x502/0x5f0 [ 163.250972][T13674] ext4_getblk+0xc6/0x3e0 [ 163.255389][T13674] ext4_bread+0x28/0x100 [ 163.259694][T13674] ext4_append+0xd1/0x1c0 [ 163.264022][T13674] ext4_init_new_dir+0x177/0x500 [ 163.268987][T13674] ext4_mkdir+0x329/0x760 [ 163.273349][T13674] vfs_mkdir+0x2c8/0x3d0 [ 163.277603][T13674] do_mkdirat+0x12e/0x2c0 [ 163.281975][T13674] __x64_sys_mkdir+0x40/0x50 [ 163.286571][T13674] do_syscall_64+0x44/0xd0 [ 163.290991][T13674] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 163.296957][T13674] RIP: 0033:0x7fef4d19ec07 [ 163.301372][T13674] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 163.320979][T13674] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 163.329408][T13674] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d19ec07 [ 163.337378][T13674] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 163.345434][T13674] RBP: 00007fef4c916040 R08: 0000000000000000 R09: ffffffffffffffff [ 163.353411][T13674] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 22:17:06 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c4139909265e15587fca777d663de0c61dc72195bde12b1ddb5ad22de8a6d736f10361fafb20f915cb437a5843812b29138e02a81cbe9a1e7efad9b20ccb1ab1785661b87f59205afecc47022b53ce8f48179517123c269364427d53ff5617eb0f68e521d6a84264077a987c9c4a57613cd27464ebb962f9c9967da2deb310cc0b8e8e0d902a3c05e1c3d985699eb06fe0c07e1e5f74aa63e30ea5924c012cfd53c15727d28ff3db5d82dbe0c2175f59b146873"]) poll(0x0, 0x0, 0x1ff) 22:17:06 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0xffff0000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xb00000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:06 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfeffffff, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 163.361384][T13674] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 163.369416][T13674] 22:17:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffe000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 51) 22:17:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xc00000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 163.442493][T13802] loop5: detected capacity change from 0 to 512 [ 163.454116][T13802] FAULT_INJECTION: forcing a failure. [ 163.454116][T13802] name failslab, interval 1, probability 0, space 0, times 0 [ 163.466798][T13802] CPU: 0 PID: 13802 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 163.476962][T13802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.487018][T13802] Call Trace: [ 163.490297][T13802] [ 163.493220][T13802] dump_stack_lvl+0xd6/0x122 [ 163.497836][T13802] dump_stack+0x11/0x1b [ 163.501995][T13802] should_fail+0x23c/0x250 [ 163.506499][T13802] ? __es_insert_extent+0x546/0xe80 [ 163.511750][T13802] __should_failslab+0x81/0x90 [ 163.516572][T13802] should_failslab+0x5/0x20 [ 163.521082][T13802] kmem_cache_alloc+0x4f/0x320 [ 163.525897][T13802] __es_insert_extent+0x546/0xe80 [ 163.530920][T13802] ? ext4_ext_map_blocks+0x1128/0x2120 [ 163.536423][T13802] ext4_es_insert_extent+0x1cb/0x19c0 [ 163.541795][T13802] ext4_map_blocks+0xa5d/0xf00 [ 163.546563][T13802] ext4_getblk+0xc6/0x3e0 [ 163.550958][T13802] ext4_bread+0x28/0x100 [ 163.555283][T13802] ext4_append+0xd1/0x1c0 [ 163.559611][T13802] ext4_init_new_dir+0x177/0x500 [ 163.564547][T13802] ext4_mkdir+0x329/0x760 [ 163.569747][T13802] vfs_mkdir+0x2c8/0x3d0 [ 163.574057][T13802] do_mkdirat+0x12e/0x2c0 [ 163.578383][T13802] __x64_sys_mkdir+0x40/0x50 [ 163.583054][T13802] do_syscall_64+0x44/0xd0 [ 163.587465][T13802] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 163.593382][T13802] RIP: 0033:0x7fef4d19ec07 [ 163.597788][T13802] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 163.617437][T13802] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 163.625852][T13802] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d19ec07 [ 163.633849][T13802] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 22:17:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xd00000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:06 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c4139909265e15587fca777d663de0c61dc72195bde12b1ddb5ad22de8a6d736f10361fafb20f915cb437a5843812b29138e02a81cbe9a1e7efad9b20ccb1ab1785661b87f59205afecc47022b53ce8f48179517123c269364427d53ff5617eb0f68e521d6a84264077a987c9c4a57613cd27464ebb962f9c9967da2deb310cc0b8e8e0d902a3c05e1c3d985699eb06fe0c07e1e5f74aa63e30ea5924c012cfd53c15727d28ff3db5d82dbe0c2175f59b146873"]) poll(0x0, 0x0, 0x1ff) 22:17:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe00000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 163.641880][T13802] RBP: 00007fef4c916040 R08: 0000000000000000 R09: ffffffffffffffff [ 163.649848][T13802] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 163.657819][T13802] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 163.665846][T13802] [ 163.680182][T13802] EXT4-fs warning (device loop5): ext4_multi_mount_protect:292: Invalid MMP block in superblock 22:17:06 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 52) 22:17:06 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0xffffff8c, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:06 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1100000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 163.943217][T14026] loop5: detected capacity change from 0 to 512 [ 163.983418][T14026] FAULT_INJECTION: forcing a failure. [ 163.983418][T14026] name failslab, interval 1, probability 0, space 0, times 0 [ 163.996082][T14026] CPU: 1 PID: 14026 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 164.006256][T14026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.016322][T14026] Call Trace: [ 164.019599][T14026] [ 164.022521][T14026] dump_stack_lvl+0xd6/0x122 [ 164.027156][T14026] dump_stack+0x11/0x1b [ 164.031343][T14026] should_fail+0x23c/0x250 [ 164.035837][T14026] ? jbd2_journal_add_journal_head+0x6c/0x3a0 [ 164.041925][T14026] __should_failslab+0x81/0x90 [ 164.046689][T14026] should_failslab+0x5/0x20 [ 164.051248][T14026] kmem_cache_alloc+0x4f/0x320 [ 164.056035][T14026] jbd2_journal_add_journal_head+0x6c/0x3a0 [ 164.062028][T14026] jbd2_journal_get_create_access+0x2c/0x290 [ 164.068006][T14026] __ext4_journal_get_create_access+0x65/0x320 [ 164.074186][T14026] ext4_getblk+0x22b/0x3e0 [ 164.078632][T14026] ext4_bread+0x28/0x100 [ 164.082890][T14026] ext4_append+0xd1/0x1c0 [ 164.087213][T14026] ext4_init_new_dir+0x177/0x500 [ 164.092164][T14026] ext4_mkdir+0x329/0x760 [ 164.096534][T14026] vfs_mkdir+0x2c8/0x3d0 [ 164.100778][T14026] do_mkdirat+0x12e/0x2c0 [ 164.105106][T14026] __x64_sys_mkdir+0x40/0x50 [ 164.109699][T14026] do_syscall_64+0x44/0xd0 [ 164.114192][T14026] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 164.120142][T14026] RIP: 0033:0x7fef4d19ec07 22:17:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1200000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 164.124619][T14026] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 164.144295][T14026] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 164.152700][T14026] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d19ec07 [ 164.160759][T14026] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 164.168721][T14026] RBP: 00007fef4c916040 R08: 0000000000000000 R09: ffffffffffffffff [ 164.176683][T14026] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 22:17:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffffe, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:07 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0xfffffff6, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 164.184656][T14026] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 164.192660][T14026] [ 164.195715][T14026] ENOMEM in journal_alloc_journal_head, retrying. 22:17:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 164.265638][T14026] EXT4-fs warning (device loop5): ext4_multi_mount_protect:292: Invalid MMP block in superblock 22:17:07 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x80000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2200000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:07 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:07 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0xfffffffe, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 53) 22:17:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 164.515820][T14176] loop5: detected capacity change from 0 to 512 [ 164.539856][T14176] FAULT_INJECTION: forcing a failure. [ 164.539856][T14176] name failslab, interval 1, probability 0, space 0, times 0 [ 164.552501][T14176] CPU: 1 PID: 14176 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 22:17:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2500000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 164.562827][T14176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.572879][T14176] Call Trace: [ 164.576215][T14176] [ 164.579138][T14176] dump_stack_lvl+0xd6/0x122 [ 164.583762][T14176] dump_stack+0x11/0x1b [ 164.587961][T14176] should_fail+0x23c/0x250 [ 164.592457][T14176] ? strndup_user+0x64/0xa0 [ 164.596963][T14176] __should_failslab+0x81/0x90 [ 164.601733][T14176] should_failslab+0x5/0x20 [ 164.606303][T14176] __kmalloc_track_caller+0x6d/0x370 [ 164.611649][T14176] memdup_user+0x22/0xb0 22:17:07 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c4139909265e15587fca777d663de0c61dc72195bde12b1ddb5ad22de8a6d736f10361fafb20f915cb437a5843812b29138e02a81cbe9a1e7efad9b20ccb1ab1785661b87f59205afecc47022b53ce8f48179517123c269364427d53ff5617eb0f68e521d6a84264077a987c9c4a57613cd27464ebb962f9c9967da2deb310cc0b8e8e0d902a3c05e1c3d985699eb06fe0c07e1e5f74aa63e30ea5924c012cfd53c15727d28ff3db5d82dbe0c2175f59b146873"]) poll(0x0, 0x0, 0x1ff) [ 164.615890][T14176] strndup_user+0x64/0xa0 [ 164.620232][T14176] __se_sys_mount+0x4e/0x2f0 [ 164.624851][T14176] ? debug_smp_processor_id+0x18/0x20 [ 164.630249][T14176] __x64_sys_mount+0x63/0x70 [ 164.634863][T14176] do_syscall_64+0x44/0xd0 [ 164.639287][T14176] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 164.645181][T14176] RIP: 0033:0x7fef4d1a102a [ 164.649625][T14176] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 164.669240][T14176] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 164.677661][T14176] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 164.685688][T14176] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 164.693701][T14176] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 164.701670][T14176] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 22:17:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe0ffff00000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 164.709674][T14176] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 164.717646][T14176] 22:17:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2e00000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:07 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x8000000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:08 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c4139909265e15587fca777d663de0c61dc72195bde12b1ddb5ad22de8a6d736f10361fafb20f915cb437a5843812b29138e02a81cbe9a1e7efad9b20ccb1ab1785661b87f59205afecc47022b53ce8f48179517123c269364427d53ff5617eb0f68e521d6a84264077a987c9c4a57613cd27464ebb962f9c9967da2deb310cc0b8e8e0d902a3c05e1c3d985699eb06fe0c07e1e5f74aa63e30ea5924c012cfd53c15727d28ff3db5d82dbe0c2175f59b146873"]) poll(0x0, 0x0, 0x1ff) 22:17:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x360c000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:08 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0xedc000000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:08 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 54) 22:17:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 165.063189][T14419] loop5: detected capacity change from 0 to 512 [ 165.098324][T14419] FAULT_INJECTION: forcing a failure. [ 165.098324][T14419] name failslab, interval 1, probability 0, space 0, times 0 [ 165.110996][T14419] CPU: 1 PID: 14419 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 165.121146][T14419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.131300][T14419] Call Trace: [ 165.134573][T14419] [ 165.137502][T14419] dump_stack_lvl+0xd6/0x122 [ 165.142101][T14419] dump_stack+0x11/0x1b [ 165.146265][T14419] should_fail+0x23c/0x250 [ 165.150689][T14419] ? strndup_user+0x64/0xa0 [ 165.155205][T14419] __should_failslab+0x81/0x90 [ 165.160025][T14419] should_failslab+0x5/0x20 [ 165.164584][T14419] __kmalloc_track_caller+0x6d/0x370 [ 165.169910][T14419] memdup_user+0x22/0xb0 [ 165.174175][T14419] strndup_user+0x64/0xa0 [ 165.178562][T14419] __se_sys_mount+0x4e/0x2f0 [ 165.183150][T14419] ? debug_smp_processor_id+0x18/0x20 [ 165.188552][T14419] __x64_sys_mount+0x63/0x70 [ 165.193148][T14419] do_syscall_64+0x44/0xd0 [ 165.197565][T14419] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 165.203571][T14419] RIP: 0033:0x7fef4d1a102a 22:17:08 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 165.207987][T14419] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 165.227666][T14419] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 165.236127][T14419] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 165.244093][T14419] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 165.252135][T14419] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 22:17:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 165.260163][T14419] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 165.268154][T14419] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 165.276134][T14419] [ 165.295114][T14547] EXT4-fs: 96 callbacks suppressed [ 165.295125][T14547] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value 22:17:08 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x100000000000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 165.311551][T14548] EXT4-fs (sda1): Unrecognized mount option "d" or missing value [ 165.331426][T14575] EXT4-fs (sda1): Unrecognized mount option "d" or missing value [ 165.343127][T14568] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value 22:17:08 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:08 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:08 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x200000000000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 55) [ 165.623839][T14660] EXT4-fs (sda1): Unrecognized mount option "d" or missing value [ 165.632291][T14663] loop5: detected capacity change from 0 to 512 [ 165.651564][T14669] EXT4-fs (sda1): Unrecognized mount option "d" or missing value [ 165.662547][T14663] FAULT_INJECTION: forcing a failure. [ 165.662547][T14663] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 165.675651][T14663] CPU: 1 PID: 14663 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 165.685803][T14663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.695854][T14663] Call Trace: [ 165.699187][T14663] [ 165.702108][T14663] dump_stack_lvl+0xd6/0x122 [ 165.706735][T14663] dump_stack+0x11/0x1b [ 165.710935][T14663] should_fail+0x23c/0x250 [ 165.715437][T14663] should_fail_usercopy+0x16/0x20 [ 165.720450][T14663] _copy_from_user+0x1c/0xd0 [ 165.725054][T14663] memdup_user+0x5b/0xb0 [ 165.729295][T14663] strndup_user+0x64/0xa0 [ 165.733623][T14663] __se_sys_mount+0x4e/0x2f0 [ 165.738282][T14663] ? debug_smp_processor_id+0x18/0x20 [ 165.743652][T14663] __x64_sys_mount+0x63/0x70 [ 165.748310][T14663] do_syscall_64+0x44/0xd0 [ 165.752738][T14663] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 165.758669][T14663] RIP: 0033:0x7fef4d1a102a [ 165.763157][T14663] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 165.782771][T14663] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 165.791183][T14663] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 165.799148][T14663] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 165.807111][T14663] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 165.815079][T14663] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 22:17:08 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x700000000000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6000000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 165.823138][T14663] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 165.831105][T14663] [ 165.834671][T14664] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 165.853246][T14711] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value 22:17:08 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c4139909265e15587fca777d663de0c61dc72195bde12b1ddb5ad22de8a6d736f10361fafb20f915cb437a5843812b29138e02a81cbe9a1e7efad9b20ccb1ab1785661b87f59205afecc47022b53ce8f48179517123c269364427d53ff5617eb0f68e521d6a84264077a987c9c4a57613cd27464ebb962f9c9967da2deb310cc0b8e8e0d902a3c05e1c3d985699eb06fe0c07e1e5f74aa63e30ea5924c012cfd53c15727d28ff3db5d82dbe0c2175f59b146873"]) poll(0x0, 0x0, 0x1ff) 22:17:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 165.888704][T14765] EXT4-fs (sda1): Unrecognized mount option "d" or missing value [ 165.907342][T14783] EXT4-fs (sda1): Unrecognized mount option "d" or missing value 22:17:09 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:09 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0xa00000000000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 56) 22:17:09 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c4139909265e15587fca777d663de0c61dc72195bde12b1ddb5ad22de8a6d736f10361fafb20f915cb437a5843812b29138e02a81cbe9a1e7efad9b20ccb1ab1785661b87f59205afecc47022b53ce8f48179517123c269364427d53ff5617eb0f68e521d6a84264077a987c9c4a57613cd27464ebb962f9c9967da2deb310cc0b8e8e0d902a3c05e1c3d985699eb06fe0c07e1e5f74aa63e30ea5924c012cfd53c15727d28ff3db5d82dbe0c2175f59b146873"]) poll(0x0, 0x0, 0x1ff) 22:17:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 166.185007][T14904] loop5: detected capacity change from 0 to 512 [ 166.222233][T14904] FAULT_INJECTION: forcing a failure. [ 166.222233][T14904] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 166.235421][T14904] CPU: 0 PID: 14904 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 166.246368][T14904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.256448][T14904] Call Trace: [ 166.259754][T14904] [ 166.262689][T14904] dump_stack_lvl+0xd6/0x122 [ 166.267349][T14904] dump_stack+0x11/0x1b [ 166.271503][T14904] should_fail+0x23c/0x250 [ 166.275918][T14904] should_fail_usercopy+0x16/0x20 [ 166.281102][T14904] _copy_from_user+0x1c/0xd0 22:17:09 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0xfffffffffffffff, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:09 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x1000000000000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 166.285698][T14904] memdup_user+0x5b/0xb0 [ 166.289934][T14904] strndup_user+0x64/0xa0 [ 166.294776][T14904] __se_sys_mount+0x91/0x2f0 [ 166.299408][T14904] ? debug_smp_processor_id+0x18/0x20 [ 166.304785][T14904] ? switch_fpu_return+0x83/0x190 [ 166.309894][T14904] __x64_sys_mount+0x63/0x70 [ 166.314554][T14904] do_syscall_64+0x44/0xd0 [ 166.318970][T14904] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 166.324931][T14904] RIP: 0033:0x7fef4d1a102a 22:17:09 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 166.329340][T14904] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 166.348944][T14904] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 166.357384][T14904] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 166.365353][T14904] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 166.373402][T14904] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 166.381394][T14904] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 166.389364][T14904] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 166.397336][T14904] 22:17:09 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) poll(0x0, 0x0, 0x1ff) 22:17:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:09 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x2010000000000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:09 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 57) 22:17:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 166.766672][T15154] loop5: detected capacity change from 0 to 512 [ 166.795508][T15154] FAULT_INJECTION: forcing a failure. [ 166.795508][T15154] name failslab, interval 1, probability 0, space 0, times 0 22:17:09 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x2200000000000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:09 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x8cffffff00000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 166.808274][T15154] CPU: 1 PID: 15154 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 166.818499][T15154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.828571][T15154] Call Trace: [ 166.831856][T15154] [ 166.834786][T15154] dump_stack_lvl+0xd6/0x122 [ 166.839487][T15154] dump_stack+0x11/0x1b [ 166.843707][T15154] should_fail+0x23c/0x250 [ 166.848210][T15154] ? __se_sys_mount+0xf7/0x2f0 [ 166.852975][T15154] __should_failslab+0x81/0x90 [ 166.857818][T15154] should_failslab+0x5/0x20 22:17:09 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0xf6ffffff00000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 166.862492][T15154] kmem_cache_alloc_trace+0x52/0x350 [ 166.867797][T15154] ? memdup_user+0x96/0xb0 [ 166.872220][T15154] __se_sys_mount+0xf7/0x2f0 [ 166.876933][T15154] ? debug_smp_processor_id+0x18/0x20 [ 166.882347][T15154] __x64_sys_mount+0x63/0x70 [ 166.886939][T15154] do_syscall_64+0x44/0xd0 [ 166.891438][T15154] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 166.897357][T15154] RIP: 0033:0x7fef4d1a102a 22:17:09 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0xfeffffff00000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 166.901855][T15154] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 166.921608][T15154] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 166.930078][T15154] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 166.938136][T15154] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 166.946103][T15154] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 166.954076][T15154] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 166.962091][T15154] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 166.970363][T15154] 22:17:10 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) poll(0x0, 0x0, 0x1ff) 22:17:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfeffffff00000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:10 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0xffff000000000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:10 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 58) 22:17:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xb00000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xc00000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff7f00000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:10 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0xffffffffffffff0f, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xd00000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 167.409963][T15366] loop5: detected capacity change from 0 to 512 [ 167.437977][T15366] FAULT_INJECTION: forcing a failure. [ 167.437977][T15366] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 167.451075][T15366] CPU: 0 PID: 15366 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 167.461301][T15366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.471351][T15366] Call Trace: [ 167.474685][T15366] [ 167.477655][T15366] dump_stack_lvl+0xd6/0x122 [ 167.482268][T15366] dump_stack+0x11/0x1b [ 167.486415][T15366] should_fail+0x23c/0x250 [ 167.490888][T15366] should_fail_usercopy+0x16/0x20 [ 167.496014][T15366] _copy_from_user+0x1c/0xd0 [ 167.500608][T15366] __se_sys_mount+0x119/0x2f0 [ 167.505281][T15366] ? debug_smp_processor_id+0x18/0x20 [ 167.510654][T15366] __x64_sys_mount+0x63/0x70 [ 167.515358][T15366] do_syscall_64+0x44/0xd0 [ 167.519943][T15366] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 167.525878][T15366] RIP: 0033:0x7fef4d1a102a [ 167.530291][T15366] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 167.549891][T15366] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 22:17:10 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 167.558308][T15366] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 167.566270][T15366] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 167.574276][T15366] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 167.582244][T15366] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 167.590232][T15366] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 167.598197][T15366] [ 167.610458][T15366] EXT4-fs warning (device loop5): ext4_multi_mount_protect:292: Invalid MMP block in superblock 22:17:10 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) poll(0x0, 0x0, 0x1ff) 22:17:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a40a, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe00000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:10 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x22, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 59) 22:17:10 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) poll(0x0, 0x0, 0x1ff) 22:17:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a425, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 167.871520][T15557] loop5: detected capacity change from 0 to 512 [ 167.898630][T15557] FAULT_INJECTION: forcing a failure. [ 167.898630][T15557] name failslab, interval 1, probability 0, space 0, times 0 [ 167.911298][T15557] CPU: 0 PID: 15557 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 167.921500][T15557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.931553][T15557] Call Trace: [ 167.933206][T15568] 9pnet: Insufficient options for proto=fd [ 167.934829][T15557] [ 167.934837][T15557] dump_stack_lvl+0xd6/0x122 [ 167.934862][T15557] dump_stack+0x11/0x1b [ 167.952380][T15557] should_fail+0x23c/0x250 [ 167.956798][T15557] ? getname_flags+0x84/0x3f0 [ 167.961676][T15557] __should_failslab+0x81/0x90 [ 167.966449][T15557] should_failslab+0x5/0x20 [ 167.970959][T15557] kmem_cache_alloc+0x4f/0x320 [ 167.975725][T15557] getname_flags+0x84/0x3f0 [ 167.980222][T15557] ? should_fail+0xd6/0x250 [ 167.984781][T15557] user_path_at_empty+0x28/0x110 [ 167.989710][T15557] __se_sys_mount+0x217/0x2f0 [ 167.994407][T15557] __x64_sys_mount+0x63/0x70 [ 167.998995][T15557] do_syscall_64+0x44/0xd0 [ 168.003423][T15557] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 168.009372][T15557] RIP: 0033:0x7fef4d1a102a [ 168.013845][T15557] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 168.033446][T15557] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 168.042007][T15557] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 168.049987][T15557] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 168.057973][T15557] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 22:17:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1100000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a429, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 168.065943][T15557] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 168.073916][T15557] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 168.082110][T15557] 22:17:11 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) poll(0x0, 0x0, 0x1ff) 22:17:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 60) [ 168.156489][T15681] loop5: detected capacity change from 0 to 512 [ 168.167228][T15683] 9pnet: Insufficient options for proto=fd [ 168.181251][T15681] FAULT_INJECTION: forcing a failure. [ 168.181251][T15681] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 168.194403][T15681] CPU: 1 PID: 15681 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 168.204561][T15681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.214622][T15681] Call Trace: [ 168.217895][T15681] [ 168.220820][T15681] dump_stack_lvl+0xd6/0x122 [ 168.225470][T15681] dump_stack+0x11/0x1b [ 168.229631][T15681] should_fail+0x23c/0x250 [ 168.234051][T15681] should_fail_usercopy+0x16/0x20 [ 168.239076][T15681] strncpy_from_user+0x21/0x250 [ 168.243955][T15681] getname_flags+0xb8/0x3f0 [ 168.248483][T15681] ? should_fail+0xd6/0x250 [ 168.253031][T15681] user_path_at_empty+0x28/0x110 [ 168.257968][T15681] __se_sys_mount+0x217/0x2f0 [ 168.262648][T15681] ? __this_cpu_preempt_check+0x18/0x20 [ 168.268269][T15681] __x64_sys_mount+0x63/0x70 [ 168.272862][T15681] do_syscall_64+0x44/0xd0 [ 168.277278][T15681] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 168.283178][T15681] RIP: 0033:0x7fef4d1a102a [ 168.287675][T15681] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 168.307361][T15681] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 168.315805][T15681] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 168.323775][T15681] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 168.331748][T15681] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 168.339741][T15681] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 168.347805][T15681] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 168.355846][T15681] 22:17:11 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[]) poll(0x0, 0x0, 0x1ff) 22:17:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1200000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:11 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x2c, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a42e, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 61) 22:17:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="0a6174615f654a0d0000676ea58689a300"]) 22:17:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 168.448976][T15700] loop5: detected capacity change from 0 to 512 [ 168.469195][T15700] FAULT_INJECTION: forcing a failure. [ 168.469195][T15700] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 168.482123][T15692] 9pnet: Insufficient options for proto=fd [ 168.482326][T15700] CPU: 0 PID: 15700 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 168.498500][T15700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.508552][T15700] Call Trace: [ 168.511827][T15700] [ 168.514771][T15700] dump_stack_lvl+0xd6/0x122 [ 168.519390][T15700] dump_stack+0x11/0x1b [ 168.523619][T15700] should_fail+0x23c/0x250 [ 168.528038][T15700] should_fail_usercopy+0x16/0x20 [ 168.533057][T15700] strncpy_from_user+0x21/0x250 [ 168.537934][T15700] getname_flags+0xb8/0x3f0 [ 168.542430][T15700] ? should_fail+0xd6/0x250 [ 168.546939][T15700] user_path_at_empty+0x28/0x110 [ 168.551874][T15700] __se_sys_mount+0x217/0x2f0 [ 168.556549][T15700] ? __this_cpu_preempt_check+0x18/0x20 [ 168.562167][T15700] __x64_sys_mount+0x63/0x70 [ 168.566758][T15700] do_syscall_64+0x44/0xd0 [ 168.571175][T15700] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 168.577089][T15700] RIP: 0033:0x7fef4d1a102a [ 168.581533][T15700] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 168.601215][T15700] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 168.609891][T15700] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 168.617928][T15700] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 168.626101][T15700] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 168.634065][T15700] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 22:17:11 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x22, {'wfdno', 0x3d, r1}}) 22:17:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="226174615f654a0d0000676ea58689a300"]) 22:17:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2200000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 168.642030][T15700] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 168.650065][T15700] [ 168.708326][T15713] 9pnet: Insufficient options for proto=fd [ 168.721038][T15723] 9pnet: Insufficient options for proto=fd 22:17:11 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) poll(0x0, 0x0, 0x1ff) 22:17:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="256174615f654a0d0000676ea58689a300"]) 22:17:11 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[]) poll(0x0, 0x0, 0x1ff) 22:17:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 62) 22:17:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2500000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:11 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x22, r1}}) 22:17:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="2c6174615f654a0d0000676ea58689a300"]) 22:17:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="640a74615f654a0d0000676ea58689a300"]) 22:17:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2e00000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 168.993578][T15736] loop5: detected capacity change from 0 to 512 [ 169.008109][T15736] FAULT_INJECTION: forcing a failure. [ 169.008109][T15736] name failslab, interval 1, probability 0, space 0, times 0 [ 169.020780][T15736] CPU: 0 PID: 15736 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 169.031116][T15736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.041457][T15736] Call Trace: [ 169.044734][T15736] [ 169.047652][T15736] dump_stack_lvl+0xd6/0x122 [ 169.052248][T15736] dump_stack+0x11/0x1b [ 169.056565][T15736] should_fail+0x23c/0x250 [ 169.060980][T15736] ? alloc_fs_context+0x46/0x500 [ 169.065995][T15736] __should_failslab+0x81/0x90 [ 169.070775][T15736] should_failslab+0x5/0x20 [ 169.075323][T15736] kmem_cache_alloc_trace+0x52/0x350 [ 169.080618][T15736] alloc_fs_context+0x46/0x500 [ 169.085381][T15736] ? strncmp+0x34/0x70 [ 169.089552][T15736] fs_context_for_mount+0x1d/0x20 [ 169.094573][T15736] path_mount+0xdf0/0x1c40 [ 169.099092][T15736] ? kmem_cache_free+0x65/0x110 [ 169.103999][T15736] __se_sys_mount+0x24b/0x2f0 [ 169.108723][T15736] ? __this_cpu_preempt_check+0x18/0x20 [ 169.114314][T15736] __x64_sys_mount+0x63/0x70 [ 169.118898][T15736] do_syscall_64+0x44/0xd0 [ 169.123317][T15736] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 169.129214][T15736] RIP: 0033:0x7fef4d1a102a [ 169.133630][T15736] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 169.153237][T15736] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 169.161654][T15736] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 169.169686][T15736] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 169.177651][T15736] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 169.185641][T15736] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 22:17:12 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[]) poll(0x0, 0x0, 0x1ff) [ 169.194227][T15736] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 169.202354][T15736] [ 169.207372][T15842] 9pnet: Insufficient options for proto=fd 22:17:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="642274615f654a0d0000676ea58689a300"]) [ 169.242520][T15852] 9pnet: Insufficient options for proto=fd 22:17:12 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[]) poll(0x0, 0x0, 0x1ff) 22:17:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 63) 22:17:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x420e000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:12 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x2c, r1}}) 22:17:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="642574615f654a0d0000676ea58689a300"]) 22:17:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="642c74615f654a0d0000676ea58689a300"]) [ 169.337484][T15965] loop5: detected capacity change from 0 to 512 [ 169.354577][T15965] FAULT_INJECTION: forcing a failure. [ 169.354577][T15965] name failslab, interval 1, probability 0, space 0, times 0 [ 169.367262][T15965] CPU: 1 PID: 15965 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 169.377659][T15965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.387710][T15965] Call Trace: [ 169.390981][T15965] [ 169.393984][T15965] dump_stack_lvl+0xd6/0x122 [ 169.398642][T15965] dump_stack+0x11/0x1b [ 169.402850][T15965] should_fail+0x23c/0x250 [ 169.407344][T15965] ? vfs_parse_fs_string+0x6d/0xd0 [ 169.412470][T15965] __should_failslab+0x81/0x90 [ 169.417239][T15965] should_failslab+0x5/0x20 [ 169.421791][T15965] __kmalloc_track_caller+0x6d/0x370 [ 169.427160][T15965] kmemdup_nul+0x27/0x70 [ 169.431439][T15965] vfs_parse_fs_string+0x6d/0xd0 [ 169.436461][T15965] path_mount+0xf94/0x1c40 [ 169.440945][T15965] ? kmem_cache_free+0x65/0x110 [ 169.445786][T15965] __se_sys_mount+0x24b/0x2f0 [ 169.450467][T15965] ? __this_cpu_preempt_check+0x18/0x20 [ 169.456061][T15965] __x64_sys_mount+0x63/0x70 [ 169.460660][T15965] do_syscall_64+0x44/0xd0 [ 169.465073][T15965] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 169.471036][T15965] RIP: 0033:0x7fef4d1a102a [ 169.475446][T15965] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 169.489358][T15974] FAT-fs (loop1): bogus number of reserved sectors [ 169.495223][T15965] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 169.495280][T15965] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 169.495332][T15965] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 169.495346][T15965] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 22:17:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="64610a615f654a0d0000676ea58689a300"]) [ 169.495359][T15965] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 169.495371][T15965] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 169.495388][T15965] [ 169.498116][T15979] 9pnet: Insufficient options for proto=fd [ 169.502222][T15974] FAT-fs (loop1): Can't find a valid FAT filesystem [ 169.615518][T15991] 9pnet: Insufficient options for proto=fd 22:17:12 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB]) poll(0x0, 0x0, 0x1ff) 22:17:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 64) 22:17:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6000000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 169.787586][T16097] loop5: detected capacity change from 0 to 512 [ 169.801574][T16097] FAULT_INJECTION: forcing a failure. [ 169.801574][T16097] name failslab, interval 1, probability 0, space 0, times 0 [ 169.814233][T16097] CPU: 0 PID: 16097 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 169.824424][T16097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.834477][T16097] Call Trace: [ 169.837794][T16097] [ 169.840717][T16097] dump_stack_lvl+0xd6/0x122 [ 169.845421][T16097] dump_stack+0x11/0x1b [ 169.849571][T16097] should_fail+0x23c/0x250 [ 169.854000][T16097] ? ext4_mount+0x40/0x40 [ 169.858334][T16097] ? getname_kernel+0x37/0x1d0 [ 169.863095][T16097] __should_failslab+0x81/0x90 [ 169.867924][T16097] should_failslab+0x5/0x20 [ 169.872443][T16097] kmem_cache_alloc+0x4f/0x320 [ 169.877202][T16097] ? avc_has_perm_noaudit+0x1c0/0x270 [ 169.882571][T16097] ? ext4_mount+0x40/0x40 [ 169.886936][T16097] getname_kernel+0x37/0x1d0 [ 169.891574][T16097] ? ext4_mount+0x40/0x40 [ 169.895893][T16097] kern_path+0x1d/0x100 [ 169.900046][T16097] ? ext4_mount+0x40/0x40 [ 169.904436][T16097] blkdev_get_by_path+0x63/0x220 [ 169.909386][T16097] mount_bdev+0x47/0x290 [ 169.913626][T16097] ? ext4_errno_to_code+0x110/0x110 [ 169.918824][T16097] ext4_mount+0x2d/0x40 [ 169.922981][T16097] legacy_get_tree+0x70/0xc0 [ 169.927570][T16097] vfs_get_tree+0x4a/0x1a0 [ 169.932013][T16097] path_mount+0x11cf/0x1c40 [ 169.936539][T16097] ? kmem_cache_free+0x65/0x110 [ 169.941389][T16097] __se_sys_mount+0x24b/0x2f0 [ 169.946070][T16097] __x64_sys_mount+0x63/0x70 [ 169.950676][T16097] do_syscall_64+0x44/0xd0 [ 169.955198][T16097] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 169.961172][T16097] RIP: 0033:0x7fef4d1a102a [ 169.965581][T16097] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 22:17:13 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[]) poll(0x0, 0x0, 0x1ff) 22:17:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646122615f654a0d0000676ea58689a300"]) 22:17:13 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x22}) 22:17:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 169.985268][T16097] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 169.993728][T16097] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 170.001697][T16097] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 170.009698][T16097] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 170.017694][T16097] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 170.025664][T16097] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 170.033719][T16097] 22:17:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646125615f654a0d0000676ea58689a300"]) 22:17:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 65) 22:17:13 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 170.109504][T16107] 9pnet: Insufficient options for proto=fd [ 170.123527][T16117] 9pnet: Insufficient options for proto=fd [ 170.143023][T16123] loop5: detected capacity change from 0 to 512 [ 170.181469][T16123] FAULT_INJECTION: forcing a failure. [ 170.181469][T16123] name failslab, interval 1, probability 0, space 0, times 0 [ 170.194200][T16123] CPU: 0 PID: 16123 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 170.204354][T16123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.214431][T16123] Call Trace: [ 170.217710][T16123] [ 170.220639][T16123] dump_stack_lvl+0xd6/0x122 [ 170.225245][T16123] dump_stack+0x11/0x1b [ 170.229475][T16123] should_fail+0x23c/0x250 [ 170.233892][T16123] ? alloc_super+0x3a/0x520 [ 170.238457][T16123] __should_failslab+0x81/0x90 [ 170.243256][T16123] should_failslab+0x5/0x20 [ 170.247780][T16123] kmem_cache_alloc_trace+0x52/0x350 [ 170.253152][T16123] ? preempt_count_add+0x4e/0x90 [ 170.258166][T16123] ? mount_bdev+0x290/0x290 [ 170.262743][T16123] alloc_super+0x3a/0x520 [ 170.267080][T16123] ? mount_bdev+0x290/0x290 [ 170.271577][T16123] sget+0x189/0x370 [ 170.275404][T16123] ? test_bdev_super+0x30/0x30 [ 170.280240][T16123] mount_bdev+0xd3/0x290 [ 170.284563][T16123] ? ext4_mount+0x40/0x40 [ 170.288916][T16123] ? ext4_errno_to_code+0x110/0x110 [ 170.294109][T16123] ext4_mount+0x2d/0x40 [ 170.298259][T16123] legacy_get_tree+0x70/0xc0 [ 170.302843][T16123] vfs_get_tree+0x4a/0x1a0 [ 170.307414][T16123] path_mount+0x11cf/0x1c40 [ 170.311911][T16123] ? kmem_cache_free+0x65/0x110 [ 170.316810][T16123] __se_sys_mount+0x24b/0x2f0 [ 170.321506][T16123] __x64_sys_mount+0x63/0x70 [ 170.326133][T16123] do_syscall_64+0x44/0xd0 [ 170.330542][T16123] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 170.336434][T16123] RIP: 0033:0x7fef4d1a102a [ 170.340845][T16123] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 170.360446][T16123] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 170.368874][T16123] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 170.376839][T16123] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 170.384808][T16123] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 170.392789][T16123] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 170.400778][T16123] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 170.408752][T16123] [ 170.413692][T16232] EXT4-fs: 89 callbacks suppressed [ 170.413704][T16232] EXT4-fs (sda1): Unrecognized mount option "d" or missing value 22:17:13 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB]) poll(0x0, 0x0, 0x1ff) 22:17:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="64612c615f654a0d0000676ea58689a300"]) 22:17:13 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[]) poll(0x0, 0x0, 0x1ff) 22:17:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 66) [ 170.581545][T16241] loop5: detected capacity change from 0 to 512 [ 170.589287][T16238] EXT4-fs (sda1): Unrecognized mount option "da" or missing value [ 170.598530][T16241] FAULT_INJECTION: forcing a failure. [ 170.598530][T16241] name failslab, interval 1, probability 0, space 0, times 0 [ 170.611208][T16241] CPU: 1 PID: 16241 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 170.621374][T16241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.631517][T16241] Call Trace: [ 170.634813][T16241] [ 170.637739][T16241] dump_stack_lvl+0xd6/0x122 [ 170.642395][T16241] dump_stack+0x11/0x1b [ 170.646614][T16241] should_fail+0x23c/0x250 [ 170.651024][T16241] ? alloc_super+0x3a/0x520 [ 170.655531][T16241] __should_failslab+0x81/0x90 [ 170.660331][T16241] should_failslab+0x5/0x20 [ 170.664835][T16241] kmem_cache_alloc_trace+0x52/0x350 [ 170.670137][T16241] ? preempt_count_add+0x4e/0x90 [ 170.675106][T16241] ? mount_bdev+0x290/0x290 [ 170.679607][T16241] alloc_super+0x3a/0x520 [ 170.683934][T16241] ? mount_bdev+0x290/0x290 [ 170.688453][T16241] sget+0x189/0x370 [ 170.692257][T16241] ? test_bdev_super+0x30/0x30 [ 170.697020][T16241] mount_bdev+0xd3/0x290 [ 170.701260][T16241] ? ext4_mount+0x40/0x40 [ 170.705710][T16241] ? ext4_errno_to_code+0x110/0x110 [ 170.710932][T16241] ext4_mount+0x2d/0x40 [ 170.715091][T16241] legacy_get_tree+0x70/0xc0 [ 170.719735][T16241] vfs_get_tree+0x4a/0x1a0 [ 170.724227][T16241] path_mount+0x11cf/0x1c40 [ 170.728723][T16241] ? kmem_cache_free+0x65/0x110 [ 170.733591][T16241] __se_sys_mount+0x24b/0x2f0 [ 170.738318][T16241] __x64_sys_mount+0x63/0x70 [ 170.742910][T16241] do_syscall_64+0x44/0xd0 [ 170.747334][T16241] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 170.753267][T16241] RIP: 0033:0x7fef4d1a102a [ 170.757686][T16241] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 170.777330][T16241] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 170.785746][T16241] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 170.793719][T16241] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 170.801687][T16241] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 170.809721][T16241] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 170.817862][T16241] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 170.825952][T16241] 22:17:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 67) 22:17:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="6461740a5f654a0d0000676ea58689a300"]) 22:17:13 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB]) poll(0x0, 0x0, 0x1ff) 22:17:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 170.832916][T16242] EXT4-fs (sda1): Unrecognized mount option "d" or missing value [ 170.847612][T16290] EXT4-fs (sda1): Unrecognized mount option "da" or missing value [ 170.870851][T16291] EXT4-fs (sda1): Unrecognized mount option "d" or missing value [ 170.917352][T16349] loop5: detected capacity change from 0 to 512 [ 170.931266][T16351] EXT4-fs (sda1): Unrecognized mount option "dat [ 170.931266][T16351] _eJ" or missing value [ 170.934528][T16349] FAULT_INJECTION: forcing a failure. [ 170.934528][T16349] name failslab, interval 1, probability 0, space 0, times 0 [ 170.954593][T16349] CPU: 0 PID: 16349 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 170.964771][T16349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.974823][T16349] Call Trace: [ 170.978092][T16349] [ 170.981014][T16349] dump_stack_lvl+0xd6/0x122 [ 170.985609][T16349] dump_stack+0x11/0x1b [ 170.989809][T16349] should_fail+0x23c/0x250 [ 170.994222][T16349] ? __list_lru_init+0x70/0x6d0 [ 170.999114][T16349] __should_failslab+0x81/0x90 [ 171.003878][T16349] should_failslab+0x5/0x20 [ 171.008438][T16349] __kmalloc+0x6f/0x370 [ 171.012627][T16349] ? prealloc_memcg_shrinker+0x444/0x460 [ 171.018363][T16349] __list_lru_init+0x70/0x6d0 [ 171.023051][T16349] alloc_super+0x490/0x520 [ 171.027585][T16349] ? mount_bdev+0x290/0x290 [ 171.032088][T16349] sget+0x189/0x370 [ 171.036076][T16349] ? test_bdev_super+0x30/0x30 [ 171.040899][T16349] mount_bdev+0xd3/0x290 [ 171.045263][T16349] ? ext4_mount+0x40/0x40 [ 171.049660][T16349] ? ext4_errno_to_code+0x110/0x110 [ 171.054858][T16349] ext4_mount+0x2d/0x40 [ 171.059046][T16349] legacy_get_tree+0x70/0xc0 [ 171.063771][T16349] vfs_get_tree+0x4a/0x1a0 [ 171.068240][T16349] path_mount+0x11cf/0x1c40 [ 171.072744][T16349] ? kmem_cache_free+0x65/0x110 [ 171.077597][T16349] __se_sys_mount+0x24b/0x2f0 [ 171.082273][T16349] __x64_sys_mount+0x63/0x70 [ 171.086894][T16349] do_syscall_64+0x44/0xd0 [ 171.091313][T16349] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 171.097206][T16349] RIP: 0033:0x7fef4d1a102a [ 171.101617][T16349] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 171.121241][T16349] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 171.129745][T16349] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 171.137717][T16349] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 171.145705][T16349] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 171.153786][T16349] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 22:17:14 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB]) poll(0x0, 0x0, 0x1ff) 22:17:14 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0x2}}) [ 171.161772][T16349] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 171.169752][T16349] [ 171.173708][T16354] EXT4-fs (sda1): Unrecognized mount option "d" or missing value [ 171.201041][T16462] EXT4-fs (sda1): Unrecognized mount option "dat [ 171.201041][T16462] _eJ" or missing value 22:17:14 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB]) poll(0x0, 0x0, 0x1ff) 22:17:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 68) 22:17:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174225f654a0d0000676ea58689a300"]) 22:17:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 171.226948][T16466] EXT4-fs (sda1): Unrecognized mount option "d" or missing value [ 171.263115][T16511] EXT4-fs (sda1): Unrecognized mount option "dat"_eJ" or missing value [ 171.273958][T16552] loop5: detected capacity change from 0 to 512 [ 171.293061][T16552] FAULT_INJECTION: forcing a failure. [ 171.293061][T16552] name failslab, interval 1, probability 0, space 0, times 0 [ 171.305827][T16552] CPU: 1 PID: 16552 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 171.316191][T16552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 171.326283][T16552] Call Trace: [ 171.329555][T16552] [ 171.332486][T16552] dump_stack_lvl+0xd6/0x122 [ 171.337089][T16552] dump_stack+0x11/0x1b [ 171.341250][T16552] should_fail+0x23c/0x250 [ 171.345748][T16552] __should_failslab+0x81/0x90 [ 171.350559][T16552] should_failslab+0x5/0x20 [ 171.355082][T16552] kmem_cache_alloc_node_trace+0x61/0x310 [ 171.360866][T16552] ? should_fail+0xd6/0x250 [ 171.365544][T16552] ? __kmalloc_node+0x30/0x40 [ 171.370218][T16552] __kmalloc_node+0x30/0x40 [ 171.374725][T16552] kvmalloc_node+0x81/0x110 [ 171.379267][T16552] __list_lru_init+0x2f7/0x6d0 [ 171.384031][T16552] alloc_super+0x490/0x520 [ 171.388441][T16552] ? mount_bdev+0x290/0x290 [ 171.393096][T16552] sget+0x189/0x370 [ 171.396956][T16552] ? test_bdev_super+0x30/0x30 [ 171.401815][T16552] mount_bdev+0xd3/0x290 [ 171.406054][T16552] ? ext4_mount+0x40/0x40 [ 171.410420][T16552] ? ext4_errno_to_code+0x110/0x110 [ 171.415629][T16552] ext4_mount+0x2d/0x40 [ 171.419805][T16552] legacy_get_tree+0x70/0xc0 [ 171.424559][T16552] vfs_get_tree+0x4a/0x1a0 [ 171.429064][T16552] path_mount+0x11cf/0x1c40 [ 171.434125][T16552] ? kmem_cache_free+0x65/0x110 [ 171.438979][T16552] __se_sys_mount+0x24b/0x2f0 [ 171.443939][T16552] ? __this_cpu_preempt_check+0x18/0x20 [ 171.449488][T16552] __x64_sys_mount+0x63/0x70 [ 171.454152][T16552] do_syscall_64+0x44/0xd0 [ 171.458581][T16552] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 171.464501][T16552] RIP: 0033:0x7fef4d1a102a [ 171.468925][T16552] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 171.488704][T16552] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 171.497480][T16552] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 171.505453][T16552] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 171.513421][T16552] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 22:17:14 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB]) poll(0x0, 0x0, 0x1ff) 22:17:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174255f654a0d0000676ea58689a300"]) 22:17:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfeffffff00000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="6461742c5f654a0d0000676ea58689a300"]) 22:17:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 69) 22:17:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff7f00000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 171.521397][T16552] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 171.529434][T16552] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 171.537552][T16552] 22:17:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 171.608592][T16595] loop5: detected capacity change from 0 to 512 [ 171.618181][T16595] FAULT_INJECTION: forcing a failure. [ 171.618181][T16595] name failslab, interval 1, probability 0, space 0, times 0 [ 171.630884][T16595] CPU: 0 PID: 16595 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 171.641058][T16595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 171.651237][T16595] Call Trace: [ 171.654683][T16595] [ 171.657619][T16595] dump_stack_lvl+0xd6/0x122 [ 171.662236][T16595] dump_stack+0x11/0x1b [ 171.666426][T16595] should_fail+0x23c/0x250 [ 171.670874][T16595] ? __list_lru_init+0x352/0x6d0 [ 171.675876][T16595] __should_failslab+0x81/0x90 [ 171.680646][T16595] should_failslab+0x5/0x20 [ 171.685193][T16595] kmem_cache_alloc_trace+0x52/0x350 [ 171.690575][T16595] ? __kmalloc_node+0x30/0x40 [ 171.695275][T16595] __list_lru_init+0x352/0x6d0 [ 171.700048][T16595] alloc_super+0x490/0x520 [ 171.704462][T16595] ? mount_bdev+0x290/0x290 [ 171.708991][T16595] sget+0x189/0x370 [ 171.712849][T16595] ? test_bdev_super+0x30/0x30 [ 171.717684][T16595] mount_bdev+0xd3/0x290 [ 171.721958][T16595] ? ext4_mount+0x40/0x40 [ 171.726402][T16595] ? ext4_errno_to_code+0x110/0x110 [ 171.731646][T16595] ext4_mount+0x2d/0x40 [ 171.735798][T16595] legacy_get_tree+0x70/0xc0 [ 171.740384][T16595] vfs_get_tree+0x4a/0x1a0 [ 171.744908][T16595] path_mount+0x11cf/0x1c40 [ 171.749439][T16595] ? kmem_cache_free+0x65/0x110 [ 171.754375][T16595] __se_sys_mount+0x24b/0x2f0 [ 171.759092][T16595] ? __this_cpu_preempt_check+0x18/0x20 [ 171.764672][T16595] __x64_sys_mount+0x63/0x70 [ 171.769311][T16595] do_syscall_64+0x44/0xd0 [ 171.773728][T16595] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 171.779737][T16595] RIP: 0033:0x7fef4d1a102a [ 171.784236][T16595] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 171.803927][T16595] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 171.812398][T16595] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 171.820366][T16595] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 171.828423][T16595] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 171.836502][T16595] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 171.844557][T16595] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 171.852538][T16595] 22:17:15 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0x7}}) 22:17:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174610a654a0d0000676ea58689a300"]) 22:17:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a40a, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:15 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:15 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 70) 22:17:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a425, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 172.056034][T16711] loop5: detected capacity change from 0 to 512 [ 172.073920][T16711] FAULT_INJECTION: forcing a failure. [ 172.073920][T16711] name failslab, interval 1, probability 0, space 0, times 0 [ 172.086658][T16711] CPU: 0 PID: 16711 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 172.096815][T16711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.106867][T16711] Call Trace: [ 172.110134][T16711] [ 172.113057][T16711] dump_stack_lvl+0xd6/0x122 [ 172.117656][T16711] dump_stack+0x11/0x1b [ 172.121877][T16711] should_fail+0x23c/0x250 [ 172.126399][T16711] ? __list_lru_init+0x352/0x6d0 [ 172.131334][T16711] __should_failslab+0x81/0x90 [ 172.136125][T16711] should_failslab+0x5/0x20 [ 172.140707][T16711] kmem_cache_alloc_trace+0x52/0x350 [ 172.145997][T16711] ? __list_lru_init+0x352/0x6d0 [ 172.150932][T16711] __list_lru_init+0x352/0x6d0 [ 172.155742][T16711] alloc_super+0x490/0x520 [ 172.160241][T16711] ? mount_bdev+0x290/0x290 [ 172.164738][T16711] sget+0x189/0x370 [ 172.168549][T16711] ? test_bdev_super+0x30/0x30 [ 172.173326][T16711] mount_bdev+0xd3/0x290 [ 172.177568][T16711] ? ext4_mount+0x40/0x40 [ 172.181951][T16711] ? ext4_errno_to_code+0x110/0x110 [ 172.187143][T16711] ext4_mount+0x2d/0x40 [ 172.191377][T16711] legacy_get_tree+0x70/0xc0 [ 172.195962][T16711] vfs_get_tree+0x4a/0x1a0 [ 172.200459][T16711] path_mount+0x11cf/0x1c40 [ 172.205012][T16711] ? kmem_cache_free+0x65/0x110 [ 172.209867][T16711] __se_sys_mount+0x24b/0x2f0 [ 172.214539][T16711] __x64_sys_mount+0x63/0x70 [ 172.219183][T16711] do_syscall_64+0x44/0xd0 [ 172.223605][T16711] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 172.229500][T16711] RIP: 0033:0x7fef4d1a102a [ 172.233969][T16711] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 22:17:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="6461746122654a0d0000676ea58689a300"]) 22:17:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a429, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 172.253575][T16711] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 172.262069][T16711] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 172.270033][T16711] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 172.278031][T16711] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 172.286084][T16711] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 172.294139][T16711] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 172.302199][T16711] 22:17:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174612c654a0d0000676ea58689a300"]) 22:17:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 71) 22:17:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f0a4a0d0000676ea58689a300"]) [ 172.384055][T16835] loop5: detected capacity change from 0 to 512 [ 172.405570][T16835] FAULT_INJECTION: forcing a failure. [ 172.405570][T16835] name failslab, interval 1, probability 0, space 0, times 0 [ 172.418319][T16835] CPU: 1 PID: 16835 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 172.428580][T16835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.438685][T16835] Call Trace: [ 172.441969][T16835] [ 172.444957][T16835] dump_stack_lvl+0xd6/0x122 [ 172.449550][T16835] dump_stack+0x11/0x1b [ 172.453703][T16835] should_fail+0x23c/0x250 [ 172.458121][T16835] ? __list_lru_init+0x352/0x6d0 [ 172.463130][T16835] __should_failslab+0x81/0x90 [ 172.467888][T16835] should_failslab+0x5/0x20 [ 172.472426][T16835] kmem_cache_alloc_trace+0x52/0x350 [ 172.477892][T16835] ? __list_lru_init+0x352/0x6d0 [ 172.482825][T16835] __list_lru_init+0x352/0x6d0 [ 172.487582][T16835] alloc_super+0x490/0x520 [ 172.491997][T16835] ? mount_bdev+0x290/0x290 [ 172.496566][T16835] sget+0x189/0x370 [ 172.500407][T16835] ? test_bdev_super+0x30/0x30 [ 172.505204][T16835] mount_bdev+0xd3/0x290 [ 172.509448][T16835] ? ext4_mount+0x40/0x40 [ 172.513778][T16835] ? ext4_errno_to_code+0x110/0x110 [ 172.518973][T16835] ext4_mount+0x2d/0x40 [ 172.523135][T16835] legacy_get_tree+0x70/0xc0 [ 172.527756][T16835] vfs_get_tree+0x4a/0x1a0 [ 172.532183][T16835] path_mount+0x11cf/0x1c40 [ 172.536693][T16835] ? kmem_cache_free+0x65/0x110 [ 172.541679][T16835] __se_sys_mount+0x24b/0x2f0 [ 172.546366][T16835] __x64_sys_mount+0x63/0x70 [ 172.551014][T16835] do_syscall_64+0x44/0xd0 [ 172.555453][T16835] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 172.561362][T16835] RIP: 0033:0x7fef4d1a102a [ 172.565770][T16835] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 172.585376][T16835] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 172.593804][T16835] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 172.601807][T16835] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 172.609774][T16835] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 172.617733][T16835] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 172.625747][T16835] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 172.633727][T16835] 22:17:15 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a3"]) poll(0x0, 0x0, 0x1ff) 22:17:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a42e, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f224a0d0000676ea58689a300"]) 22:17:15 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0xa}}) 22:17:15 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 72) 22:17:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f254a0d0000676ea58689a300"]) [ 172.926966][T16849] loop5: detected capacity change from 0 to 512 [ 172.951451][T16849] FAULT_INJECTION: forcing a failure. [ 172.951451][T16849] name failslab, interval 1, probability 0, space 0, times 0 [ 172.964090][T16849] CPU: 0 PID: 16849 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 172.974336][T16849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.984487][T16849] Call Trace: [ 172.987802][T16849] [ 172.990728][T16849] dump_stack_lvl+0xd6/0x122 [ 172.995449][T16849] dump_stack+0x11/0x1b [ 172.999604][T16849] should_fail+0x23c/0x250 [ 173.004165][T16849] ? __list_lru_init+0x352/0x6d0 [ 173.009228][T16849] __should_failslab+0x81/0x90 [ 173.014003][T16849] should_failslab+0x5/0x20 [ 173.018519][T16849] kmem_cache_alloc_trace+0x52/0x350 22:17:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='\n']) [ 173.023912][T16849] ? __list_lru_init+0x352/0x6d0 [ 173.028852][T16849] __list_lru_init+0x352/0x6d0 [ 173.033608][T16849] alloc_super+0x490/0x520 [ 173.038029][T16849] ? mount_bdev+0x290/0x290 [ 173.042607][T16849] sget+0x189/0x370 [ 173.046472][T16849] ? test_bdev_super+0x30/0x30 [ 173.051232][T16849] mount_bdev+0xd3/0x290 [ 173.055507][T16849] ? ext4_mount+0x40/0x40 [ 173.059857][T16849] ? ext4_errno_to_code+0x110/0x110 [ 173.065058][T16849] ext4_mount+0x2d/0x40 [ 173.069217][T16849] legacy_get_tree+0x70/0xc0 [ 173.073833][T16849] vfs_get_tree+0x4a/0x1a0 [ 173.078276][T16849] path_mount+0x11cf/0x1c40 [ 173.082780][T16849] ? kmem_cache_free+0x65/0x110 [ 173.087637][T16849] __se_sys_mount+0x24b/0x2f0 [ 173.092354][T16849] __x64_sys_mount+0x63/0x70 [ 173.097013][T16849] do_syscall_64+0x44/0xd0 [ 173.101473][T16849] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 173.107406][T16849] RIP: 0033:0x7fef4d1a102a [ 173.111816][T16849] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 173.131707][T16849] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 173.140193][T16849] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 173.148237][T16849] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 173.156202][T16849] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 173.164214][T16849] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 22:17:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f2c4a0d0000676ea58689a300"]) 22:17:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='\"']) [ 173.172183][T16849] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 173.180185][T16849] 22:17:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f650a0d0000676ea58689a300"]) 22:17:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 73) 22:17:16 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='%']) [ 173.241039][T16973] loop5: detected capacity change from 0 to 512 [ 173.260636][T16973] FAULT_INJECTION: forcing a failure. [ 173.260636][T16973] name failslab, interval 1, probability 0, space 0, times 0 [ 173.273327][T16973] CPU: 0 PID: 16973 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 173.283478][T16973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.293584][T16973] Call Trace: [ 173.296889][T16973] [ 173.299880][T16973] dump_stack_lvl+0xd6/0x122 [ 173.304491][T16973] dump_stack+0x11/0x1b [ 173.308647][T16973] should_fail+0x23c/0x250 [ 173.313063][T16973] ? __list_lru_init+0x352/0x6d0 [ 173.318000][T16973] __should_failslab+0x81/0x90 [ 173.322770][T16973] should_failslab+0x5/0x20 [ 173.327277][T16973] kmem_cache_alloc_trace+0x52/0x350 [ 173.332567][T16973] ? __list_lru_init+0x352/0x6d0 [ 173.337506][T16973] __list_lru_init+0x352/0x6d0 [ 173.342357][T16973] alloc_super+0x490/0x520 [ 173.346783][T16973] ? mount_bdev+0x290/0x290 [ 173.351286][T16973] sget+0x189/0x370 [ 173.355124][T16973] ? test_bdev_super+0x30/0x30 [ 173.359909][T16973] mount_bdev+0xd3/0x290 [ 173.364244][T16973] ? ext4_mount+0x40/0x40 [ 173.368575][T16973] ? ext4_errno_to_code+0x110/0x110 [ 173.373781][T16973] ext4_mount+0x2d/0x40 [ 173.377952][T16973] legacy_get_tree+0x70/0xc0 [ 173.382541][T16973] vfs_get_tree+0x4a/0x1a0 [ 173.387011][T16973] path_mount+0x11cf/0x1c40 [ 173.391576][T16973] ? kmem_cache_free+0x65/0x110 [ 173.396421][T16973] __se_sys_mount+0x24b/0x2f0 [ 173.401095][T16973] __x64_sys_mount+0x63/0x70 [ 173.405682][T16973] do_syscall_64+0x44/0xd0 [ 173.410180][T16973] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 173.416237][T16973] RIP: 0033:0x7fef4d1a102a [ 173.420641][T16973] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 173.440268][T16973] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 173.448679][T16973] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 173.456658][T16973] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 173.464631][T16973] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 173.472607][T16973] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 173.480656][T16973] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 173.488625][T16973] 22:17:16 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0x10}}) 22:17:16 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:16 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a3"]) poll(0x0, 0x0, 0x1ff) 22:17:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB=',']) 22:17:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f65220d0000676ea58689a300"]) 22:17:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 74) 22:17:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f652c0d0000676ea58689a300"]) 22:17:16 executing program 2: fgetxattr(0xffffffffffffffff, &(0x7f0000007dc0)=@known='user.incfs.id\x00', &(0x7f0000007e00)=""/13, 0xd) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000200)=0x80, 0x80800) sendmmsg(r0, &(0x7f0000007ac0)=[{{&(0x7f0000000240)=@qipcrtr={0x2a, 0x2, 0x4001}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000480)="84e9ca548069289d037e534dccaa5738e5bec8e6a2d183d35bb4caf5e318da2441674f7381ada1a545bdea3deec258be6b589470328601642fa6b8f9c0471492e88dbfb659668e4f592db35e19b3a5c5f53a8f21492f08cf9e5b0df5d94d11bd95f2913adf789133138b4254fa5746ceabb78f29aeafc317c7d90177a0a94c5e917c467256a57841c6e7c18f05519084bf97d8d1612660720726c1f0f487f793c7db75bf2c2d510945460778c666ae1ab3bd86b23124f285e1417bd810a21d136097cb", 0xc3}, {&(0x7f00000002c0)="cf90f2b52cf4743362e3cfe3b08590ce62b1880699ea78b2ad72d7085b28cced56824c03617ca2e6da7194cf01ce1bce989df19565e85ec7c5bc", 0x3a}, {&(0x7f0000000580)="fe7306f946fc0f787cba1a9284a173ae9041ca4928b9914083dba3b53c6a39fd99617c54befa2eb697481cd54dec13b7ab98fea7f09d8369db6720e3f42f6ecfb99a6ec3217495e0418960493695f6d7c5e49494", 0x54}, {&(0x7f0000000600)="63eeb7051930867c1240be0cf2a807f250d0dddf96e60ce53ff388961ae8c0caaa466fd3cc72055ac2aa7534d4e854a2bad1f340859259d58eb1398b626f1447ff31f865bdd03dbf0b7948a4c37f3b6671fe2a6caf8a88ee6c7c61c26145d7ff19cfa72b35080038eafca0d6c0afe0883947a68ce3608f2779c7f3f4e653e73ac2a2b772650df652d97bc563735681c7f01d5ab5633a899f1f59849cb0452cfaa5b8985dbba517cf91998910b5572bb163aeeb547ed6d6", 0xb7}, {&(0x7f00000006c0)="98d9fbc393d12b1e3f07ae1b1952093e0b68d7ff84eeb5a2a3125674e819a6e8d93a1f60de75ee5c3e34bdbc4c0e60ac1e1f1cc86809cf8744a880adc45bc89602a505fa9814821816f424ce20604a572f0c3297f6ce0530980e3efeef4f62b51142e04e5cd1e734e8b704d74e5b59c0a12a3c5fa6aa089908c79237ca99cbf4307699048e0c9c7a1808d36d1f188ce717c7dabb9cc8a519e49e2bb30acde055a9517462db485c4a4c3c2a45", 0xac}, {&(0x7f0000000300)="4cf4f3f674d119541426edfae1bf906298ac63ee8789e100daf0f3ea74dcd69acf6d6b36ac3aa9ca", 0x28}, {&(0x7f0000000780)="f725a4cf243aa126d57a7c42b8e5a552492a16ff5e4c86d5a6f58c34726b1f46786e629d81c2bd7b969798a78973510968df6ea1ecf9e76769ed79bfc69f51a2ea7dfec9d79a0d", 0x47}], 0x7, &(0x7f0000000880)=[{0x88, 0x10c, 0x1ff, "d52fbc6c643ff2914219a6528b4edd7b7bb7bc0d5ecef12e4f0a65338819593b9cfbeb010910903d32a879c542cff18c217935ec293652e0d34e4ba838ece9c3316601db7c13683050be04f0eb0506f1bf481bd9e30f856fb9ebbcc1a59a536662f3980d996e4d26da623f6964f6de707cac3f"}, {0x40, 0x3a, 0x6, "1d0d9f629cf97b542c193929e223362abd0eb0e30edbb63f7b60c3e7f260ff3c823ad8cd804c432a43b2f41b768543"}, {0x10, 0x10f, 0x80}, {0x78, 0x10b, 0x1, "a510e1ed40e25154ddd118837bc00fe71a7df5a5031997554f78a74d9a21997e2b761fd2ee30ff3569f806e769dfeeceba51283b617e12b7b0e1d0d8459dfd80c49b28f53b34e3b88b0ecc9c9ec6108575e96609f88aeefdbebd221de8668c310ee8bfc1"}, {0x58, 0x139, 0x6, "e0c492174c0efcf4f978b9dadfd8f5f329c334c1ded4c2fe51c7df506b70a7650e7b51ff4cb22510dc1183e2b297ca183999801c6e31550b68ee30221b87641afe3160c9"}, {0x70, 0x10b, 0x921, "fcbe0191d21fe142ea554c3c6001f12dba7191847eafdb1f6e81604714698a7a2a2b9907766a4f6685da4fc6becbfdeee4a55cd6519f9a358b77139954bf6157642202c506f2bd53c681593d378d1f7c9a5aec41d070b4055ceb9749ba"}, {0x18, 0x11, 0x3f, "b55820addf"}], 0x230}}, {{&(0x7f0000000ac0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x0, 0x2, 0x4, {0xa, 0x4e22, 0x7, @private0, 0xc8}}}, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000b40)="ac4fdd6150ad5a7f85383d9ad581732e5ec35ceee61b6b0e5a7ed7b40d2d46775640780352aaf2bbbd2b1f42fcb2c00b6006a0ddc72ddccce96f52d4e0e6d57e6c229a76a9cd51f76af741b259b90d93c4732fba3b7087b29a6d6b7559049db80634aaeb540485e21d6769b56cb0c0f51ea57798763df8f6f85191e6b7cd55463bcfc5ec6dd95ee7741e499ded982e3c57489c3b47cd4bd98afe78c9f673bd300993400f64698eb7cf1bad7276616f42b2c417faf1b37f90bb9b67f80ca21d6791739043e2b3c6d1cc30f80b14c856aa2df4b0577311a725706f2fd4b52f05de3fc106f960f34b69e4dc2f", 0xeb}, {&(0x7f0000000c40)="3464fefb2689ecf70cb73470a720f30b6d20df136ef4c57a240e9ae87a7e7a350450e4b33747413f7b15d0ae73", 0x2d}, {&(0x7f0000000c80)="3823102e9ba18be39c2faa827412e8f0e6d28523dc16ca623068a4243418cdebb07fc882248843545feab5a931cfb263b3b6bae1796069bf6511763d2d70839d99d126dbbf3db73069006c754d446b4c2d60ecc7137fae53554cc26ed2d95cd1be3b471ef229bd8619097adb0428b0d007eec7583df64279414c18963ad00108975f9c20f7ea49c47c900fad77a81963d1baee0b25122e46ac790d1c570d74678e29b4444995a9cdd2ed121be27c61971c47932a7b07ae311a4bac1bf7b6d711b63a4f8acb02f70e47339d8308839417866a0041860cec1e4612ea3d1966abe2a9cfbeea3df6faa0", 0xe8}, {&(0x7f0000000d80)="ccba614bfa9da42fe81e543b4b032ac3f209275e9e1fae97b354ee1f8c64f60acaa176f3def21579c022af884fb6977188624ff26f1dc975934ec53b6618ac69c1fea9309e521da02326042f2677289245f2669f994f60069843ca0dc33eeb49b4d802f1f6ccf79482caa559223fc37f432a5a72b2c484a165cb652aa10e1378e1b1cf8c1ddc1f42e7fbb95799530379ccafe40e854e741162cfe7c49471ac44594993", 0xa3}], 0x4, &(0x7f0000000e80)=[{0x1010, 0x6, 0x1, "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"}, {0x78, 0x10a, 0x80, "9367bf83cad59051869cefe6e5a4e1f4bcf04f0a54ac43f840511c8b43cf1f2bd1d27dd26bdff01193c0fc63de4baf4bfa395c64b5019157d25a01e1e33cb52ec9666ce47421112c123b9e6b032d1c39a2a9cccadf6c2327517d268a1a3e9a8cd6ae7ef6123d48bf"}, {0x68, 0x105, 0x7, "2f46ac4e2ec1963a4c4eb87467c79c7f37f1ec5455b4859434168319cb234742da3aeb37ad0a585ce7537fb6fe608c04d9867ec6ab90ead05e59c4c86fe015bd63e6b202ac2e6a36667b91f3f77412b9e30b26ac"}, {0x50, 0xff, 0x0, "d7bd5a1ed6e8a19f89ba64aee585af64a9da0c3445042a9fda54c3333b9bce5e4eca3c7e6cb0f4096d1d71c915ecfabae7ea65e17cdea81b87e5"}, {0xa8, 0x103, 0x3cb, "c38a06e42daab1b9e3ec752c1bf94de0a81b27b7b30a1674379cf6986784d199a004d60858e41eb818d17d1a805554e07300aab2a3b34aac4c4772f8aa2544703fd7d273abbdd9b32f98271d392b603c00eb40cf2706b7d16a68feae0e14fb0b6e7b2c166005728d7aa35aa4ace94658eb196f6bdd0e0f9c48b3d5a766936669eecd51fd082ab1b170ff53827d544bfffb6ee7a3"}, {0x1010, 0x114, 0x401, "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"}, {0x38, 0x109, 0x7, "fbb4a5155d70a2b603b93cdcd090475207c733ccaeb324ff19b0c12216e6b710da"}], 0x2230}}, {{0x0, 0x0, &(0x7f0000003540)=[{&(0x7f00000030c0)="938ea02540661c46086492912a6c0fbf16a4fa67feec29abaf300e9e94c9b7582f4dc535fa9f9680e4a995dda5d034347deb2364b02cf2796318c2c69d6fc88565024296c107a5343b3dace3183b0dcccff2dcdef5dc11a2", 0x58}, {&(0x7f0000003140)="c6c6f8854f255ccbf2f7ab0f6e2436ccce69bb8dab20546b76b7a1f375f896c6dbceb856bb4ec5109c695cdc6025a13f6b5ba0617e9322e6da9c6c18d7286c7a6f1f8b42c5ad7a9116a594ff74ae9c4b20046357ebe3a50167bd1480946ef2011323a7b1ae68fc0c31300b5ed36842be0b03de61e267ac15cb33678322654ddbc013ec4bdb04db65985dc5f651b53b5be8688ca3e1543b863474fa7bb48bf58f386ada70dc017bc8d1f702960ce0623b62d4382c0ec580f8d808de219c643b5c8e", 0xc1}, {&(0x7f0000003240)="b5992f5e6147b93e73dd0ca5160df092dfa4694bef5431a13d9a2a6133f1ff5eab4ad94d48efd99d2fcf4d49dabea08fa37bc0bbb2bae4a9052bf5b3c092c6e953b361c62b77c237cfa23ac40073095447c3f34a1bc00b9b85e41fcf5ee7ee43e9ac8afa23283cdfef9078e6bbc757d27903cc4d050e3b666246b80c8139892216428831cb5aa0fa9f682b7c18c362c7161ba9ea35dc67d9b1ea380ba6abb09ed30bd0073f0d4a023b7a1b424306ff6c207e1a2785771a379f56cac5a9183ff61a9c9aa443e703201d8842ba6abb8bf845979b860b6bc0a51016f8ce96b1995d8bec7b49e730551dc0dc", 0xea}, {&(0x7f0000003340)="d9050578cfbacc07a9ba75efc2707bf032073f2fe38e632172978dd50bbeb1ac35cbf7ec9aa49cb9f7ba9d606f92b2bb747d9348e25da528c0e478f445615e2ee2a4245dc5fa9a6f5fd690ad0a555580d298f823321ce5fc18d62bb16abd87dd2ca18600f7aec8c518a06ee600b1d959c92b628394892945bb568c7f2f79fd752e1b22c0d5cfefab501bb64307533e842a90dc377b46620f0db470a29ff39b24bc4756f2081f6627a86b42381529f2421048b1ec72e69ce2e1ecd6fee7b6067562385bbe287746bee101bffbd140f711fc5dbabbe68eb790e2547a5c409535214a79bd893d837541af00da48", 0xec}, {&(0x7f0000003440)="daf5fe50a5bf28b12c9f6b3453ad6118d3fa09844131ede206fcb0e98cb3dd0dba948bb36d75dbebfd12078edd31817c7fce94e9a6dbf85a9788f6b9f322e77ec59980a7fbc8003cf97eed0c529ccb7a1a47175ee78469921a233b9904ead599c809528026d98dcb9272f5e2711045b72ab8fea7bea32af5edda3a7290ecc64bc25616571f2f550f107f56144cf3a5c7e64a5c0b07ece0797d775c9326aa90adee758cc76d992218de85ed4a8590502efd", 0xb1}, {&(0x7f0000003500)="58f837f81cf4b6ba9b9853b32deba69b0a53cf4adeeadf3be573da29654c648f75e0bd025cee7c71ba1eb714ed63a522074923", 0x33}], 0x6, &(0x7f00000035c0)=[{0xa8, 0x6, 0xd704, "c5cc49b6c1144d176faa6d8f00116e4fd0e2aaa04374061b753cbc146b4faa5e8e93791c1f8cb908c38398dd9012382df051feec63a7f52113b900ac32889c61631749a6e5a8f72b94bec4ae8541803b419aa9134235dd513a5092c63e964e0ba7ba24fe224a6a622cb3a4a24b63cd50c26f41fc75fe81c172cd0eca50e0a594754de7e4a5e18b36ea31f82d8a4d074c6784670f"}, {0xd8, 0x1, 0x4, "cc0f06ca1cb784dea5603b63dda5ed6492093962f050d98708bf8f9299ea8d67339277b4169b55dbe6d000951ddd6674dd3311f31f6724591f31dfcf71a692b81b94637e58c63b964c33f391afe724fe0903bdb27afba0341b2d43098665f7d739cfeb8ab104f8a4b13c254e45065105ea44a17a3ceb56b4b072d4b7005f981f7896f73b25e2b66c66482bbdeda98751ec8d3f7b6a7704d5922f6afcde57050759f70ef110f9bda39f071d7074bc92c03f2d43b892a6e77bdd18750d7c4eec09b7c2eb"}, {0x78, 0x117, 0x7c5, "487aab13ee77ac84633d5c3638e6d43846d44c7359cdaf530b3b55fd817b402bcca2a77cdbc516265d0a047e1a9f0982a79ed55e3e5b3266cd620c013448cbf200c68df4d66f534f58bfa852c2c52957f7ac2c75fcf43aae21d1c8e213bfc41b33c5046c9787ab"}], 0x1f8}}, {{&(0x7f00000037c0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x80, &(0x7f0000003c00)=[{&(0x7f0000003840)="0d4b66af53eba5e187f62691d6e8c72b13b993a4b9e15d327d4f9cb6d40478877a1946a1a531e10aa2d0d1f3fe1aef1754d8d5369449d2af61df829efe89fe06385734d883a968de5d7a520bb2676a5681d7770a569096cc95904d63894553487bbbec2595bcea8092101ee6a029a2c8f2cfe2616d769e5d70ec473344c65505fa8c6e54bb34924dc3e29d7d605b5887a495e2b866a3605cf3034d0b8731c5d70e24300d04658d27c1f513c9f80c6636254b5fbc75a4751ff556a9b304dd8c30baf122c06d0d51f2c9c92d", 0xcb}, {&(0x7f0000003940)="bee9397e7180910fb707b29ec873df19fea880b1f2f9babeb184734df50d28f7a8ba1c6d7171f3bb70949fd6ad63a069b0a813eb513c6836d17d42822dc72987ded150755ae5fef15e266fd4f91854a2f7cef6307117835f4298965bf48a1b660db1e96b6a2028aef0719d3bbb5e5b32ac66cc6a732b117b1ad3447fbce913dcbc0ff958be5831a3db", 0x89}, {&(0x7f0000003a00)="21e5c3cefccdd5d99eb3a0a2c4895e44787262934811fbf6b68d59b1e92e8a187516bed9f88d53a3d3da051eb2c4acb6f298382e0af67f3678c5096ba66705c442359cd9f150c3c9779925ccec8c1ae1acd55d73be0452789c34e39694f823a04c19d15104752836451d6014ac929069123c74430ad0e84d970a3b4b25c7ff451819a9984ba92bae700ec678c7fe4053d64eda2894aabb6e299f7d1dfc0dbbab33ca466fcbf52d753b20c5fef7c5922052ed8f6c0c5825eeb16762c641d5fc5c21374ad026b32f8ed08d4bcb546a27", 0xcf}, {&(0x7f0000003b00)="0b546885c3cc9fc566db1eeaeb59201ee213133926e55fa4cf4a7fb953b1fb7f798ef8b1d364f21ec6a48ca3d2825b3d7a7ca7c95a60081244d785623ed460f7ce8bfa0f87687e5895fdd541d8fbfb4c76da1bc32a42975cbf3bbc8bfe5b0c7430adf14c6629da6824d8cd14a42f54f1223635434db40ffb6f714a04e257cff59d072f72273ad4ce29bb99811d6844361ab1bc3ac03f9e31f0cd1727084286ed42741af6440b98b293ff721c7fd79d5702c948045d57a2523ece99e8a99cc27974021ff0", 0xc4}], 0x4, &(0x7f0000003c40)=[{0xb0, 0x10d, 0xfffffffb, "ffa3ceeb7c2d040a45bd03ce752bd7ada5f1408d32b0c53a1dec1b3cd356ca1c9cc74948af1e74b4b80a9f29fd02c008b95f32a10f619c02d20708ef17fcde09fce837b6c6598318609137e16649158acd2fa7985752603fde1e8f00159be92a370b9d24a05a559722ce25004985c5584ef73fb5450604a2fdf43737edb599c559f03ff98001b7d7966c9dcd8516b3848b042e9462c00aafac59c7baba67a6dd"}, {0x28, 0x111, 0x7, "93601867cdde452f9c0c0d419f4ab9f7d303"}, {0x100, 0x10f, 0x1ff, "44f7c695daa6ca63c2b83076ccf7e3dafba2407d5844c73a016e9a18e69ed045c31fd27270d5860dbfc83bd51cabbee5369eacecd25f526652e2bab6a78ba39eb3f09cae63bcd23da4521c6a1f60c49902685d4fe7467ddb22ce2785aa92c571cdad562e784899d5ec8415e152eb6a9a7bb850b743a79a0cb2e50da2afd5da6400135adf3ef12473b3b857615543767f261b3d6babadb8e07ffba5e2b81c515704703fe2eea408f5825cfa4e8c0321976d1e2b47379355eb0c7e86104290d2580d259854fcf80a024b1cbddfbee7ddd6c282c5bdeb6729c6beb2ea8e39310b8a69000bc33934f69e8ee822a9f8"}, {0x1010, 0x113, 0x9, "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"}, {0x88, 0x112, 0x6, "f922b5bc4eb67d8ccd51027e4c3308033c938032a26cc14bfd7ad155b16b5ffc6aa8bc217ce22ccc527c6902a17384eb73c7c3f447600f69aca83e89ea8437a219f3c45787262e6e1460bf954e97295c8c3629bcb684e5363501428d8d9c753ecd6009dcc0dbc64557ecff9f2123eae0cb3cbfab"}, {0x1010, 0x119, 0xfff, "dd4564882f386855b9c4ce3cb30aac57a0b786f59416c912912a75e35eb4ae607658721f8141cf8a0dfcbcf2303dca809874d8d6f9375722a3c6d985c94a34a9bd898811119318a1e4277a39c61f6d8732c98ab3011cf304e6f107f56ad60729b854ba7087317c03696c78cefad63e4e1877cacbd88f66f7d57b6abf61cf25f3d460246a7b26707183f7782019def1872f38922639ff323f4d64ba86e367097fa978f688ec5643f7bf1a6a54236185ad00d98efc4216f81c2157bb6d4f0dfc61b24ba128994481f71665b691158e24f13910ff6fd0f5447ecf852e0c7de0a1d212e30746ccaaf466287ed5720d82f9d6dd4dd89686cd24815e3f0fe72ebc8ffea8d5351b8a92799462be8f2037462f3f0e42cddde7eea32b5f8eec317d72dd0c32c78b0832e18e070a1d0a1c69e2d1ce8cc1211eb3dcb9fba9de766cc1127e11d0af30c1430893bd57f18f25b67645f8c4e9e74e44766631ba692b07c01c60c22bf259cf564eba693a8055ebcf4f13c0b8ff8a624511945adccdcadea3d262306ed594736e75085017eeeb9aff89f296fa385d6b8f47c1b69304467692711b40b6148fd95e01d99df7025a20c5f2e40db60d90ce45a397041a9002a99aa8439ee4cb25cfdb98cf125f234f82dd9656992e83aeee4eded7d263d1200e0538021d14eecc4d264e8212d0d1047a3f85e4de669315aab38ef5f1e0f9d486dd6d7f637f9a6e5478b29977fdc742b15bb2a803c66bc97c7b99fc253ca1487aa46ee84932d29a5404165cb88b1f243ac8a6ce6a435c84418d1818c3094caa98b9df209f2f959ee2f97a2111e8a87d988facf34a4e905bf3538c5e984f03e57f0d96af233e29711787accc20f688a5df116d73007ab2e7eee620614c94af64b3a07db089182a1e0ca4149ca15698bffb1b6d53fba547ac8daac698ac17f174b4e53432b02083496effa7e8a6dd0d3d0c96fff84e0a41c790f65106c08efff7c4f7cc1b9d62717e1800c1a60171935efc80d8f75b15ae97fe5e4290a58dcae3b15102892bfa52ed2915bf4f5bc9dcf139ecf6c03255a614054d588ed0768a58e8e249058e565c1b0201f785b40c4a4ef7e7621a7f3c0e96b16b71cfbaceb93591be57135b4f679463c1fc90128af3335e09c860215931426b4a48952b3dba2ba11b6a79e04d4aa351eb817e4042debeb81ab2b6feec072b24af1efc7f51f890ac541faa9b1f83abe585cc20c057df231cc53dd5be660b0759062bd82caee2b92251ef7aa6c805ba1acf74286b699fccce95724c3c4b3949d2e95e104580cd04810d9a7f23aad608f0963d83ef9ea6162b2a2a2df79908d28de565d9a20f0914fe29f7c1244063101edfb1bb4041e3ebc6140a8dd49decd4c429941b83cf3b7101cfe3096630aa2105736793a7947965e33b4499846357be7c71d675e25f105383aa08377746e480720726f585d3d1aa1ddac756bb9ce62a60a599fb9f440ef4e89f2b01fe4a62dd724a3a832fde1e3b132815f042defe55e34198cff4e3ab0138960be5750f267f68b9cd5b65fd42346a27ff48df7363f556dfe1735e3916649c25991535985b5ca3d74895f94793a9eb5ffd227007e800277e82f25d62a05ac78bae86089100600b6f62e3634bd21d82c92059bd024d474732e73831b8143785aeb6117bd1e91c434c0b6ff8edfd65942d01e4cdb405c95c7cf5d6d3f3832624c1da4e6b210b1f593ab285d02bb5e9266c9df83bd62852f63e40fd50efa6968b44c594a5ffbcf978d8c536721c8f368d6f22deaeaddd38cccb0b14aa98082d4a176df4b907acc6bd24597d53f09d1dea83a35641b80d7576c40de78384cb96a1eaf665b92c1afe2b224c9b6c33a30b74c0968616ade2603cb4dae011f9c2cf8d15b141ea94cb286ba290f498d1d5e4ee2f573e3b1b242cccc1479ed1ef552a17b32c8e9e3b8f65f64d659580a9870d4cff3f1852432f0cc714a60364b37d256842735871d89b4bc1240f947d5095fe6390eccfe03ad36baa54048e211d767438ec4201a608a59e33c9b1277b0f77cc523764b4fd82fd0ecb61488bc0f07daabab3d89c035160eb4e299db52db216a0eb619698b4762865258512de34b3e5d83b15e643c1419142216b67ac67efbb742cfd9001e0df498ee2d7e90ab63f21104427ef468984b6cdce094ffbb251af33587545658ec1d93aab22fefc8c5d059c46e145c897a5c92b54287f4d28676f92aaac77ca02a600de28c03ed06aa7a4a5da57c9fcb7c0cee7d4a34782748a5fa50bd1af35a44252489942177254a924588ff666ce84209c9733f3b6cc71a2997304de0ae72a8566ef0b8f4805da8f9d70ac77003e63b521a1560298d6e282ee914d7d32b536702e7e8d5af303782852ce956f7561df06b93c2478af6a8c6352e19b3835217509fdfb7e143d0f61917414f2eb4d9a4d59dfa0e514f742d253996909b7d649a3ec528769d11bfa18ce0dde2c9ae89e2ab5d634d58869762a07d067a25b6fa4460e88d97508a498657c264123e20f0bd3cafb8ddbed46e2f8b4a5b53e450bbdfa8f4d1249c4e022ee3677d3f432c4b0869ae133745da8ce2742462b08e4d9809fbff7c06a9525cf3dcefdfbd670401ccabe9f79b7edf7b0ecf9de3114fd3678a994f89ab3e0b7f21b7cb8a9bd78c5693d5108106cf3bf6b63f1c60edc334da8879295125b41db3a513c383b5efa43c41444849112572ab4387e9b123043fe17eb45155d5631e3a9cfa4527ba7ffbf1d4a019899201d4f8bd44d0d40fdedadb17d043386fd6c168159e28e6a95c8c6d35d046ff348e3aabeb8e99fc1133204a0dd7c65a7b58c185bf6507801ab7c0f47213f3814ab7865984badcd706e1869c8d9fd218188da178b93a17b0954e45c15acebadbba326301fa8dd48787987970d8ed0d8c7ee247807d2765f5f6816e20f0e5b7a9c3be77a0ed505d663348bcb7927afff07b8873cdc820c1a8141ef289ac23002192cd1428dbef94329f9677121fc144d8150a1f8aeef0d0a22590344c0fd6062c7a402dc6a43cab0101f02de542b168bb3326aef4cc8688e0df021fbe44e51bee93adb8f03a1c1cee3e8d5c5466a1523ac525028955cdd23756afa40b5d7ba2dea019db357342e4a5d4d5635635f9d4931db3890a335f9a69d3764bc32d1199b677ab4398823f3569249a0b0f059c3f37a8291e8854d56594c3914706855ff1ebca94e62fadee4e1c67fde3146b74fbdc56e9e7bddc19e7b62dfe47a49cf933a46fa3744a4eee68217418906d11fa9e72bcfe03692b11cf13b64c622e4666d71bddbe6674b5b6cdf68173e5f86fb61e2e46d57e292dce2e302fd1d2af62efee3d49022fd67e35274bcdcb0936ea94a097822d06aa709e53a660c087344ebf7a1296e9783f16294c3486865c03f4f4a72ac8b8525caa0ba9da443e3b365ee0c4a0011db39178e0e9496f2caa29aa34512287e60abccd29fbca55329f29004098fdb9a4901158e3b0f3873a072ea4ad055e1cab990ced4ecd807d613c072b467adb6249ba3f394fb0882d0840c44c5662cf6a855ef8ac55c2fb48c8d64c435de5505d2ad462103e8698a8f372b5cae6b5c75ed8cf8319f306088c53efb7b484fe9dee3bd2a502bcedf79508d95f74d031938b211b89d867c5018df075d63d58e9c300f7a9fef7c50dd056d69670061cc142649f4415d9cd36e8ae4268681c533758d5cd3f02e3fa952511b67e503f44f806caea7ad90085f5bc8a139c63f5a5606ac9e52f01285525eb3eea3150114c3bf904de69e5667c1f42c5f4a74cf9acae7ae930593facf761ed22f0f5dda14ed1402874eb7bb24a990d5861a6464cba55e3efac1ee6ac615c8b60cc54aeea4528ae07c93f7f122995e683bb860704aac98fae4a623d39984fcf80ab467eb893f1be02114e76c5b2309f8a3cc695b95834f67d23759904c9340178951d3ceda588aa756fa42a3fe265ed384d0ed0317db555e12a1e42c60e98eaddffaa25b199181c51673605f4ad16b17dd0cc06610e86a94eceb99dc91dc0f99b88ff7b627c9081fc1f7ffed45d69d1719ddd1bcff8088be74abee20427d99ee69166d3ed083f9e42cd8b1b1ccbb0c323595b0b5962e967aa3f24c9c778a769d51a80be6e84181d68dd5e5a22f768dc27a10887c6f85809b76b432f9c3462a0b6bbfd070317cae5506759770dcb3791bef5a058bd9f8c2a42585b59b0e98666c8619880eaed51d800f6468f84f007cd5be7f0935e6457bf978ff845a86e6e2c6cdfcf7b0bbbd58247f0971c38e372840dcbd1955f8d3402dbb5a2b767befb9fbc245670ca0a7accec77d042b30083994417ce1d8d7693325f1570fd1de0d5ed273f7ba37d46cbd2017a270b81939f064c09f6c56c3c648a560ba66f55b52533c9cea5085cc3ddf12e9dc765e39c0919b261c542c947ccfdacd081802d6ae602c4e443a7f285cf5764b6ddd8d50a2065f2d6592b58eba61dca15629dc7fab345cc0cb8cfeb8b066488b5c90d319c7a256a4af0ce075857191502cc462f30d7bfb2be210ea4884acca8fb812cecd31d10e32f14096a3a60a0b28f6a3d7192f059582d55df9db5964714cd216bdfa6a6007a64d59e264b582bcd3ff77ed4badb46a78d4811ef9a6d6c8e01756eb1c7a12411141cc917aa26beb2a1303413aac09584f39982e430cd6c87c73164f200bc5401527aa33b2ffe5a790b6e7ca40f9bf45598b6b862a624aafb8e848326a3d759a8ad46804e46c67a1c73b76093c1631fb19278af696dfa669ba4827c218654af7090545e6091ca4b14a436dc2f279d81aedf9eb2f851f2325d50fab17293482e5fc3b47515a7dba08172f993e77df50e559cfc0ab470f7f784f02b673adebc3116980319de623445334253821b028615be69c6633aa7ea533894f190938902495d8fd9e106ad04321767ed8544c67203a259f3011199d8a37e3daa7709226613b2a338bf32871d40864986f8d487107b2b0b1344124e68b0f91b9a2a664d9702f7b0150f0a47a414c7d1211193246857d00e2b1fd0e29f87161c283dff4b4c7f9b255c4712606b0fb4d310e25e886784c599e355908d07ff50cf8ae37cabcce7ec563c151cca55bc2af3d43ce184d044397828523c13c91e7aa38ff044164560eb8337d83c9d60c62c4e5bfa2b2d2600d3d7112e68db5eb6c2f4e6e9dcb2b0e1996cfd1c399b945147ce5e18a248807f6ddb7731cbe179ed2ab87e7b37768441085c62584718fb5e033b6f812c501285ffcb906fedbc6352e2faa8372e241c387783bc9fbaf7959723ba252efb898bc72d9137cc76c5f478e8e530c29f752c74d9fb754becb7a792c8e0db6271bc6832206b73143a48eba6064f46c8855ebc8ac62bc92a9c79577db3c551b95b3e0d49c118ceb99755144d00590e0de4b0455b86f417855a41934216804999d0ef9494acf104ea0cb8b77fdce63ef098f498e1e9ab2819a0e8a8d53f583e6f9e57f2747524682baf7a26e3bd905295f482b8e15856413ffc52d28bbfaad7a39b04bbda6475161c18f9f9e88d5db35dfae78137635e7a4c4e5735d7b221618ae968a7068a40155fc25e369fefdc5174cc79a2392ca45bb578826b9650e219123c9a9635d3810bcbc6318f96f295a79117710f83264419f0f1b7f7880719d6c75ecba5bb181636a4f1ad39f2e82e7b97c243a7eb9ae2165d74527685ebd289183084738201d60629bce4bf2c92f44806312ded8eca338551866e8e2ee859d161cb0b646af48c8f03c276cc9002b565f5325d775ad99b09c566a"}], 0x2280}}, {{&(0x7f0000005ec0)=@hci={0x1f, 0x2, 0x1}, 0x80, &(0x7f0000006200)=[{&(0x7f0000005f40)="999a1f0c972a4bd355aea248a337263439efec4eea1f5ba6cea98ff837622228be9f8a7e7e8c6eee784470fb0cc388c8409aecbae4001d6626c46c156a40ad9565686974d14de36b650836cb655321a181a6183b40933099ccddba144f687d941a0d639e0d25d2881fb71c91b6938592707abd55e8fd2be4d71e35a376272dc5", 0x80}, {&(0x7f0000005fc0)="cedf3a37a0fad3f2805327030860e71b136371dd042c305b71213d23efe3f913e6a5db09eb4c57bde743e4d32b842b2680285646653b3dd4a6a93630de9c171298090ff85d743dbeea12c39fb680de04a27e4618ece24a4fc0157708b5b146010e5a06db7f0db9de32ac5f1d0b6d5bde25b13690f247923b2cb09da805cc00f8d002c5452243435efb6278bb3bf875d775282cdd2ba7f2c02e343dac787909f47c2fc96a60fc87", 0xa7}, {&(0x7f0000006080)="8d063c5ddf078e171b9b6838c3138049ac8e143f3d684fa9ed8f66f4445f1f96044e3722b95dec5bcb326293ac5b7c4e204bc310bd7f1e64a0dc5c27e2621e284f2eabbcd608101847d61d45c5fe6df377222431f84f998bc8aba4f74d531d483b0da122820fbee68ed0c1116278f4d5", 0x70}, {&(0x7f0000006100)="715ee4e02baf397827befba02c78c64aa848073478c8a4b34eaa90cda4ff48ec24f45580fa3acd575d6da21546b952b0571c88af057efbb3b925bf225561de7255af60eb5bfa6b526a9cf87125ecbc2f1d0f042a9fde0f23b72ed73f94482d69fe378b23a615496fcb34367381c80490e8bb8696e71e75fb68f38c26eb9f9f2704f9a12dd47c52b5a1548c70ca8aa764ea3358d1615c10d69f77dfb9220180358d75db160344df0c9dad416e84c0bf2fa71bd4a53fe068266233142d143c85e8d241c6f517a69e881135f5ffb3745484b2fc0c6a3dc047ab05b7da9a804b78ec4a4654869d8735", 0xe7}], 0x4, &(0x7f0000006240)=[{0xb8, 0x10d, 0x1f, "2ed1686463bd5df6d1720a8bf7e10cc9fa35ca472dde48f7f1ce8d8a9a25745b480555e2d34b09aa0ce0570be7155a4b51c46a6b3c46602992b866e24a3e7e261ea5759311183d737f599cfeeb68ea3c1ff687aca61249596a3e5a70c3c35d39fe9783c50d1aaf49dba02931f6a905a9c95c7b75151a246873b29524b7b37aec7a85ad9fdae0aab2a7a1a7fb548fa5df7cea3927dd9eea8a552006099c1f74ed6835fff115a1e8d3"}, {0x1010, 0x10e, 0x2, "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"}, {0x48, 0x0, 0x8001, "d88d2a1455b31f6d67a63b0b51c1739205ef6b243f41c90cee18d8c96216b9303d933dfc3c8cf1d41ad0df5bfe94dba32cc062a93196cf"}, {0x28, 0x104, 0x7f, "4e3a9a0b2bf40393c37f0228f7252c4f4e821fa37b104735"}, {0x48, 0x6, 0xe2, "8de68cc65ea85dd158e60df4753d4677ea8835263c286921788e82305c21a1cb3bd1913f7b4cd0dfc2437797d2ab9699ccaecb5b29f5"}, {0x110, 0x1, 0xffffffff, "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"}, {0x58, 0x115, 0x1ff, "e917f7ed06f59542cab4d25349437b573de361aead909410f2953260be1f0d75ea91089fec07d18229a9e5131b6b167c2f55f979f87e42603f45674181fc735c0811"}], 0x12e8}}, {{&(0x7f0000007540)=@hci, 0x80, &(0x7f00000077c0)=[{&(0x7f00000075c0)="136d2a890bdd578ca42f0ea070680207b7e1e41eb371ba68caf50d", 0x1b}, {&(0x7f0000007600)="59d34e53ae7daaeabdba352e5cde612885ffb7303e943f25b855f8b1bd911011084c377d53c1c984098742cbc96a264dbef2dcf98c07553d4804627b29842782cdc3e7aa9d1599a9fd861cfe9ec02a32f735b6362b1a605317a6a44d68849061709595ad7293cc2293131f2cf0939d3689c0b76402cce8b4cec4c9b47f1fc4315dbcd85d517cfd564f1a774057165ac7f7c3baf6b2f805c58c15e62566ef4d85d393bcf3ea28862a3a5638f195845a4c36e3b7d1385cb7aaef414f6a978b5c43717d474ccffa89a8579202e928c6eec528c4da6b5624a76bb768ec1c11370696b259068769a82ddd7f113b11c5735c7fa1feb8b5", 0xf4}, {&(0x7f0000007700)="e7535745f2ac61cfc0c039f5f9ed744306e5efe4164082f7f418d3706c30c146ced79c0abf5557ecb5eb4e06ad50374e6cbb84c26039f87e869512ce43d9a118c9d6cb32e1ebf7592e1052276baa7b475350f00bc41a01cae2e5923533752734ec200eebb028a867526c8ac9c57782a9e320d21a65dae6a8488b7727cd4ec937169b0af9b540d30856501291db2608", 0x8f}], 0x3, &(0x7f0000007800)=[{0x18, 0x116, 0x9, "2b836873940728"}, {0xd0, 0x29, 0x3, "9dd5d2182bde42dfc4f444123b2507bbe4698fd9e7bc1535bfa10020a72b2384d5b31c4b5b5687d4229cf416880b4fc0212e2476d04968faa074ac6b4ae4251c74be4e5ac2b2aad63409250d8c489bd13c3cfb7720fb6979f426210a10360eab4a93cb4e0660cd2f84b501bcc791bb1fa3d2885f72fc6c136c3afbef735a34afb19703c8ca4bf813d1380be4b3c00c4fcb1eaf87209fb456063d307aa2a980f8cde57e70557afa41815c605c36c7330b895eec01bc1ae6188d73f524b534"}, {0x68, 0x0, 0x0, "3d478f89d0ec5123bb085ab7a762381984d8f6ebf7b194c2f47b8e184d419eded6c31f6621c7482d0c1de37c4685634fb0c21ee41652a5c4a5a5411d12711b242618b6ccaf17ac5d9ab8d9fe28e9bfd02baa645456"}, {0x100, 0x0, 0x6, "07e906c85dd88ae15e8f2651be68ea0f250b07f4e7ce51d26068a03d1e8573904889bf11fb3ca32e04dbd8157984db70a8d810c5828ff9a1493b86f9c26635ce59ecfefd4e7358edc7084707013dbb9055cb64bbe1f972390ede8b192c7adff174e595d95a0024b44dc68ad45902ba31b6680a4ad7cfbe3eba4776f7f9fb2e985bb07ac962bdd2785b5ee1645dccd2c89b6da7a2511d20952bc12180cd65d1f1a130279a84680ef725a116a5f8eee98eb115939e7b3ebc3a57d00b40a92363e6fb79bed075728dc46306ce1ca7e1230dd0c0c1ba799531196f98b6982ad096766f14cac3e9c6fbe4daf71bcc75"}, {0x38, 0x103, 0x47c, "123a83e149bbd93506900d9ce12ccf9d214386c6272de7bc29d9d1b3299d723ab52f8e"}], 0x288}}], 0x6, 0x4000004) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), 0x20000e, &(0x7f0000000340)=ANY=[@ANYBLOB="6d6f64653d30c634303030303030303030303030303030303030303031312c7365636c6162656c2c7569186f69606c3fb90074a176439d1fc85e4a3d3a772792f4269006a29634f4cdb9d2c72e65cf59e6852c76eea59bbd5aa7f8cbce7b40437bc6e1fc47c9ab8356470c75c2fe32aa1382f6ca40d3a4f3cf3eea84703db08d17c716fd5cd0c2eeaaada1571bbad4caa53ac297baf5e7bf8ec0ce4903f6b710198df2579965f4ca4cd51ca6c34c948994b096", @ANYRESDEC=0x0, @ANYBLOB=',dont_hash,dont_appraise,mask=MAY_EXEC,obj_user=-\'&&,fsmagic=0x0000000000000000,\x00']) r1 = getegid() mount$tmpfs(0x0, &(0x7f0000007c40)='./file0\x00', &(0x7f0000007c80), 0x0, &(0x7f0000007cc0)={[{@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0xc70}}, {@huge_always}], [{@smackfshat={'smackfshat', 0x3d, ']&:+{(&#'}}, {@smackfsdef}, {@smackfsfloor={'smackfsfloor', 0x3d, '[+.{:+\\'}}, {@euid_lt={'euid<', 0xee01}}, {@permit_directio}, {@measure}, {@subj_user={'subj_user', 0x3d, '\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc'}}]}) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x308a4a0, &(0x7f0000000140)=ANY=[]) [ 173.819949][T17096] loop5: detected capacity change from 0 to 512 [ 173.845643][T17096] FAULT_INJECTION: forcing a failure. [ 173.845643][T17096] name failslab, interval 1, probability 0, space 0, times 0 [ 173.858303][T17096] CPU: 0 PID: 17096 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 173.868493][T17096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.878699][T17096] Call Trace: [ 173.882013][T17096] [ 173.884937][T17096] dump_stack_lvl+0xd6/0x122 [ 173.889555][T17096] dump_stack+0x11/0x1b [ 173.893791][T17096] should_fail+0x23c/0x250 [ 173.898236][T17096] ? __list_lru_init+0x352/0x6d0 [ 173.903173][T17096] __should_failslab+0x81/0x90 [ 173.908124][T17096] should_failslab+0x5/0x20 [ 173.912688][T17096] kmem_cache_alloc_trace+0x52/0x350 [ 173.918011][T17096] ? __list_lru_init+0x352/0x6d0 [ 173.922958][T17096] __list_lru_init+0x352/0x6d0 [ 173.927728][T17096] alloc_super+0x490/0x520 [ 173.932185][T17096] ? mount_bdev+0x290/0x290 [ 173.936688][T17096] sget+0x189/0x370 [ 173.940494][T17096] ? test_bdev_super+0x30/0x30 [ 173.945257][T17096] mount_bdev+0xd3/0x290 [ 173.949598][T17096] ? ext4_mount+0x40/0x40 [ 173.953937][T17096] ? ext4_errno_to_code+0x110/0x110 [ 173.959134][T17096] ext4_mount+0x2d/0x40 [ 173.963290][T17096] legacy_get_tree+0x70/0xc0 [ 173.967884][T17096] vfs_get_tree+0x4a/0x1a0 [ 173.972313][T17096] path_mount+0x11cf/0x1c40 [ 173.976886][T17096] ? kmem_cache_free+0x65/0x110 [ 173.981739][T17096] __se_sys_mount+0x24b/0x2f0 [ 173.986471][T17096] ? __this_cpu_preempt_check+0x18/0x20 [ 173.992045][T17096] __x64_sys_mount+0x63/0x70 [ 173.996691][T17096] do_syscall_64+0x44/0xd0 [ 174.001182][T17096] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 174.007097][T17096] RIP: 0033:0x7fef4d1a102a 22:17:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f652e0d0000676ea58689a300"]) [ 174.011594][T17096] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 174.031338][T17096] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 174.039757][T17096] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 174.047728][T17096] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 174.055696][T17096] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 22:17:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0a0000676ea58689a300"]) [ 174.063696][T17096] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 174.071669][T17096] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 174.078677][T17089] FAT-fs (loop1): Unrecognized mount option "000000000000000')ù‘ŠE000000" or missing value [ 174.079644][T17096] [ 174.102710][T17112] bpf: Bad value for 'mode' 22:17:17 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0x22}}) 22:17:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a220000676ea58689a300"]) [ 174.123959][T17112] tmpfs: Unsupported parameter 'huge' 22:17:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="02"]) [ 174.153230][T17112] bpf: Bad value for 'mode' 22:17:17 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a2c0000676ea58689a300"]) 22:17:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000140)=@sr0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='nfs4\x00', 0x2000000, &(0x7f0000000200)='(\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:17 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c"]) poll(0x0, 0x0, 0x1ff) 22:17:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 75) 22:17:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB]) truncate(&(0x7f0000000140)='./file0\x00', 0x9) 22:17:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a2e0000676ea58689a300"]) [ 174.663591][T17141] loop5: detected capacity change from 0 to 512 [ 174.684867][T17141] FAULT_INJECTION: forcing a failure. [ 174.684867][T17141] name failslab, interval 1, probability 0, space 0, times 0 [ 174.697746][T17141] CPU: 1 PID: 17141 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 174.708005][T17141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.718054][T17141] Call Trace: [ 174.721368][T17141] [ 174.724299][T17141] dump_stack_lvl+0xd6/0x122 [ 174.728995][T17141] dump_stack+0x11/0x1b [ 174.730244][T17145] FAT-fs (loop1): Unrecognized mount option "000000000000000')ù‘ŠE000000" or missing value [ 174.733176][T17141] should_fail+0x23c/0x250 [ 174.733197][T17141] ? __list_lru_init+0x352/0x6d0 [ 174.733216][T17141] __should_failslab+0x81/0x90 [ 174.757612][T17141] should_failslab+0x5/0x20 [ 174.762206][T17141] kmem_cache_alloc_trace+0x52/0x350 [ 174.767499][T17141] ? __list_lru_init+0x352/0x6d0 [ 174.772434][T17141] __list_lru_init+0x352/0x6d0 [ 174.777194][T17141] alloc_super+0x490/0x520 [ 174.781634][T17141] ? mount_bdev+0x290/0x290 [ 174.786135][T17141] sget+0x189/0x370 [ 174.789958][T17141] ? test_bdev_super+0x30/0x30 [ 174.794735][T17141] mount_bdev+0xd3/0x290 [ 174.799033][T17141] ? ext4_mount+0x40/0x40 [ 174.803402][T17141] ? ext4_errno_to_code+0x110/0x110 [ 174.808618][T17141] ext4_mount+0x2d/0x40 [ 174.812798][T17141] legacy_get_tree+0x70/0xc0 [ 174.817477][T17141] vfs_get_tree+0x4a/0x1a0 [ 174.821920][T17141] path_mount+0x11cf/0x1c40 [ 174.826415][T17141] ? kmem_cache_free+0x65/0x110 [ 174.831323][T17141] __se_sys_mount+0x24b/0x2f0 [ 174.836060][T17141] __x64_sys_mount+0x63/0x70 [ 174.840638][T17141] do_syscall_64+0x44/0xd0 [ 174.845057][T17141] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 174.850976][T17141] RIP: 0033:0x7fef4d1a102a [ 174.855498][T17141] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 174.875202][T17141] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 174.883739][T17141] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 174.891717][T17141] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 174.899774][T17141] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 22:17:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) statfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/145) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0200676ea58689a300"]) [ 174.907776][T17141] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 174.915838][T17141] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 174.924042][T17141] 22:17:17 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 76) 22:17:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) rmdir(&(0x7f0000000140)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0300676ea58689a300"]) 22:17:17 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c"]) poll(0x0, 0x0, 0x1ff) 22:17:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0400676ea58689a300"]) [ 175.025049][T17264] loop5: detected capacity change from 0 to 512 [ 175.086810][T17264] FAULT_INJECTION: forcing a failure. [ 175.086810][T17264] name failslab, interval 1, probability 0, space 0, times 0 [ 175.099500][T17264] CPU: 0 PID: 17264 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 175.109649][T17264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.119707][T17264] Call Trace: [ 175.122976][T17264] [ 175.125970][T17264] dump_stack_lvl+0xd6/0x122 [ 175.130561][T17264] dump_stack+0x11/0x1b [ 175.134821][T17264] should_fail+0x23c/0x250 [ 175.139453][T17264] ? __list_lru_init+0x352/0x6d0 [ 175.144411][T17264] __should_failslab+0x81/0x90 [ 175.149177][T17264] should_failslab+0x5/0x20 [ 175.153765][T17264] kmem_cache_alloc_trace+0x52/0x350 [ 175.159054][T17264] ? __list_lru_init+0x352/0x6d0 [ 175.164077][T17264] __list_lru_init+0x352/0x6d0 [ 175.168847][T17264] alloc_super+0x490/0x520 [ 175.173312][T17264] ? mount_bdev+0x290/0x290 [ 175.177820][T17264] sget+0x189/0x370 [ 175.181627][T17264] ? test_bdev_super+0x30/0x30 [ 175.186386][T17264] mount_bdev+0xd3/0x290 [ 175.190633][T17264] ? ext4_mount+0x40/0x40 [ 175.194964][T17264] ? ext4_errno_to_code+0x110/0x110 [ 175.200191][T17264] ext4_mount+0x2d/0x40 [ 175.204349][T17264] legacy_get_tree+0x70/0xc0 [ 175.208967][T17264] vfs_get_tree+0x4a/0x1a0 [ 175.213391][T17264] path_mount+0x11cf/0x1c40 [ 175.217957][T17264] ? kmem_cache_free+0x65/0x110 [ 175.222811][T17264] __se_sys_mount+0x24b/0x2f0 [ 175.227476][T17264] ? __this_cpu_preempt_check+0x18/0x20 [ 175.233012][T17264] __x64_sys_mount+0x63/0x70 [ 175.237600][T17264] do_syscall_64+0x44/0xd0 [ 175.242008][T17264] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 175.247892][T17264] RIP: 0033:0x7fef4d1a102a [ 175.252296][T17264] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 175.271967][T17264] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 22:17:18 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c"]) poll(0x0, 0x0, 0x1ff) 22:17:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="98"]) 22:17:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0500676ea58689a300"]) 22:17:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 77) [ 175.280420][T17264] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 175.288385][T17264] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 175.296390][T17264] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 175.304619][T17264] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 175.312859][T17264] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 175.320815][T17264] 22:17:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0600676ea58689a300"]) 22:17:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) chroot(&(0x7f0000000140)='./file0\x00') [ 175.379475][T17275] FAT-fs (loop1): Unrecognized mount option "000000000000000')ù‘ŠE000000" or missing value [ 175.392517][T17288] loop5: detected capacity change from 0 to 512 [ 175.402720][T17288] FAULT_INJECTION: forcing a failure. [ 175.402720][T17288] name failslab, interval 1, probability 0, space 0, times 0 [ 175.415568][T17288] CPU: 1 PID: 17288 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 175.425716][T17288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.435966][T17288] Call Trace: [ 175.439254][T17288] [ 175.442198][T17288] dump_stack_lvl+0xd6/0x122 [ 175.446896][T17288] dump_stack+0x11/0x1b [ 175.451055][T17288] should_fail+0x23c/0x250 [ 175.455659][T17288] ? __list_lru_init+0x352/0x6d0 [ 175.460615][T17288] __should_failslab+0x81/0x90 [ 175.465454][T17288] should_failslab+0x5/0x20 [ 175.470027][T17288] kmem_cache_alloc_trace+0x52/0x350 [ 175.475601][T17288] ? __list_lru_init+0x352/0x6d0 [ 175.480543][T17288] __list_lru_init+0x352/0x6d0 [ 175.485335][T17288] alloc_super+0x490/0x520 [ 175.489755][T17288] ? mount_bdev+0x290/0x290 [ 175.494276][T17288] sget+0x189/0x370 [ 175.498080][T17288] ? test_bdev_super+0x30/0x30 [ 175.502874][T17288] mount_bdev+0xd3/0x290 [ 175.507204][T17288] ? ext4_mount+0x40/0x40 [ 175.511546][T17288] ? ext4_errno_to_code+0x110/0x110 [ 175.516891][T17288] ext4_mount+0x2d/0x40 [ 175.521099][T17288] legacy_get_tree+0x70/0xc0 [ 175.525786][T17288] vfs_get_tree+0x4a/0x1a0 [ 175.530230][T17288] path_mount+0x11cf/0x1c40 [ 175.534746][T17288] ? kmem_cache_free+0x65/0x110 [ 175.539646][T17288] __se_sys_mount+0x24b/0x2f0 [ 175.544429][T17288] __x64_sys_mount+0x63/0x70 [ 175.549023][T17288] do_syscall_64+0x44/0xd0 [ 175.553440][T17288] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 175.559373][T17288] RIP: 0033:0x7fef4d1a102a [ 175.563784][T17288] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 175.583503][T17288] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 175.591923][T17288] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 175.599901][T17288] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 175.607880][T17288] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 175.615859][T17288] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 175.623834][T17288] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 175.631805][T17288] [ 175.635812][T17295] EXT4-fs: 69 callbacks suppressed [ 175.635846][T17295] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 175.670928][T17296] EXT4-fs (sda1): Unrecognized mount option "d" or missing value [ 175.693639][T17397] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value 22:17:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x308ac28, &(0x7f0000000140)=ANY=[@ANYRESOCT=0x0]) 22:17:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 78) 22:17:18 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0700676ea58689a300"]) 22:17:18 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x2}}, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x116) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r3, 0x5f00f000) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000080)={@mcast1, @empty, @empty, 0x1, 0x2, 0x40, 0x200, 0x100000000, 0x81000010}) [ 175.897369][T17405] EXT4-fs (sda1): Unrecognized mount option "00000000000000000000000" or missing value [ 175.897753][T17409] loop5: detected capacity change from 0 to 512 [ 175.949923][T17409] FAULT_INJECTION: forcing a failure. [ 175.949923][T17409] name failslab, interval 1, probability 0, space 0, times 0 [ 175.954781][T17410] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 175.962606][T17409] CPU: 1 PID: 17409 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 175.981297][T17409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.991400][T17409] Call Trace: [ 175.994712][T17409] [ 175.997723][T17409] dump_stack_lvl+0xd6/0x122 [ 176.002323][T17409] dump_stack+0x11/0x1b [ 176.006513][T17409] should_fail+0x23c/0x250 [ 176.010933][T17409] ? __list_lru_init+0x352/0x6d0 [ 176.015873][T17409] __should_failslab+0x81/0x90 [ 176.020883][T17409] should_failslab+0x5/0x20 [ 176.025474][T17409] kmem_cache_alloc_trace+0x52/0x350 [ 176.030761][T17409] ? __list_lru_init+0x352/0x6d0 [ 176.035715][T17409] __list_lru_init+0x352/0x6d0 [ 176.040495][T17409] alloc_super+0x490/0x520 [ 176.044981][T17409] ? mount_bdev+0x290/0x290 22:17:18 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 176.049489][T17409] sget+0x189/0x370 [ 176.053305][T17409] ? test_bdev_super+0x30/0x30 [ 176.058213][T17409] mount_bdev+0xd3/0x290 [ 176.062573][T17409] ? ext4_mount+0x40/0x40 [ 176.066900][T17409] ? ext4_errno_to_code+0x110/0x110 [ 176.072177][T17409] ext4_mount+0x2d/0x40 [ 176.076335][T17409] legacy_get_tree+0x70/0xc0 [ 176.081012][T17409] vfs_get_tree+0x4a/0x1a0 [ 176.085505][T17409] path_mount+0x11cf/0x1c40 [ 176.090007][T17409] ? kmem_cache_free+0x65/0x110 [ 176.094931][T17409] __se_sys_mount+0x24b/0x2f0 [ 176.099649][T17409] ? __this_cpu_preempt_check+0x18/0x20 [ 176.105266][T17409] __x64_sys_mount+0x63/0x70 [ 176.109853][T17409] do_syscall_64+0x44/0xd0 [ 176.114278][T17409] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 176.120183][T17409] RIP: 0033:0x7fef4d1a102a [ 176.124593][T17409] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 176.144324][T17409] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 176.152743][T17409] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 176.160710][T17409] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 176.168682][T17409] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 176.176736][T17409] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 176.184784][T17409] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 176.192932][T17409] 22:17:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 79) 22:17:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 176.203264][T17518] EXT4-fs (sda1): Unrecognized mount option "00000000000000000000000" or missing value [ 176.226694][T17520] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value 22:17:19 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0800676ea58689a300"]) 22:17:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000140)=ANY=[@ANYBLOB="64551747f390dc65916ee81e4cb4f38ef762ba28292fb6aaadb062f26f9d910fbe9a699eacc4be9e96251dc99fb2151be2b9d3686f9526c0307f6de0d20bafb4933b3b6bf7b96efbef7a571d2ee2832325a7c805a1d1e064a129c7f6629d50ece0174d44c71069bf26ed45cc15dcfe82a263158394aaef67d41bb3d435c6c56456262bb26c"]) [ 176.289379][T17523] EXT4-fs (sda1): Unrecognized mount option "d" or missing value 22:17:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0900676ea58689a300"]) 22:17:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2009030, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xfc, 0x1, 0x2, 0x201, 0x0, 0x0, {0x3, 0x0, 0x3}, [@CTA_EXPECT_MASK={0x74, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x14, 0x4, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @mcast2}}}]}, @CTA_EXPECT_MASK={0x5c, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private=0xa010100}, {0x8, 0x2, @multicast1}}}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x80}, 0x20040000) getsockopt$inet6_buf(r0, 0x29, 0x3d, &(0x7f00000011c0)=""/4088, &(0x7f0000001180)=0xff8) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000140)=ANY=[@ANYRESDEC=r0]) [ 176.332773][T17528] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 176.349190][T17531] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value 22:17:19 executing program 2: syz_emit_ethernet(0x42, &(0x7f0000000280)={@remote, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @void, {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x9, @remote, @local, @remote, @private0}}}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bind(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0a00676ea58689a300"]) 22:17:19 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 176.411083][T17570] loop5: detected capacity change from 0 to 512 [ 176.450163][T17570] FAULT_INJECTION: forcing a failure. [ 176.450163][T17570] name failslab, interval 1, probability 0, space 0, times 0 [ 176.462822][T17570] CPU: 1 PID: 17570 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 176.472980][T17570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.483027][T17570] Call Trace: [ 176.486296][T17570] [ 176.489245][T17570] dump_stack_lvl+0xd6/0x122 [ 176.493854][T17570] dump_stack+0x11/0x1b [ 176.498015][T17570] should_fail+0x23c/0x250 [ 176.502438][T17570] ? __list_lru_init+0x70/0x6d0 [ 176.507364][T17570] __should_failslab+0x81/0x90 [ 176.512128][T17570] should_failslab+0x5/0x20 [ 176.516638][T17570] __kmalloc+0x6f/0x370 [ 176.520793][T17570] ? __list_lru_init+0x352/0x6d0 [ 176.525726][T17570] __list_lru_init+0x70/0x6d0 [ 176.530430][T17570] alloc_super+0x4bf/0x520 [ 176.534852][T17570] ? mount_bdev+0x290/0x290 [ 176.539364][T17570] sget+0x189/0x370 [ 176.543178][T17570] ? test_bdev_super+0x30/0x30 [ 176.547996][T17570] mount_bdev+0xd3/0x290 [ 176.552636][T17570] ? ext4_mount+0x40/0x40 [ 176.557088][T17570] ? ext4_errno_to_code+0x110/0x110 [ 176.562384][T17570] ext4_mount+0x2d/0x40 [ 176.566614][T17570] legacy_get_tree+0x70/0xc0 [ 176.571439][T17570] vfs_get_tree+0x4a/0x1a0 [ 176.575853][T17570] path_mount+0x11cf/0x1c40 [ 176.580411][T17570] ? kmem_cache_free+0x65/0x110 [ 176.585266][T17570] __se_sys_mount+0x24b/0x2f0 [ 176.589936][T17570] __x64_sys_mount+0x63/0x70 [ 176.594522][T17570] do_syscall_64+0x44/0xd0 [ 176.598980][T17570] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 176.604954][T17570] RIP: 0033:0x7fef4d1a102a [ 176.609362][T17570] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 176.629134][T17570] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 176.637648][T17570] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 176.645616][T17570] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 176.653662][T17570] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 176.661631][T17570] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 176.669595][T17570] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 176.677564][T17570] [ 176.704225][T17645] FAT-fs (loop1): Unrecognized mount option "000000000000000')ù‘ŠE000000" or missing value 22:17:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000140)=ANY=[@ANYBLOB="f70d5bcd195ab3a8daa27e8b2b42540c1a7271c1cc3693b97bfad0aed454694dc4913abc423fb2fea7b4141ecdcb86e213bb4f5848e8299cb3d9be8f8aba47b75ecb484aca4ba81decbe85e94ddb187a9e7122d06270e9147d99a8b0d0ec3a9ed96f71774874c2ac60e722d13f6f54529b0f3641b6ffdeb68e4a0b43b8cc20d0fa7d833eb356fbe8e0"]) 22:17:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0b00676ea58689a300"]) 22:17:19 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 80) 22:17:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0c00676ea58689a300"]) 22:17:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) chroot(&(0x7f00000001c0)='./file1/file0\x00') setxattr$security_ima(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180), &(0x7f0000000200)=@v1={0x2, "40cae6ef33b43e"}, 0x8, 0x3) [ 176.784825][T17662] loop5: detected capacity change from 0 to 512 [ 176.803514][T17662] FAULT_INJECTION: forcing a failure. [ 176.803514][T17662] name failslab, interval 1, probability 0, space 0, times 0 [ 176.816350][T17662] CPU: 0 PID: 17662 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 176.826532][T17662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.836631][T17662] Call Trace: [ 176.839898][T17662] [ 176.842821][T17662] dump_stack_lvl+0xd6/0x122 [ 176.847431][T17662] dump_stack+0x11/0x1b [ 176.851599][T17662] should_fail+0x23c/0x250 [ 176.856013][T17662] __should_failslab+0x81/0x90 [ 176.860825][T17662] should_failslab+0x5/0x20 [ 176.865414][T17662] kmem_cache_alloc_node_trace+0x61/0x310 [ 176.871226][T17662] ? should_fail+0xd6/0x250 [ 176.875815][T17662] ? __kmalloc_node+0x30/0x40 [ 176.880520][T17662] __kmalloc_node+0x30/0x40 [ 176.885078][T17662] kvmalloc_node+0x81/0x110 [ 176.889614][T17662] __list_lru_init+0x2f7/0x6d0 [ 176.894406][T17662] alloc_super+0x4bf/0x520 [ 176.898816][T17662] ? mount_bdev+0x290/0x290 [ 176.903364][T17662] sget+0x189/0x370 [ 176.907361][T17662] ? test_bdev_super+0x30/0x30 [ 176.912124][T17662] mount_bdev+0xd3/0x290 [ 176.916362][T17662] ? ext4_mount+0x40/0x40 [ 176.920699][T17662] ? ext4_errno_to_code+0x110/0x110 [ 176.925907][T17662] ext4_mount+0x2d/0x40 [ 176.930141][T17662] legacy_get_tree+0x70/0xc0 [ 176.934729][T17662] vfs_get_tree+0x4a/0x1a0 [ 176.939158][T17662] path_mount+0x11cf/0x1c40 [ 176.943680][T17662] ? kmem_cache_free+0x65/0x110 [ 176.948565][T17662] __se_sys_mount+0x24b/0x2f0 [ 176.953251][T17662] __x64_sys_mount+0x63/0x70 [ 176.957876][T17662] do_syscall_64+0x44/0xd0 [ 176.962353][T17662] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 176.968334][T17662] RIP: 0033:0x7fef4d1a102a [ 176.972749][T17662] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 176.992357][T17662] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 177.000779][T17662] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 177.008838][T17662] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 177.016863][T17662] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 177.024851][T17662] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 22:17:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0d00676ea58689a300"]) 22:17:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @local}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000002c0)="66465792b173b78d9cfdd635581fa9e408d67ca3f0afb6e32bfac6275225eed5ada1d457df057d149697cbddb042f529a628e767a6892e833782a4e9c11a37c84afc4e7f6c18b672f7783b11a2b7f1f7b6c432f3de58de7416a5ba0999ede4f2fa9332234d481844f2f738da83a6e6c7110689cbdbe691a4bb0e7a55c4eeda93b27139a526335f031ba925ce75f41412de4257ecf38c157703507bba6b9c7f48499cd1b1af570d671396b17fbe", 0xad}, {&(0x7f0000000380)="e31b19ef9422d74ebf6a77c76f9dcd5990049e7cc3fdaab6952883d3f8fe76631a0f671cbb7eca4a9a7942f4d9fc91c127ad966c8f33f20b48aa8113661ad0e0363ba443f7f6652b7e8119374a06e48dd04dfe3e186f478b4b3ab30e679038597ad8382cfd6c9523a749f6ea4a56fb309cea715510bd39243cc534cce12a321e21922bd20a3819e99acb8d04a2f00cdc19dadc268af55fe4391c301440b0f2f36595f6626bb16ae9fd84b36efc02d77a98413943389fb376ca55e4635ec6eab5db17d55d32f06768", 0xc8}], 0x2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x148}, 0x800) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount(&(0x7f0000000200)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='ceph\x00', 0x808c81, &(0x7f00000001c0)='.-:\x00') syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x18ca020, &(0x7f0000000140)=ANY=[]) 22:17:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0e00676ea58689a300"]) [ 177.032829][T17662] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 177.040885][T17662] 22:17:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 81) 22:17:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d1000676ea58689a300"]) 22:17:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d1100676ea58689a300"]) 22:17:20 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000003080)=ANY=[@ANYBLOB="010000000100000018000000869e03ccd995e556c7ed6d7e779f654fbc1e206228758d1a1db9003e5b5d484655027bd42b4c29a502cc887d987bcea835f14332330eb821cf96f66f2a00224e279e5abca551f18ded004d8bb8c80a5a153a9f915ded1e98121b9ad4b3e13d7b57c984ead74c6e367ad597705aa74ff958115fe587170d81d35239fa6e19d73125f6889747b854b34c325694ee16d9abf93013db283abb0a4bbbe1a434d25df7fa2d5a99e1f08d3d010d9b256a1405daecc7e3a0d46e54531053dad8b037a177520db5eeaced2e2515db48afeff980ccf7edaf4b5973cd77d8670eb88b4a93", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="00000000e91f7189591e9233614b00"]) bind$unix(r1, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x116) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r3, 0x5f00f000) connect$unix(r3, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e20}, 0x6e) close(r0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r4, 0x5457, &(0x7f0000000080)) r5 = getpgrp(0xffffffffffffffff) recvmmsg$unix(r0, &(0x7f0000006c80)=[{{&(0x7f0000003680), 0x6e, &(0x7f0000004bc0)=[{&(0x7f0000003700)=""/227, 0xe3}, {&(0x7f0000003800)=""/224, 0xe0}, {&(0x7f0000003900)=""/37, 0x25}, {&(0x7f0000003940)=""/13, 0xd}, {&(0x7f0000003980)=""/75, 0x4b}, {&(0x7f0000003a00)=""/200, 0xc8}, {&(0x7f0000003b00)=""/4096, 0x1000}, {&(0x7f0000004b00)=""/130, 0x82}], 0x8}}, {{&(0x7f0000004c40), 0x6e, &(0x7f0000004e80)=[{&(0x7f0000004cc0)=""/17, 0x11}, {&(0x7f0000004d00)=""/77, 0x4d}, {&(0x7f0000004d80)=""/141, 0x8d}, {&(0x7f0000004e40)=""/64, 0x40}], 0x4, &(0x7f0000004ec0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}}, {{0x0, 0x0, &(0x7f0000005100)=[{&(0x7f0000004f40)=""/98, 0x62}, {&(0x7f0000004fc0)=""/233, 0xe9}, {&(0x7f00000050c0)=""/4, 0x4}], 0x3, &(0x7f0000005140)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}}, {{&(0x7f00000051c0), 0x6e, &(0x7f0000006300)=[{&(0x7f0000005240)=""/159, 0x9f}, {&(0x7f0000005300)=""/4096, 0x1000}], 0x2, &(0x7f0000006340)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{0x0, 0x0, &(0x7f0000006440)=[{&(0x7f0000006380)=""/70, 0x46}, {&(0x7f0000006400)=""/47, 0x2f}], 0x2, &(0x7f0000006480)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x68}}, {{&(0x7f0000006500)=@abs, 0x6e, &(0x7f00000066c0)=[{&(0x7f0000006580)=""/53, 0x35}, {&(0x7f00000065c0)=""/241, 0xf1}], 0x2, &(0x7f0000006700)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000006740)=@abs, 0x6e, &(0x7f0000006c00)=[{&(0x7f00000067c0)=""/67, 0x43}, {&(0x7f0000006840)=""/247, 0xf7}, {&(0x7f0000006940)=""/177, 0xb1}, {&(0x7f0000006a00)=""/65, 0x41}, {&(0x7f0000006a80)=""/24, 0x18}, {&(0x7f0000006ac0)=""/148, 0x94}, {&(0x7f0000006b80)=""/67, 0x43}], 0x7}}], 0x7, 0x40000021, &(0x7f0000006e40)={0x0, 0x3938700}) getgroups(0x9, &(0x7f0000006e80)=[0x0, 0xee01, 0xffffffffffffffff, 0xee00, 0xee00, 0x0, 0x0, 0x0, 0xffffffffffffffff]) sendmmsg$unix(r1, &(0x7f0000006f80)=[{{&(0x7f0000000380)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000400)="344e0de74354fefadb6aa9035e99b5b5044dbc7350bd6a5eac1a16a813c16c4bea21b256697ba98ba46d4c02cd4527a5b2aa8fb27d5d2782a80ab42d89b045c992d4", 0x42}, {&(0x7f0000000480)="6c6c8296c103419466c832a5e9f236b9b607efb5636106dff82f9d2ee4ed0e77870619d8e64cbb471335816ec362eb81ad31036aa41431a4d43998a0b38cd707e38224334a84d2ea4cf58fc7562ce0ce868ec47ee8b39fafe686c20200d593574402b2a4540aaca3eafdd9239e096b3b09960f4442ad6f3f5d92df7f5fe00e508223830670b8bca37f34e7e0d0d4e223e308e96e0a2be288c90096d256fdf30712036096babd560654dca705a63042a98448a14e36807e36e6b847f139f64e1746ff0c3845bdbe53d9b232a7153a4e595db60f673977cf97ba86f248d6fe992d3323b9ab38fa66dd04888efd498bfe58dcdef63f799dcce482", 0xf9}, {&(0x7f00000001c0)="e235e5b14ea6c2f1", 0x8}], 0x3, &(0x7f00000005c0)=[@rights={{0x14, 0x1, 0x1, [r2]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}], 0xb0, 0x840}}, {{&(0x7f0000000680)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000001940)=[{&(0x7f0000000700)="f8c4bb9c81c88bcf806fb584290fb67f5c64cb028ef460d037bd9e5469ca8578f2c76e71c53e6bf21fca1a2446640bc2b3dd6146755ae3bfea20ada707262bf095e006cd61b2402532eac6bbb5a0e603eec5f5cac045f8179348e9fd041e3aedffbde68ea20f75a9445088432a01dfc5879e35698856a62563d65a66c9b65cd589cb9a300fc40b4ed1464715d5143e20d6ba58c86624f247865866f3b2d19ff59980af0eb78bdf2532ae922ae14f222118589731ca7ef7446c6aa2924fff076a3a478ba0d83a04639224f8d60adbe05b2ffac79ad8b22c015366ce60b5efdc0c2274cb49", 0xe4}, {&(0x7f0000000800)="b46d5ed14b89af13fe86cb9f94d6bf8c585bd079bbf02aabb97ec4ba35e7adc7dd6b59b1214d62c62a175e6992fd2b93547a90893459f2b937d713fd04d9456c34cae6d48eff7fa76217dba152b9c8d2d2f44c4aa1f5fa1ff968ddd257d125024c54a856d55c8ba21e03d662ffce62ef9dbd01ba7ad6bc53615dcefff0928b6054823ac9c42051436014540aa24f0fd6d2ab5a2892cb92a4ce1cb0dccf72aa1c6ee4ea6a84a3ebaad7a1951fc717f11d59decc049359785c3832918e07fa4f332324588808d4d156c71fae865a58016267c783e025bc5dfe0a18fc3046cfa787acf03ab4f4ef1077df364abcab96822cc124466c3f01340157099229d1b5908f5a4251a40c594b80a200df8f49b1e360ad969c3bed19589e0a7e6c5c8ed67e403359a8bcdd089a5c2c975bfa455222506be72688d4c684b5108605e8d7296a37530db0318f540f017a22ae4bcfdad1d39256ea81c70772244ee59e59f487e4a32e1ac95c2e8a5aa197ec034b909f250459f3ac8c3e4e47709ae3be73e4c85a32700d7285e48a8d3bafc528d18de5f25b9711208f328ea5ca362882c6cfe1ba01f69dc57e6ff6d75458ab7ef751295669078f919272aacfdb40b8a863817957164f44a587ba333f7c4bfe285b4f4df366c66c0d558c270ebf5685063c286aceaaa7b750c60a269b2385a84d66b99d75cdeb834ba17eaa4ce600abd17bcc70a2d1fd076b5c41543f55d812615b90f5a8d816b2a94456def9401922afee47d59109925b29c71d3d3c79b763169e260ccec2ad9dfc3b0bdd0f05977323fbd27f5686e28fe0fd93afa6e0e50b4d9fc089566c8ab9dc11e77e301b23eeeef71396f38641f027350b771a70aa19853330b4143cfefe94854d583513205ba638323d66026fb2a4cedaa0147188f94c5170105baead0197a6dfd643c412c3c22daad25127267ee6af8eb13608e212c9d57f98b38df642e767746a16d1bc357ed6c8772ba3beafe567eefe4ceede161ba831e469f5d351fe205d7686a0d91afd18eddbad47e80135d276de6b6fd3aa8fa98b3741a05601e0e2919dcb6a4036841cd964b9e4b1d5eecf456955248795cb9892bd8dfcb0c90cfeb5bab077886aa06956df29cbfc6e3ab2182834c060c8a80a464838f8d0153c4e837b3b4691b4945c6ece947ab3e852f02b1b54ef3be230cf9255ac17aa29fc20fec8b1fee977341e555018b1aedc5de86a33ffd21b037e38a9f6f6a11cdd2c154f631525ef17751309aff44796a7ba728de7b562ab7b55eb8a558ed1ea963b79955e5625f88de1237bda47afbc5d3226fbeed8bde7c10f92087ca6e47d1000adb601d684ee806bbe5d633ce1a7bf9f16f1ce0badbdc0810e75ee7b85966a3b24b5356fe7d19d8aff708b16da0246d7e2aaebb1366602eb8afee0364559099168611ba8a19856705f8a4638373d1b804fd968f22316be2ed6462fcdc07343686179144595dc30f94c12ead4dd405651c632f536fc75b0c5f0b64a46f03709c4c7d927e78a456605d17515f3e0b021dc47751f9fc1efdf1a4dfae49b7ffdfe89d09a7702549b0c5dfc3f3527a91f16853e743d1d8a104ad3c414fd282e635821b4c7637419f5cbf1c50e3a0089fd46a44a538bdccd8805b59c1fd771a1e592e3c54f9dec4dd6ce77286be1dc7161cb93ce283c3e3b30452da1add247d168986e1aa52b0afbacd6b82229fc02e7d5a5460b25d171819d73b49b7271a03be03c44ec6e27e12c0864f8b44cdbf1eb383a3916c5caa7f8e01eeffb0fcc3ac3db99edb6b9edb0c4fa2930965c50085dc340b9201a97248bb4612bf0f73dd32e7a2582f4b9ef39af599494f64d72d28c6f59aa565fc50323acf7d82a307cdfa82e3f76af3db995101673c9b3cc64922ff26ddc3aa54497bb35d50f9008b7b549e190036ee44189dff873fcf3b1b3c84c55eccdce3af09b89ea66a5f0bacc32d7732c153bf825b5a6f4b1b429a43ec8249d9e0a3adcfb24d4e19ed6380e4633d19f399428c68fd26e811c62236ab352258938820ee1a38c282f069d0a7e17f9869b5dec9296da3a27b3656482f1c583f5aec681d94da4fd26fe2a0e6219209d1fc402bb956e3bf761981387bd4a66b937e29baed2d3248a8ca85e508309dbaddb8173b3ce741bef9f85c1426ad5577bf6200ebfe8a591ab978509bb38120334866dc4ee7021f01b120b1f208954341f7bee193b74c2c59df76fdba30ae4c8f768f6ab7e608ccfadd4c136f749b54657e1ee0522209aeff0fc1201fdc89403aaeb3983d53d564ee62f11a5349ad741eef26562dfddd7d665a09e264a43227f743c90bd4d47e37f8578bae3b3b8db8eaa722dc4f348302f212b56baa26b73eb2e002e6266e361c4866a3be66f4b4d0127e3f27c800a476550c14e9b6a5c070533502313081d85e3f828358d03dc3fa5c1189c209b61cfb4644b72862a797f1af4e74ecf7a483dc1bdf3f1eff01d9c19a99b65694c0e214b087f674eafa695bc089fcac561fd6fc071605b1f86bc65e54c0fa71541dc0bb2561fe5b363ef3c1d28e38e8f286414af8d576e3e2ce53415ea0a2bb4cf13419371b886bfbb92fbf46f00b73305a99ca4f1a55c688fefe5d6b42fa230c1432a34c78df2b0310715f00a337bdcbbdb0e4ab4ea2542975a189c606e2bf2a3efd47bd99a913d952cd8aa706918e85699cd1186be34331d97b5f50be4963b14ac0ce6a3316f930ee435ba36d8b2a4733001c640379e206e6ecf051a206e0a9d0c28f97fbb3f4a777703024b0973f6ea654bd14449354b8f1c10d052883cf1e1430d216de38edb7ebda9717d3445b25c9486845a59fc26b0ceb7483e92865809564461959f91c728fe64cfea49d4fa91129df3ba899cca71195ae8e291d74cd343a1fce8a167f82905d35e6ce76d93a7d7b745d90a84493554b5c012d7a91068760912d58b827da04505d235af0ce7493e4e38f40acc0d7d06f9b42c519b6606d9ce27319903acec99cb93b236a356fe365e19d44d4f351b075e90e62b413bc5606db9e23af4e17baa5d4d22ce321a62c5e0f08de5bab2c6e960f7265f83535d195e6a08f599d73d0260ad5d0290149ba07cbaba646867dcc42b8c9c25ddd4c40d20f2c252399be802717af153a44348f45b0f29916174e54fb8f1f5b16b53d3c13cb071e370808eb29c850de2468938c5c2939928c64293594b53e4abf838fa8cc4a8b0b1139e9124b9e6496df5ed3c6a1bcaccd086001375008bb3ddc55505d978eeb508250727791f8e3905a5e06a592799241d2f6ad469aa9477090808f4778b1b904b90aec3b56faaa860a62458a537c705c77b739a3d5eaf6d9b1859f66a8a56b85b587bb413c30254f617fc63759940878cb98a68517f18a2594be4320ae8b539b900b2245824877475ba6aa0d910fa11517820c6b0c047574e82022da45851a914a57645c1ded0f8de9289fdf9bd5010645e29c722d814dd00325257c5d44347ad159a6ef1b435bf170299afd258d4dde795d1f6009fd1e81d4548331d6f35aabbcef6a1bdf9295b0d99c2eda1d2c26fa5168e1843a7a869a31d5a3645ab66c508bbd426c813822b964f6b69fc5204e04ed1810c612ad307b77892f964649a860c1bfe7716784c9427d3b0ba51aabc38eb54b523374a711775f68623787a957cb3f8ad277eda28c9bcbb649d7bfce6758d72417d7afdae3c2eb9af7b9c07cd66968fa472fe0d49f94295aa6c935e44e05526ca940ffca5942b43eb40047182e1ef84e28f3cafebff0fedf3bce950c2bfbe033607da18375e1d8522e0a9ebe68694ce1966cb82f6f76436cc407bdc4c5c7521237d3e760b2193449862cb21efea13114ac292b58a4b80563188b6dfa89196e330a2cc829b600152c7fa1d8c3b0ed2c8107b534ec1a01a37a80d140dfd1b656d95e002b52088de60f6db4b0bdbb8097d539078f104aaf9b8b9fbb3ff66ca2d7098995154afa7096a147989ee155719eaba847edb1b27abfbc08654748d2be780004d30086dfdff7ba771f6021b9fa96be267c0bc57545dff2e4ce60b13bd43f58c0673d1bfd3c1f4b6f16224ac97882b03653660471b311cf51a9667d39eec96a2197389c027be979b83e482134d065c4d43b49d35ab390cae44679e96a01059594b3ad126f50818e16b4805e10e506dc6ec7684c0980441dec81870f1ad02076956c57bef9110bd2c36cad295a8b4f0d5374041cb013990a80efb0ba87ba39e7a9b41ab58e49765893b706b196291490788c654f6111a6bf2a10b179d8c87f28fc03c9ba510221c644c6566b611c0dbb257bfd2adfe1b675ef0999c1c4016324576698dce05dd4b107ed0f64714e0c7de894d8614c7a9a31ae6d25ecbfdedeae0bb2350c3396df32fddf68a1e48fade22bd475a647b96c2684844b871c1b63783250f6826fb72b83674f74cd11c79181b551af5fd55232d5eb2446604fb690a3864900a68fe93c415597e30eddfb9eb0eb991bf1ee7fa6f51ec2da1bbffa1bb80848e25b4aba1c02f26bffc1a4999be81d726629ae3b16db65d672e7b6e8091ea40ea24c1ef51b3bc7acfe5d6873ca67967640f743126ba2ac0950fb3eace7e85e533e6d5f64525d0ac7f7eed9800862db64a2cab67d18a22738c322bd765c850e2a1feb214973d4c9b8df19e315ba1595a4332920946ee5de029b2c22b33e458f1cecaf44043b4ca291188872f5160f4d82cf3d84f5b0fd3c65e7987def7116aab0ce9e61519719d37720d6c9dc5fd663409e5f0de71150143eaf3a583b68fbf247267e242dc8d9db45420707b3e09c7fc17141220b42bb3e9735d17fe8c11b16caaca9c07c037a7e7a159be1ee6238fb73fac3213fa544b6ace0c5cd460ba383fc1ffbd1e63a1e147ee4941646a84234041e67912aad00c1632d3ba5e3e25c5f4a9e6365cd8675f188114c6049a84f721a13140f30b46ce53e2a384c31edfbfecf1243633c9c23e0e43a85db9471bc2398269910e02f36a384b151efef159d267877122b380b3f56b796d407b442bb4c6666296b7567506640b7e9ea038c4f71ed533c3a2c7722528b3bf5a761c091c993299cc2dd1ebc2c635ba032acecbfb358384d86fb4e44b443278db1927ff9a30ff02fa01810b12a94f109af49055bea3cfaff613fad66266a9a104665f68e77ef62065fdaa3a7d3650706086ad847f3189e519f06bc4aa83e0ba72f7c66b9bfef2be9146aadb1e79456d57ab09c6dfb20703e59f07293241f4ec5556b283787f99257b54e0cbe92500600af79beeaa33a868e2eccbe144046203f03376597adfe9a63c5a8a361aa37f860f2f0ed2e8872c092fd3b721a04c83cf833eae2d9851ac100c30a21aae6cb0fea7ff74c7a0505f371433ce321a2934655fb7bc7331f9c92255d32136105d9af4dbc00d2f6c9eea2751e86a13f0d64ae206db47b22b5b2d4965ea5df133ba3767aa29f4a2ee5080078f1252a2974244225204b1fb8246622eeca9fad758d7765d4f41e177e13c2fb217913fcda7a09aee42f595eab002d662b83c0258b68c186bcd384ab75ab549eb60a8b175648fbfd7a0b1e6a25cab25623475ff3f8b08fc689869093016a7e8d9d3aab848139187b20b1da970fae897f7e156b5086c1c349a700be671a7ebe67c6857e17e7f3e4670db490063eac147bb8896177fcbb86279027c4428c624aa86aefc92311dbbfd3da5f5539e8a28335e1d2928028b6e59e0a3e4f8e76d5a51692e6fd283629cb5f16312839808e236d94abf04db484dfceec49ddc8267dadf007e2d3a", 0x1000}, {&(0x7f0000001800)="7160f8754505500ecf2b1a5d2f3966d279cfa624ba079e1d80637d2eac9c0076639520f145b6db71b911169206bddae2586221445d846209b884e26c5cf042d144b7d9946d963d479ec6696d074532b31e388e7ab98d0885359a057faf27806a4b73e1e94167518c4e16183294743b994ac3026e7de2d8e030fdd2e95a4a84bd80d882bf68a46116aae2db55b6caf162a222", 0x92}, {&(0x7f00000018c0)="6814ca988e0bdc2c186f15be3900cf74cdf09e0b4c7913925fb5cfaea6f789ce809574a661abf45ac102ac73d471c9e8df26b9e33bcc58d8b0ab632954e9aebc3250912c19fe25535a43805bae37566771660780ccbd0f3abca962fdc0e8ff002dcbb04b18c516a149dfab51ec213af75761", 0x72}], 0x4, &(0x7f0000001980)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [r2, r1, r1, r1, 0xffffffffffffffff, r1, r3]}}], 0x58, 0x20000000}}, {{&(0x7f0000001a00)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000002f40)=[{&(0x7f0000001a80)="191b70d80fca6f2069ec381bd3dbecbf19e08615d2692ea7020c7e788d1a8f8d30ce437f968f8a2b0604c2755390355ba9880efdab6e35ef3befccecf7bf14f37f4ae4da8348baba9bb76421b43bf5bf25808d96b4f39d8676dd852d7a748e7cf14159accc15033f1d28a343c4fcff7af1", 0x71}, {&(0x7f0000001b00)}, {&(0x7f0000001b40)="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", 0x1000}, {&(0x7f0000002b40)="cc389ef18bd3d578fb1527874e35322c897d75a7b9c372b1b5e85bfa1fc4e60fd9090db51734b1222b21f928bd32a8e28c04f9084f9d5d", 0x37}, {&(0x7f0000002b80)="ff58f880db21926021e8a2795b8148f841b9561deaf2ee694da13af5515f093e10e9112a40d38ff38c71486fe4536a23249b7da1f16e6b3f01841e3d388a0d1601b35929a7157f56cb068a5c831389c46ed4b4029934625331d442c93c74883d5e603164a421a5fc59999da007091e5b00ab440902353eaf544a722971375b9bab153ccc6d", 0x85}, {&(0x7f0000002c40)="9f0d024f9294c5db7dc52ebfd7e66490d7ba6e2eee3ea5d9f872a4519a31a8d9a02f376c12516096f710113efe5a80708badfdac1955c01c8aec645c784417ce1da1a91eeec5bb8c273ce2b6332b0dd6fc8e0e683ae86b5c288bcfe0e44949f2035f003cc8a526bf92c291e40a0d915c1b16129580f94ee24aaae40a5b92d86ea775e51a2d32c580b3ac1449d09361ca7aeb84c9c146ab46bf33e91f2a7aa8db5f8f51", 0xa3}, {&(0x7f0000002d00)="d1e31bc7f4065cfc402eed32b2ae3f94512bdd9d487342843cb95832cf7dfddeccbd5da75572a1090b01edf224c08f547ad949ce0845e412d54e967c15c01305429f9774aca3b061ca1dc0c0cce592caedf397993563b388408014ac4801713f8034b8c7c7098646e96bdff6c383d53bdc610b582f7eede4430a654b89baf21c12afe5dfd9c59c55caa7fd4ab1a10c013aa0ea309bf35dbbc1003095b6be25700d", 0xa1}, {&(0x7f0000002dc0)="b95b6b19ad5c5ddf710a18d5740938a879c9ee616323fbdab85736963fef5dccb7fec5743b68468d7c236d982042bbfa1f3745dc5beb8d2b34f523f108ae99ad70b74c0f53d1933fa45c", 0x4a}, {&(0x7f0000002e40)="40d45a8181819dcbffbb05be5942bd5bd3cd0e691c4bb4f81d831952c420d2892dde3a8bdb1535064ee3056663d16bb54a539acff155cf8835c2a7d02caf8263cc1655273193346a2de9906b7f42d74dbb92a0ebf238d37b23efd17267201d435388a99fec773f55578f0930b039fded118f143b26d11ec7410432e9808b7f5582e811f16f1e069cb471695347965f004b35c05ac9b24f3775dfa814c62e7b59711017447ee7425224419beab8aa2a5d3b4b2e399d299b6a154ba3bf27f6810bb9dbd917274b1bbc4c6a602e049fdeb1f2", 0xd1}], 0x9, &(0x7f00000033c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}], 0x98, 0x2404c000}}, {{&(0x7f0000003480)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e, &(0x7f0000003540)=[{&(0x7f0000003500)="45b22fc6dadf63809117591223fb0037eb5d4a2507d72eb2b47377891820610d17626ee3397afeb23cb59d4c", 0x2c}], 0x1, &(0x7f0000006ec0)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x88, 0x4000000}}], 0x4, 0x40) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000006, 0x90, r0, 0x44884000) socket$inet6(0xa, 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[{@mmap}, {@aname={'aname', 0x3d, 'msize'}}, {@noextend}, {@msize={'msize', 0x3d, 0x6e8724f6}}, {@cache_fscache}, {@access_client}]}}) 22:17:20 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 177.274091][T17685] loop5: detected capacity change from 0 to 512 [ 177.295882][ T24] audit: type=1400 audit(1639001840.242:275): avc: denied { execute } for pid=17686 comm="syz-executor.3" path="/dev/ptmx" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ptmx_t tclass=chr_file permissive=1 [ 177.299477][T17685] FAULT_INJECTION: forcing a failure. [ 177.299477][T17685] name failslab, interval 1, probability 0, space 0, times 0 [ 177.331833][T17685] CPU: 0 PID: 17685 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 177.342141][T17685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.352269][T17685] Call Trace: [ 177.355548][T17685] [ 177.358468][T17685] dump_stack_lvl+0xd6/0x122 [ 177.363077][T17685] dump_stack+0x11/0x1b [ 177.367229][T17685] should_fail+0x23c/0x250 [ 177.371641][T17685] __should_failslab+0x81/0x90 [ 177.376410][T17685] should_failslab+0x5/0x20 [ 177.380907][T17685] kmem_cache_alloc_node_trace+0x61/0x310 [ 177.386757][T17685] ? should_fail+0xd6/0x250 [ 177.391257][T17685] ? __kmalloc_node+0x30/0x40 [ 177.395995][T17685] __kmalloc_node+0x30/0x40 [ 177.400550][T17685] kvmalloc_node+0x81/0x110 [ 177.405051][T17685] __list_lru_init+0x2f7/0x6d0 [ 177.409807][T17685] alloc_super+0x4bf/0x520 [ 177.414241][T17685] ? mount_bdev+0x290/0x290 [ 177.418909][T17685] sget+0x189/0x370 [ 177.422815][T17685] ? test_bdev_super+0x30/0x30 [ 177.427605][T17685] mount_bdev+0xd3/0x290 [ 177.431973][T17685] ? ext4_mount+0x40/0x40 [ 177.436295][T17685] ? ext4_errno_to_code+0x110/0x110 [ 177.441493][T17685] ext4_mount+0x2d/0x40 [ 177.445744][T17685] legacy_get_tree+0x70/0xc0 [ 177.450327][T17685] vfs_get_tree+0x4a/0x1a0 [ 177.454776][T17685] path_mount+0x11cf/0x1c40 [ 177.459433][T17685] ? kmem_cache_free+0x65/0x110 [ 177.464280][T17685] __se_sys_mount+0x24b/0x2f0 [ 177.468952][T17685] ? __this_cpu_preempt_check+0x18/0x20 [ 177.474557][T17685] __x64_sys_mount+0x63/0x70 [ 177.479179][T17685] do_syscall_64+0x44/0xd0 [ 177.483588][T17685] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 177.489543][T17685] RIP: 0033:0x7fef4d1a102a [ 177.493950][T17685] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 177.513557][T17685] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 177.521966][T17685] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 177.530009][T17685] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 177.537975][T17685] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 177.546023][T17685] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 177.553993][T17685] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 177.561974][T17685] 22:17:20 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) chdir(&(0x7f0000000140)='./file0\x00') 22:17:20 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d1200676ea58689a300"]) 22:17:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 82) 22:17:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d2200676ea58689a300"]) 22:17:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000140)=ANY=[@ANYBLOB='d']) 22:17:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d2500676ea58689a300"]) [ 177.692606][T17811] loop5: detected capacity change from 0 to 512 [ 177.707764][T17811] FAULT_INJECTION: forcing a failure. [ 177.707764][T17811] name failslab, interval 1, probability 0, space 0, times 0 [ 177.720601][T17811] CPU: 1 PID: 17811 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 177.721878][T17801] FAT-fs (loop1): Unrecognized mount option "000000000000000')ù‘ŠE000000" or missing value [ 177.730828][T17811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.730841][T17811] Call Trace: [ 177.730848][T17811] [ 177.730897][T17811] dump_stack_lvl+0xd6/0x122 [ 177.730925][T17811] dump_stack+0x11/0x1b [ 177.730943][T17811] should_fail+0x23c/0x250 [ 177.730961][T17811] ? __list_lru_init+0x352/0x6d0 [ 177.731004][T17811] __should_failslab+0x81/0x90 [ 177.731027][T17811] should_failslab+0x5/0x20 [ 177.731048][T17811] kmem_cache_alloc_trace+0x52/0x350 [ 177.789991][T17811] ? __list_lru_init+0x352/0x6d0 [ 177.794958][T17811] __list_lru_init+0x352/0x6d0 [ 177.799748][T17811] alloc_super+0x4bf/0x520 [ 177.804190][T17811] ? mount_bdev+0x290/0x290 [ 177.808697][T17811] sget+0x189/0x370 [ 177.812520][T17811] ? test_bdev_super+0x30/0x30 [ 177.817317][T17811] mount_bdev+0xd3/0x290 [ 177.821637][T17811] ? ext4_mount+0x40/0x40 [ 177.826136][T17811] ? ext4_errno_to_code+0x110/0x110 [ 177.831346][T17811] ext4_mount+0x2d/0x40 [ 177.835501][T17811] legacy_get_tree+0x70/0xc0 [ 177.840147][T17811] vfs_get_tree+0x4a/0x1a0 [ 177.844564][T17811] path_mount+0x11cf/0x1c40 [ 177.849065][T17811] ? kmem_cache_free+0x65/0x110 [ 177.854010][T17811] __se_sys_mount+0x24b/0x2f0 [ 177.858690][T17811] __x64_sys_mount+0x63/0x70 [ 177.863412][T17811] do_syscall_64+0x44/0xd0 [ 177.867823][T17811] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 177.873784][T17811] RIP: 0033:0x7fef4d1a102a [ 177.878192][T17811] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 177.897793][T17811] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 177.906253][T17811] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 177.914226][T17811] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 177.922276][T17811] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 177.930352][T17811] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 22:17:20 executing program 2: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000300), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'wpan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x30, r0, 0x800, 0x70bd2c, 0x25dfdbff, {}, [@IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r1}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r2}]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x8000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000140)={'#! ', './file0', [{0x20, 'ext4\x00'}]}, 0x11) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) read(r3, &(0x7f00000001c0)=""/195, 0xc3) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d2e00676ea58689a300"]) [ 177.938374][T17811] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 177.946350][T17811] 22:17:21 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000400)='./bus\x00', 0x0) fallocate(r2, 0x3, 0x0, 0xb329) sendmmsg$unix(r2, &(0x7f00000005c0)=[{{&(0x7f0000000080)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000240)="5f1b69ff33e81dabfcfc54baadccb965afd7e7a81988d81d40309f0e4a9ea24b10a82039b1e7cae0fb082232ed6af86460934ac9d3121a21ab39b812983a5967915c051c61c2ca3953d4bb108cacc95c4fb942a159c0d266c657e20cf3041e1e178105ecf5ea78f89635a1ccc16ec7bf4c28b82c38ff1a34379fa6d63c16897b1b6e4b2360a9d24ea865277b5ba0c390dcc0f8bb45d587aec18d9505bb52e64b5a3266e6e2b1731dd75cf5d70cfa9efb", 0xb0}, {&(0x7f0000000380)="65495465ef0d2446355249f289bea1e02eb9486c17ea60d33cd9db1bdf5fd8d35045a1b735fd1e8ba5553972de62a523d4d9ecb3e70a566305a0d76520904083fb58de0c391851b7d82bb157e491b3deee49e874a29ac626ee4446687361201b760f4c7536254da13df621b3bfc64863f6ba2a9bdcfbc1d196f7a217ecf04efc65ef37a5f62beab001fb1fc19326a4676f2d156703a93d38dbb731da084428bbc2f17e08360a756997a58de10a7517fc926e833ca2d4661b28791d699fa1ca82e108fbc249f81413e7a4a611", 0xcc}, {&(0x7f0000000480)="e5eb81cafc53c28c2b0cd51b6c7564800317d4daa59110dba91ad17c4e732375db9150dacbc17870c3e6b452452298fac57013c2b85191360117c1492abf32df8b37c43bf0c75afa54553eb6426bafa547a209611574ab61a6958d829e218ac6d882c04db0a2d12815c492dfaee43a7cc619f01e509385b9e821158d0e69ab5e9eb46151", 0x84}, {&(0x7f0000000000)="2b44ca3d77679530ab38f1a98558b577236bdf8e441d87a78619527c7c9d434413", 0x21}], 0x4, &(0x7f0000000580), 0x0, 0x4004801}}], 0x1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@fsname={'fsname', 0x3d, 'rfdno'}}, {@context={'context', 0x3d, 'root'}}, {@fsname={'fsname', 0x3d, '9p\x00'}}, {@dont_hash}, {@obj_user={'obj_user', 0x3d, 'trans=fd,'}}, {@fowner_gt={'fowner>', 0xee01}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x0, 0x38, 0x37, 0x64, 0x63, 0x63, 0x66], 0x2d, [0x64, 0x36, 0x33, 0x66], 0x2d, [0x35, 0x65, 0x62, 0x65], 0x2d, [0x33, 0x36, 0x34, 0x33], 0x2d, [0x61, 0x63, 0x30, 0xf3, 0x38, 0xbe57d133256d9ea6, 0x66, 0x34]}}}, {@subj_type={'subj_type', 0x3d, '^.\\'}}]}}) 22:17:21 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 83) 22:17:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d4800676ea58689a300"]) 22:17:21 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:21 executing program 2: bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000140)={0x1f, 0x0, @none, 0x5e40}, 0xe) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20150a3, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000080)) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYRESHEX=r0]) [ 178.204671][T17933] loop5: detected capacity change from 0 to 512 [ 178.218175][T17933] FAULT_INJECTION: forcing a failure. [ 178.218175][T17933] name failslab, interval 1, probability 0, space 0, times 0 [ 178.230932][T17933] CPU: 0 PID: 17933 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 178.241396][T17933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.251455][T17933] Call Trace: [ 178.254739][T17933] [ 178.257670][T17933] dump_stack_lvl+0xd6/0x122 [ 178.262286][T17933] dump_stack+0x11/0x1b [ 178.266478][T17933] should_fail+0x23c/0x250 [ 178.270892][T17933] ? __list_lru_init+0x352/0x6d0 [ 178.275830][T17933] __should_failslab+0x81/0x90 [ 178.280661][T17933] should_failslab+0x5/0x20 [ 178.285188][T17933] kmem_cache_alloc_trace+0x52/0x350 [ 178.290472][T17933] ? __list_lru_init+0x352/0x6d0 [ 178.295409][T17933] __list_lru_init+0x352/0x6d0 [ 178.300220][T17933] alloc_super+0x4bf/0x520 [ 178.304728][T17933] ? mount_bdev+0x290/0x290 [ 178.309240][T17933] sget+0x189/0x370 [ 178.313052][T17933] ? test_bdev_super+0x30/0x30 [ 178.317822][T17933] mount_bdev+0xd3/0x290 [ 178.322097][T17933] ? ext4_mount+0x40/0x40 [ 178.326430][T17933] ? ext4_errno_to_code+0x110/0x110 [ 178.331652][T17933] ext4_mount+0x2d/0x40 [ 178.335816][T17933] legacy_get_tree+0x70/0xc0 [ 178.340405][T17933] vfs_get_tree+0x4a/0x1a0 [ 178.344823][T17933] path_mount+0x11cf/0x1c40 [ 178.349382][T17933] ? kmem_cache_free+0x65/0x110 [ 178.354243][T17933] __se_sys_mount+0x24b/0x2f0 [ 178.358934][T17933] ? __this_cpu_preempt_check+0x18/0x20 [ 178.364486][T17933] __x64_sys_mount+0x63/0x70 [ 178.369172][T17933] do_syscall_64+0x44/0xd0 [ 178.373675][T17933] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 178.379615][T17933] RIP: 0033:0x7fef4d1a102a [ 178.384026][T17933] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 178.403630][T17933] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 178.412112][T17933] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 178.420137][T17933] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 178.428453][T17933] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 178.436453][T17933] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 178.444438][T17933] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 178.452441][T17933] 22:17:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d4c00676ea58689a300"]) 22:17:21 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d6000676ea58689a300"]) 22:17:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d6800676ea58689a300"]) 22:17:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d6c00676ea58689a300"]) 22:17:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d7400676ea58689a300"]) 22:17:22 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x1, 0x61) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:22 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d7a00676ea58689a300"]) 22:17:22 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 84) [ 179.062703][T18169] loop5: detected capacity change from 0 to 512 [ 179.081830][T18169] FAULT_INJECTION: forcing a failure. [ 179.081830][T18169] name failslab, interval 1, probability 0, space 0, times 0 [ 179.094642][T18169] CPU: 1 PID: 18169 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 179.104894][T18169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.115026][T18169] Call Trace: [ 179.118405][T18169] [ 179.121363][T18169] dump_stack_lvl+0xd6/0x122 [ 179.125966][T18169] dump_stack+0x11/0x1b [ 179.130125][T18169] should_fail+0x23c/0x250 [ 179.134542][T18169] ? __list_lru_init+0x352/0x6d0 [ 179.139520][T18169] __should_failslab+0x81/0x90 [ 179.144295][T18169] should_failslab+0x5/0x20 [ 179.148805][T18169] kmem_cache_alloc_trace+0x52/0x350 [ 179.154236][T18169] ? __list_lru_init+0x352/0x6d0 [ 179.159170][T18169] __list_lru_init+0x352/0x6d0 [ 179.163928][T18169] alloc_super+0x4bf/0x520 [ 179.168352][T18169] ? mount_bdev+0x290/0x290 [ 179.172943][T18169] sget+0x189/0x370 [ 179.176837][T18169] ? test_bdev_super+0x30/0x30 [ 179.181609][T18169] mount_bdev+0xd3/0x290 [ 179.185854][T18169] ? ext4_mount+0x40/0x40 [ 179.190363][T18169] ? ext4_errno_to_code+0x110/0x110 [ 179.195562][T18169] ext4_mount+0x2d/0x40 [ 179.199730][T18169] legacy_get_tree+0x70/0xc0 [ 179.204401][T18169] vfs_get_tree+0x4a/0x1a0 [ 179.208821][T18169] path_mount+0x11cf/0x1c40 [ 179.213318][T18169] ? kmem_cache_free+0x65/0x110 [ 179.218167][T18169] __se_sys_mount+0x24b/0x2f0 [ 179.222963][T18169] ? __this_cpu_preempt_check+0x18/0x20 [ 179.228535][T18169] __x64_sys_mount+0x63/0x70 [ 179.233134][T18169] do_syscall_64+0x44/0xd0 [ 179.237602][T18169] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 179.243491][T18169] RIP: 0033:0x7fef4d1a102a [ 179.247984][T18169] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 179.267732][T18169] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 179.276152][T18169] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 179.284119][T18169] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 179.292242][T18169] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 179.300305][T18169] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 179.308623][T18169] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 179.316621][T18169] [ 180.344839][ T8] device hsr_slave_0 left promiscuous mode [ 180.351951][ T8] device hsr_slave_1 left promiscuous mode [ 180.358687][ T8] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 180.366198][ T8] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 180.374192][ T8] device bridge_slave_1 left promiscuous mode [ 180.380323][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.388102][ T8] device bridge_slave_0 left promiscuous mode [ 180.394274][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.404779][ T8] device veth1_macvtap left promiscuous mode [ 180.410780][ T8] device veth0_macvtap left promiscuous mode [ 180.416754][ T8] device veth1_vlan left promiscuous mode [ 180.422496][ T8] device veth0_vlan left promiscuous mode [ 180.568310][ T8] team0 (unregistering): Port device team_slave_1 removed [ 180.587602][ T8] team0 (unregistering): Port device team_slave_0 removed [ 180.602081][ T8] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 180.616445][ T8] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 180.665672][ T8] bond0 (unregistering): Released all slaves [ 180.805913][T18280] chnl_net:caif_netlink_parms(): no params data found [ 180.842217][T18280] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.849516][T18280] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.857449][T18280] device bridge_slave_0 entered promiscuous mode [ 180.864653][T18280] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.871823][T18280] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.881429][T18280] device bridge_slave_1 entered promiscuous mode [ 180.900818][T18280] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 180.913112][T18280] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 180.931747][T18280] team0: Port device team_slave_0 added [ 180.938117][T18280] team0: Port device team_slave_1 added [ 180.953381][T18280] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 180.960417][T18280] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 180.986354][T18280] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 180.997773][T18280] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 181.004794][T18280] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 181.030706][T18280] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 181.074760][T18280] device hsr_slave_0 entered promiscuous mode [ 181.101324][T18280] device hsr_slave_1 entered promiscuous mode [ 181.110954][T18280] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 181.118587][T18280] Cannot create hsr debugfs directory [ 181.233041][T18280] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.240127][T18280] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.247390][T18280] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.254856][T18280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.297549][T18280] 8021q: adding VLAN 0 to HW filter on device bond0 [ 181.308740][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 181.318092][ T1919] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.326059][ T1919] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.343483][T18280] 8021q: adding VLAN 0 to HW filter on device team0 [ 181.363579][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 181.372248][ T75] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.379262][ T75] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.415051][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 181.423792][ T1919] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.430891][ T1919] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.439691][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 181.448508][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 181.457168][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 181.465495][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 181.475945][T18280] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 181.484728][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 181.499327][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 181.507093][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 181.517287][T18280] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 181.574271][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 181.633866][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 181.643668][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 181.651557][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 181.660323][T18280] device veth0_vlan entered promiscuous mode [ 181.673751][T18280] device veth1_vlan entered promiscuous mode [ 181.687359][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 181.695681][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 181.705461][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 181.715304][T18280] device veth0_macvtap entered promiscuous mode [ 181.723548][T18280] device veth1_macvtap entered promiscuous mode [ 181.731163][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 181.742972][T18280] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 181.753461][T18280] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.763386][T18280] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 181.773796][T18280] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.783601][T18280] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 181.794073][T18280] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.803879][T18280] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 181.814294][T18280] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.824358][T18280] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 181.834787][T18280] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.847166][T18280] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 181.855736][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 181.864328][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 181.875244][T18280] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 181.885684][T18280] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.895581][T18280] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 181.905995][T18280] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.915811][T18280] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 181.926228][T18280] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.936139][T18280] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 181.946542][T18280] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.956624][T18280] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 181.967170][T18280] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.979579][T18280] batman_adv: batadv0: Interface activated: batadv_slave_1 22:17:24 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0003676ea58689a300"]) 22:17:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 85) 22:17:24 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 181.987929][ T2009] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 181.996583][ T2009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 22:17:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000080)) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYBLOB="4c108aa2710354cb026c5e6024c9e4e23fb459078c3e064f2ff7287b367fe225453b8d7a7cc5c3fdb4ccdee66b96958686348fbbe4e056d19e3d3591113db45e6ead7be90804c5188660064e", @ANYBLOB="b3168896cb4cc21e62ea29d9c6d9acb026bd393de50581bbba1d3e306ee68ded9e25387112a34b19203471a9dd29e816ce7ec13eb751788f6741e147935f976a3d7170e7286a477e21f6d1da825a31de858186e59f4caa0fbd98a05a163c9333200871c4fb7ff6c5ba8d83064c4016fb742613da1a9f5c9c4c7d1e74cdde13c4ce86fb1bb7", @ANYRESHEX=r0, @ANYRES16=r0]) 22:17:25 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x91, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0xa) bind$unix(r0, &(0x7f0000000380)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) preadv2(r1, &(0x7f0000000080)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000000)=""/21, 0x15}], 0x2, 0x40, 0x9, 0x4) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}, {@version_9p2000}, {@access_user}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {}, {@loose}, {@posixacl}]}}) [ 182.052732][T18317] loop5: detected capacity change from 0 to 512 [ 182.065883][T18321] EXT4-fs: 50 callbacks suppressed [ 182.065897][T18321] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 182.086661][T18317] FAULT_INJECTION: forcing a failure. [ 182.086661][T18317] name failslab, interval 1, probability 0, space 0, times 0 [ 182.099328][T18317] CPU: 0 PID: 18317 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 182.109677][T18317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.119856][T18317] Call Trace: [ 182.123130][T18317] [ 182.126054][T18317] dump_stack_lvl+0xd6/0x122 [ 182.130660][T18317] dump_stack+0x11/0x1b [ 182.134908][T18317] should_fail+0x23c/0x250 [ 182.139399][T18317] ? __list_lru_init+0x352/0x6d0 [ 182.144408][T18317] __should_failslab+0x81/0x90 [ 182.149169][T18317] should_failslab+0x5/0x20 [ 182.153669][T18317] kmem_cache_alloc_trace+0x52/0x350 [ 182.159258][T18317] ? __list_lru_init+0x352/0x6d0 [ 182.164186][T18317] __list_lru_init+0x352/0x6d0 [ 182.168997][T18317] alloc_super+0x4bf/0x520 [ 182.173454][T18317] ? mount_bdev+0x290/0x290 [ 182.178031][T18317] sget+0x189/0x370 [ 182.181836][T18317] ? test_bdev_super+0x30/0x30 [ 182.186655][T18317] mount_bdev+0xd3/0x290 [ 182.190889][T18317] ? ext4_mount+0x40/0x40 [ 182.195235][T18317] ? ext4_errno_to_code+0x110/0x110 [ 182.200494][T18317] ext4_mount+0x2d/0x40 [ 182.204652][T18317] legacy_get_tree+0x70/0xc0 [ 182.209247][T18317] vfs_get_tree+0x4a/0x1a0 [ 182.213700][T18317] path_mount+0x11cf/0x1c40 [ 182.218199][T18317] ? kmem_cache_free+0x65/0x110 [ 182.223237][T18317] __se_sys_mount+0x24b/0x2f0 [ 182.227905][T18317] __x64_sys_mount+0x63/0x70 [ 182.232518][T18317] do_syscall_64+0x44/0xd0 [ 182.236930][T18317] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 182.242821][T18317] RIP: 0033:0x7fef4d1a102a [ 182.247302][T18317] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 182.267407][T18317] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 182.275818][T18317] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 182.283822][T18317] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 182.291791][T18317] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 22:17:25 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:25 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) r1 = creat(&(0x7f0000000400)='./bus\x00', 0x0) fallocate(r1, 0x3, 0x0, 0xb329) shutdown(r1, 0x1) socket$inet6(0xa, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="fefffffffffffffe2c7266646e6f3d", @ANYRESHEX=r0, @ANYBLOB="2c7766646e6f3ddac1c8ab16dc707860cb8fc8d6119df62058a5782945d378f31042497dc74442edf4c6521f73ba9040fcf1afca4043876f4f0764f0d58377147b98a92c3b91d4b324b9479e2b241b9567d33aa502000000c38db99b0a3f71b749dd448a0a383e33748a23629e03ff3d9cac5cecdc4d557a70b4cac1ca7537b5fdcbddf49b23b4afdb6d512aa3b9795c71f3fa5cee7f3b3b4a9827a3231f1b54741237f5326a7d8de4939032f4996020236c9cf55e917cc562e6597aaeb61b45ee", @ANYRESHEX=r2, @ANYBLOB="d7dc"]) [ 182.299831][T18317] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 182.307816][T18317] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 182.315784][T18317] 22:17:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 86) [ 182.335019][T18430] EXT4-fs (sda1): Unrecognized mount option "18446744073709551615LŠ¢qTËl^`$Éäâ?´YŒ>O/÷({6â%E;z|ÅÃý´ÌÞæk–•††4»äàVÑž=5‘=´^n­{éņ`N³ˆ–ËLÂbê)ÙÆÙ¬°&½9=建>0næíž%8q£K 4q©Ý)èÎ~Á>·QxgAáG“_—j=qpç(jG~!öÑÚ‚Z1Þ…†åŸLª½˜ Z<“3 qÄûöźƒL@ût&ÚŸ\œL}tÍÞÄ" or missing value 22:17:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) rename(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='./file0\x00') [ 182.400685][T18439] loop5: detected capacity change from 0 to 512 [ 182.407312][T18434] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 182.421710][T18439] FAULT_INJECTION: forcing a failure. [ 182.421710][T18439] name failslab, interval 1, probability 0, space 0, times 0 [ 182.434445][T18439] CPU: 1 PID: 18439 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 182.444016][T18479] EXT4-fs (sda1): Unrecognized mount option "d" or missing value [ 182.444687][T18439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.462532][T18439] Call Trace: [ 182.465815][T18439] [ 182.468736][T18439] dump_stack_lvl+0xd6/0x122 [ 182.473405][T18439] dump_stack+0x11/0x1b [ 182.477683][T18439] should_fail+0x23c/0x250 [ 182.482093][T18439] ? __list_lru_init+0x352/0x6d0 [ 182.487020][T18439] __should_failslab+0x81/0x90 [ 182.491796][T18439] should_failslab+0x5/0x20 [ 182.496296][T18439] kmem_cache_alloc_trace+0x52/0x350 [ 182.501577][T18439] ? __list_lru_init+0x352/0x6d0 [ 182.506555][T18439] __list_lru_init+0x352/0x6d0 [ 182.511376][T18439] alloc_super+0x4bf/0x520 [ 182.515830][T18439] ? mount_bdev+0x290/0x290 [ 182.520328][T18439] sget+0x189/0x370 [ 182.524277][T18439] ? test_bdev_super+0x30/0x30 [ 182.529087][T18439] mount_bdev+0xd3/0x290 [ 182.533330][T18439] ? ext4_mount+0x40/0x40 [ 182.537664][T18439] ? ext4_errno_to_code+0x110/0x110 [ 182.542955][T18439] ext4_mount+0x2d/0x40 [ 182.547106][T18439] legacy_get_tree+0x70/0xc0 [ 182.551780][T18439] vfs_get_tree+0x4a/0x1a0 [ 182.556255][T18439] path_mount+0x11cf/0x1c40 [ 182.560822][T18439] ? kmem_cache_free+0x65/0x110 [ 182.565670][T18439] __se_sys_mount+0x24b/0x2f0 [ 182.570341][T18439] __x64_sys_mount+0x63/0x70 [ 182.575000][T18439] do_syscall_64+0x44/0xd0 [ 182.579499][T18439] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 182.585436][T18439] RIP: 0033:0x7fef4d1a102a 22:17:25 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0005676ea58689a300"]) 22:17:25 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = memfd_secret(0x80000) ioctl$X86_IOC_RDMSR_REGS(r1, 0xc02063a0, &(0x7f0000000000)=[0x7fffffff, 0x3f, 0x7f, 0x9a, 0xf2, 0x5, 0x20, 0x7fff]) r2 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 22:17:25 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 182.589839][T18439] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 182.609438][T18439] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 182.617897][T18439] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 182.625865][T18439] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 182.634004][T18439] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 182.641998][T18439] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 182.649975][T18439] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 182.658255][T18439] [ 182.664664][T18546] EXT4-fs (sda1): Unrecognized mount option "d" or missing value 22:17:25 executing program 2: syz_open_dev$rtc(&(0x7f0000000140), 0x1000, 0x40) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 182.700307][T18555] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 182.714358][T18556] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value 22:17:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0006676ea58689a300"]) 22:17:25 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 87) [ 182.740817][T18584] EXT4-fs (sda1): Unrecognized mount option "d" or missing value [ 182.776703][T18662] loop5: detected capacity change from 0 to 512 22:17:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300), 0x41ec02, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000080)) r1 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x116) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r1, 0x5f00f000) sendto(r1, &(0x7f0000000200)="3b187c8bf740315cb32d34f295aecfa46f7a3cf86eae43cc945e15d50c8038a05f76284db45dd1e9a25a9044cca29c7352bc767051207e60c8bdaf7d29d92b5c849097270ba6f37d85c42080422293486a3429f8ddb38915db3f8520ba3e3546e05e418312834ad3443dedd0b76e3b", 0x6f, 0xc4810, &(0x7f0000000280)=@isdn={0x22, 0x81, 0xff, 0x1f, 0x7f}, 0x80) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1ff}}, './file0\x00'}) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000001c0)={0x80, 0x100, 0x6, 0x100, 0x9, "33b8cddd8520af1f"}) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRES32=r0]) [ 182.784323][T18665] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 182.804627][T18662] FAULT_INJECTION: forcing a failure. [ 182.804627][T18662] name failslab, interval 1, probability 0, space 0, times 0 [ 182.817539][T18662] CPU: 1 PID: 18662 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 182.827692][T18662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.830702][T18660] FAT-fs (loop1): Unrecognized mount option "000000000000000')ù‘ŠE000000" or missing value [ 182.837827][T18662] Call Trace: [ 182.837835][T18662] [ 182.837841][T18662] dump_stack_lvl+0xd6/0x122 [ 182.837866][T18662] dump_stack+0x11/0x1b [ 182.837884][T18662] should_fail+0x23c/0x250 [ 182.837902][T18662] ? __list_lru_init+0x352/0x6d0 [ 182.850868][T18667] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 182.851402][T18662] __should_failslab+0x81/0x90 [ 182.885458][T18662] should_failslab+0x5/0x20 [ 182.889963][T18662] kmem_cache_alloc_trace+0x52/0x350 [ 182.895472][T18662] ? __list_lru_init+0x352/0x6d0 [ 182.900415][T18662] __list_lru_init+0x352/0x6d0 [ 182.905302][T18662] alloc_super+0x4bf/0x520 [ 182.909719][T18662] ? mount_bdev+0x290/0x290 [ 182.914273][T18662] sget+0x189/0x370 [ 182.918130][T18662] ? test_bdev_super+0x30/0x30 [ 182.922976][T18662] mount_bdev+0xd3/0x290 [ 182.927311][T18662] ? ext4_mount+0x40/0x40 [ 182.931707][T18662] ? ext4_errno_to_code+0x110/0x110 [ 182.936928][T18662] ext4_mount+0x2d/0x40 [ 182.941080][T18662] legacy_get_tree+0x70/0xc0 [ 182.945710][T18662] vfs_get_tree+0x4a/0x1a0 [ 182.950301][T18662] path_mount+0x11cf/0x1c40 [ 182.954904][T18662] ? kmem_cache_free+0x65/0x110 [ 182.959757][T18662] __se_sys_mount+0x24b/0x2f0 [ 182.964431][T18662] __x64_sys_mount+0x63/0x70 [ 182.969015][T18662] do_syscall_64+0x44/0xd0 [ 182.973456][T18662] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 182.979412][T18662] RIP: 0033:0x7fef4d1a102a [ 182.983908][T18662] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 183.003553][T18662] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 183.011960][T18662] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 183.019929][T18662] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 183.027897][T18662] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 22:17:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0007676ea58689a300"]) 22:17:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) chdir(&(0x7f0000000180)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000002740)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) getpeername$unix(r1, &(0x7f0000002780)=@abs, &(0x7f0000002800)=0x6e) [ 183.035860][T18662] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 183.043901][T18662] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 183.051871][T18662] 22:17:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 88) 22:17:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0009676ea58689a300"]) 22:17:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x28}, 0x10) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 183.122825][T18777] loop5: detected capacity change from 0 to 512 [ 183.140541][T18777] FAULT_INJECTION: forcing a failure. [ 183.140541][T18777] name failslab, interval 1, probability 0, space 0, times 0 [ 183.153223][T18777] CPU: 0 PID: 18777 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 183.163908][T18777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.173960][T18777] Call Trace: [ 183.177230][T18777] [ 183.180228][T18777] dump_stack_lvl+0xd6/0x122 [ 183.184818][T18777] dump_stack+0x11/0x1b [ 183.188967][T18777] should_fail+0x23c/0x250 [ 183.193385][T18777] ? __list_lru_init+0x352/0x6d0 [ 183.198326][T18777] __should_failslab+0x81/0x90 [ 183.203138][T18777] should_failslab+0x5/0x20 [ 183.207644][T18777] kmem_cache_alloc_trace+0x52/0x350 [ 183.212931][T18777] ? __list_lru_init+0x352/0x6d0 [ 183.217868][T18777] __list_lru_init+0x352/0x6d0 [ 183.222739][T18777] alloc_super+0x4bf/0x520 [ 183.227199][T18777] ? mount_bdev+0x290/0x290 [ 183.231724][T18777] sget+0x189/0x370 [ 183.235628][T18777] ? test_bdev_super+0x30/0x30 [ 183.240394][T18777] mount_bdev+0xd3/0x290 [ 183.244725][T18777] ? ext4_mount+0x40/0x40 [ 183.249159][T18777] ? ext4_errno_to_code+0x110/0x110 [ 183.254360][T18777] ext4_mount+0x2d/0x40 [ 183.258514][T18777] legacy_get_tree+0x70/0xc0 [ 183.263100][T18777] vfs_get_tree+0x4a/0x1a0 [ 183.267699][T18777] path_mount+0x11cf/0x1c40 [ 183.272225][T18777] ? kmem_cache_free+0x65/0x110 [ 183.277076][T18777] __se_sys_mount+0x24b/0x2f0 [ 183.281795][T18777] ? __this_cpu_preempt_check+0x18/0x20 [ 183.287454][T18777] __x64_sys_mount+0x63/0x70 [ 183.292039][T18777] do_syscall_64+0x44/0xd0 [ 183.296469][T18777] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 183.302397][T18777] RIP: 0033:0x7fef4d1a102a [ 183.306888][T18777] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 183.326512][T18777] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 183.334925][T18777] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 183.342986][T18777] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 183.350964][T18777] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 183.359277][T18777] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 183.367244][T18777] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 183.375325][T18777] 22:17:26 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x2, 0x9, 0x0, 0x0, 0x9, 0x0, 0xf, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000000), 0xc}, 0x40800, 0x2b6, 0x73, 0x9, 0x9, 0x6, 0x1f, 0x0, 0x3, 0x0, 0x818b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:26 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:26 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) uselib(&(0x7f0000000140)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d000a676ea58689a300"]) 22:17:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 89) 22:17:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x188eca4, &(0x7f0000000140)=ANY=[@ANYRESHEX=0x0]) 22:17:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d000b676ea58689a300"]) [ 183.527175][T18798] loop5: detected capacity change from 0 to 512 [ 183.567332][T18798] FAULT_INJECTION: forcing a failure. [ 183.567332][T18798] name failslab, interval 1, probability 0, space 0, times 0 [ 183.580065][T18798] CPU: 0 PID: 18798 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 183.590220][T18798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.600494][T18798] Call Trace: [ 183.603784][T18798] [ 183.606712][T18798] dump_stack_lvl+0xd6/0x122 [ 183.611387][T18798] dump_stack+0x11/0x1b [ 183.615544][T18798] should_fail+0x23c/0x250 [ 183.619965][T18798] ? __list_lru_init+0x352/0x6d0 [ 183.624911][T18798] __should_failslab+0x81/0x90 [ 183.629689][T18798] should_failslab+0x5/0x20 [ 183.634190][T18798] kmem_cache_alloc_trace+0x52/0x350 [ 183.639663][T18798] ? __list_lru_init+0x352/0x6d0 [ 183.644648][T18798] __list_lru_init+0x352/0x6d0 [ 183.649409][T18798] alloc_super+0x4bf/0x520 [ 183.653890][T18798] ? mount_bdev+0x290/0x290 [ 183.658385][T18798] sget+0x189/0x370 [ 183.662185][T18798] ? test_bdev_super+0x30/0x30 [ 183.666970][T18798] mount_bdev+0xd3/0x290 [ 183.671214][T18798] ? ext4_mount+0x40/0x40 [ 183.675596][T18798] ? ext4_errno_to_code+0x110/0x110 [ 183.680825][T18798] ext4_mount+0x2d/0x40 [ 183.685019][T18798] legacy_get_tree+0x70/0xc0 [ 183.689644][T18798] vfs_get_tree+0x4a/0x1a0 [ 183.694060][T18798] path_mount+0x11cf/0x1c40 [ 183.698681][T18798] ? kmem_cache_free+0x65/0x110 [ 183.703539][T18798] __se_sys_mount+0x24b/0x2f0 [ 183.708209][T18798] __x64_sys_mount+0x63/0x70 [ 183.712948][T18798] do_syscall_64+0x44/0xd0 [ 183.717418][T18798] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 183.723392][T18798] RIP: 0033:0x7fef4d1a102a [ 183.727793][T18798] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 183.747390][T18798] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 183.755814][T18798] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 183.763794][T18798] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 22:17:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='l']) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') 22:17:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d000c676ea58689a300"]) [ 183.771812][T18798] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 183.779805][T18798] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 183.787772][T18798] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 183.795782][T18798] 22:17:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d360c676ea58689a300"]) [ 183.846876][T18809] 9pnet: Insufficient options for proto=fd 22:17:26 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:26 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) connect$unix(r0, &(0x7f0000000080)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d000d676ea58689a300"]) 22:17:27 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d000e676ea58689a300"]) 22:17:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r1) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r5) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r7) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r9) lstat(&(0x7f0000008540)='./file0\x00', &(0x7f0000008580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000008600)={{}, {0x1, 0x5}, [{0x2, 0x4, 0xee00}, {0x2, 0x7}, {0x2, 0x1}, {}, {0x2, 0x0, 0xee01}, {0x2, 0x6}, {}, {0x2, 0x5}], {0x4, 0x4}, [{0x8, 0x1, 0xee01}, {0x8, 0x0, r1}, {0x8, 0x7, r3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, r5}, {0x8, 0x4}, {0x8, 0x5, r7}, {0x8, 0x5, r9}, {0x8, 0x1, r10}, {0x8, 0x0, 0xee01}], {0x10, 0x3}, {0x20, 0x4}}, 0xb4, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 90) 22:17:27 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0011676ea58689a300"]) [ 184.120420][T19043] loop5: detected capacity change from 0 to 512 [ 184.153347][T19043] FAULT_INJECTION: forcing a failure. [ 184.153347][T19043] name failslab, interval 1, probability 0, space 0, times 0 [ 184.166301][T19043] CPU: 1 PID: 19043 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 184.176554][T19043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.186608][T19043] Call Trace: [ 184.189914][T19043] [ 184.192840][T19043] dump_stack_lvl+0xd6/0x122 [ 184.197438][T19043] dump_stack+0x11/0x1b [ 184.201592][T19043] should_fail+0x23c/0x250 [ 184.206105][T19043] ? __list_lru_init+0x352/0x6d0 [ 184.211041][T19043] __should_failslab+0x81/0x90 [ 184.215810][T19043] should_failslab+0x5/0x20 [ 184.220315][T19043] kmem_cache_alloc_trace+0x52/0x350 [ 184.225663][T19043] ? __list_lru_init+0x352/0x6d0 [ 184.230598][T19043] __list_lru_init+0x352/0x6d0 [ 184.235398][T19043] alloc_super+0x4bf/0x520 [ 184.239834][T19043] ? mount_bdev+0x290/0x290 [ 184.244412][T19043] sget+0x189/0x370 [ 184.248296][T19043] ? test_bdev_super+0x30/0x30 [ 184.253069][T19043] mount_bdev+0xd3/0x290 [ 184.257363][T19043] ? ext4_mount+0x40/0x40 [ 184.261729][T19043] ? ext4_errno_to_code+0x110/0x110 [ 184.266929][T19043] ext4_mount+0x2d/0x40 [ 184.271084][T19043] legacy_get_tree+0x70/0xc0 [ 184.275702][T19043] vfs_get_tree+0x4a/0x1a0 [ 184.280132][T19043] path_mount+0x11cf/0x1c40 [ 184.284626][T19043] ? kmem_cache_free+0x65/0x110 [ 184.289469][T19043] __se_sys_mount+0x24b/0x2f0 [ 184.294143][T19043] ? __this_cpu_preempt_check+0x18/0x20 [ 184.299690][T19043] __x64_sys_mount+0x63/0x70 [ 184.304324][T19043] do_syscall_64+0x44/0xd0 [ 184.308748][T19043] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 184.314663][T19043] RIP: 0033:0x7fef4d1a102a 22:17:27 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 184.319074][T19043] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 184.338743][T19043] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 184.347147][T19043] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 184.355115][T19043] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 184.363138][T19043] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 22:17:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0012676ea58689a300"]) [ 184.371104][T19043] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 184.379158][T19043] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 184.387126][T19043] 22:17:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0020676ea58689a300"]) 22:17:27 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:27 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x4) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 91) 22:17:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0022676ea58689a300"]) 22:17:27 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 184.807070][T19362] loop5: detected capacity change from 0 to 512 [ 184.842927][T19362] FAULT_INJECTION: forcing a failure. [ 184.842927][T19362] name failslab, interval 1, probability 0, space 0, times 0 [ 184.855679][T19362] CPU: 1 PID: 19362 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 184.865831][T19362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.875880][T19362] Call Trace: [ 184.879154][T19362] [ 184.882112][T19362] dump_stack_lvl+0xd6/0x122 [ 184.886727][T19362] dump_stack+0x11/0x1b [ 184.890904][T19362] should_fail+0x23c/0x250 [ 184.895325][T19362] ? ext4_fill_super+0x3d/0x78f0 [ 184.900268][T19362] __should_failslab+0x81/0x90 [ 184.905038][T19362] should_failslab+0x5/0x20 [ 184.909541][T19362] __kmalloc_track_caller+0x6d/0x370 [ 184.914834][T19362] ? bdev_name+0x1e1/0x240 [ 184.919253][T19362] kstrdup+0x31/0x70 [ 184.923150][T19362] ext4_fill_super+0x3d/0x78f0 [ 184.928133][T19362] ? vsnprintf+0xe8f/0xed0 [ 184.932548][T19362] ? snprintf+0x83/0xb0 [ 184.936771][T19362] ? set_blocksize+0x197/0x270 [ 184.941534][T19362] mount_bdev+0x1e8/0x290 [ 184.945917][T19362] ? ext4_mount+0x40/0x40 [ 184.950310][T19362] ? ext4_errno_to_code+0x110/0x110 [ 184.955582][T19362] ext4_mount+0x2d/0x40 [ 184.959736][T19362] legacy_get_tree+0x70/0xc0 [ 184.964371][T19362] vfs_get_tree+0x4a/0x1a0 [ 184.968826][T19362] path_mount+0x11cf/0x1c40 [ 184.973397][T19362] ? kmem_cache_free+0x65/0x110 [ 184.978315][T19362] __se_sys_mount+0x24b/0x2f0 [ 184.983174][T19362] __x64_sys_mount+0x63/0x70 [ 184.987793][T19362] do_syscall_64+0x44/0xd0 [ 184.992206][T19362] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 184.998176][T19362] RIP: 0033:0x7fef4d1a102a [ 185.002583][T19362] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 185.022255][T19362] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 185.030834][T19362] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 185.038804][T19362] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 185.046897][T19362] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 185.055477][T19362] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 185.063442][T19362] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 185.071412][T19362] [ 185.675467][ T2267] device hsr_slave_0 left promiscuous mode [ 185.690047][ T2267] device hsr_slave_1 left promiscuous mode [ 185.697660][ T2267] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 185.705180][ T2267] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 185.714318][ T2267] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 185.721790][ T2267] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 185.729420][ T2267] device bridge_slave_1 left promiscuous mode [ 185.735559][ T2267] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.745726][ T2267] device bridge_slave_0 left promiscuous mode [ 185.751875][ T2267] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.764246][ T2267] device veth1_macvtap left promiscuous mode [ 185.770320][ T2267] device veth0_macvtap left promiscuous mode [ 185.776345][ T2267] device veth1_vlan left promiscuous mode [ 185.782137][ T2267] device veth0_vlan left promiscuous mode [ 185.886607][ T2267] team0 (unregistering): Port device team_slave_1 removed [ 185.897007][ T2267] team0 (unregistering): Port device team_slave_0 removed [ 185.906742][ T2267] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 185.919607][ T2267] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 185.953381][ T2267] bond0 (unregistering): Released all slaves [ 186.533683][T19478] chnl_net:caif_netlink_parms(): no params data found [ 186.616024][T19478] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.623145][T19478] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.633945][T19478] device bridge_slave_0 entered promiscuous mode [ 186.641765][T19478] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.648785][T19478] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.657825][T19478] device bridge_slave_1 entered promiscuous mode [ 186.693934][T19478] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 186.704265][T19478] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 186.724458][T19478] team0: Port device team_slave_0 added [ 186.732363][T19478] team0: Port device team_slave_1 added [ 186.750484][T19478] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 186.757457][T19478] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 186.783380][T19478] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 186.794699][T19478] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 186.801681][T19478] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 186.827610][T19478] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 186.852267][T19478] device hsr_slave_0 entered promiscuous mode [ 186.859556][T19478] device hsr_slave_1 entered promiscuous mode [ 186.866247][T19478] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 186.873812][T19478] Cannot create hsr debugfs directory [ 186.914500][T19478] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.921561][T19478] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.928848][T19478] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.935885][T19478] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.971111][T19478] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.982321][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.990671][ T1919] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.998810][ T1919] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.010550][T19478] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.023392][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.032002][ T1919] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.039023][ T1919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.055388][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.063934][ T75] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.070988][ T75] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.090229][ T2009] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.099123][ T2009] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.107927][ T2009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.116058][ T2009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.125619][T19478] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 187.134026][ T2009] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 187.150810][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 187.158343][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 187.167440][T19478] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.235219][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 187.245249][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 187.309105][ T2344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 187.317515][ T2344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 187.328441][ T2344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 187.336257][ T2344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 187.346381][T19478] device veth0_vlan entered promiscuous mode [ 187.371824][T19478] device veth1_vlan entered promiscuous mode [ 187.397071][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 187.411430][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 187.419739][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 187.441504][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 187.451161][T19478] device veth0_macvtap entered promiscuous mode [ 187.459291][T19478] device veth1_macvtap entered promiscuous mode [ 187.474294][T19478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 187.484865][T19478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.494892][T19478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 187.505314][T19478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.515115][T19478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 187.525525][T19478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.535354][T19478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 187.545772][T19478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.555585][T19478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 187.566004][T19478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.578629][T19478] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 187.586558][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 187.594974][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 187.603122][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 187.611731][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 187.621102][T19478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 187.631578][T19478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.641377][T19478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 187.651834][T19478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.661635][T19478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 187.672066][T19478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.681886][T19478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 187.692392][T19478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.702240][T19478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 187.712692][T19478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.725672][T19478] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 187.736173][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 187.744797][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 22:17:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x116) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x5f00f000) faccessat(r0, &(0x7f0000000080)='./file0\x00', 0x80) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x48510, &(0x7f0000000240)={[{@mode={'mode', 0x3d, 0x8}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@measure}, {@smackfshat={'smackfshat', 0x3d, 'ext4\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'ext4\x00'}}]}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[]) 22:17:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0025676ea58689a300"]) 22:17:30 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:30 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 92) 22:17:30 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x3, 0x401}}, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}) r2 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) [ 187.808256][T19506] EXT4-fs: 30 callbacks suppressed [ 187.808270][T19506] EXT4-fs (sda1): Unrecognized mount option "d" or missing value [ 187.849734][T19510] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 187.858718][T19515] loop5: detected capacity change from 0 to 512 [ 187.879930][T19522] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value [ 187.888201][T19515] FAULT_INJECTION: forcing a failure. [ 187.888201][T19515] name failslab, interval 1, probability 0, space 0, times 0 [ 187.900928][T19515] CPU: 1 PID: 19515 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 187.911080][T19515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.921277][T19515] Call Trace: [ 187.924543][T19515] [ 187.927466][T19515] dump_stack_lvl+0xd6/0x122 [ 187.932152][T19515] dump_stack+0x11/0x1b [ 187.936327][T19515] should_fail+0x23c/0x250 [ 187.940736][T19515] ? ext4_fill_super+0x62/0x78f0 [ 187.945744][T19515] __should_failslab+0x81/0x90 [ 187.950532][T19515] should_failslab+0x5/0x20 [ 187.955105][T19515] kmem_cache_alloc_trace+0x52/0x350 [ 187.960441][T19515] ext4_fill_super+0x62/0x78f0 [ 187.965206][T19515] ? vsnprintf+0xe8f/0xed0 [ 187.969653][T19515] ? snprintf+0x83/0xb0 [ 187.973806][T19515] ? set_blocksize+0x197/0x270 [ 187.978566][T19515] mount_bdev+0x1e8/0x290 [ 187.982943][T19515] ? ext4_mount+0x40/0x40 [ 187.987339][T19515] ? ext4_errno_to_code+0x110/0x110 [ 187.992534][T19515] ext4_mount+0x2d/0x40 [ 187.996683][T19515] legacy_get_tree+0x70/0xc0 [ 188.001270][T19515] vfs_get_tree+0x4a/0x1a0 [ 188.005691][T19515] path_mount+0x11cf/0x1c40 [ 188.010192][T19515] ? kmem_cache_free+0x65/0x110 [ 188.015220][T19515] __se_sys_mount+0x24b/0x2f0 [ 188.020012][T19515] __x64_sys_mount+0x63/0x70 [ 188.024600][T19515] do_syscall_64+0x44/0xd0 [ 188.029012][T19515] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 188.034963][T19515] RIP: 0033:0x7fef4d1a102a 22:17:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d002e676ea58689a300"]) [ 188.039369][T19515] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 188.059486][T19515] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 188.067898][T19515] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 188.075864][T19515] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 188.083894][T19515] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 188.091896][T19515] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 188.099895][T19515] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 188.107914][T19515] [ 188.117965][T19625] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value [ 188.137235][T19626] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value 22:17:31 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:31 executing program 2: mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x6) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2311821, 0x0) truncate(&(0x7f0000000000)='./file0/file0\x00', 0xffffffffffffff35) open$dir(&(0x7f0000000140)='./file0\x00', 0x5e5100, 0x44) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280), &(0x7f00000002c0)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x2) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f00000001c0)=ANY=[@ANYBLOB="7a6c2b74ff586c9ea5d180dcc627ffea584e3c027cd165d5e9b2c09b50db2a18a19be58f17fff41de95b82074e76a895a275b700a8e9ab0312ccb831188d4a4221090fa10b635516737c62add7d615c8f4bc41d4f99ad8ea3c37f4511c2e1adb3f0e04b121a84a4510db084646bcf94b037b686743cf653af85afdd2a20a60f34c7d89c4080a4da9ae8f401aac9e5e0cb16e4a00"/157]) 22:17:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0c36676ea58689a300"]) [ 188.150330][T19627] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 188.182759][T19632] SELinux: Context system_u:object_r:auditctl_exec_t:s0 is not valid (left unmapped). 22:17:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 93) [ 188.192833][ T24] audit: type=1400 audit(1639001851.142:276): avc: denied { relabelto } for pid=19630 comm="syz-executor.2" name="file0" dev="sda1" ino=1248 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:auditctl_exec_t:s0" [ 188.236696][T19642] loop5: detected capacity change from 0 to 512 [ 188.244599][T19635] EXT4-fs (sda1): Unrecognized mount option "data_eJ 6gn¥†‰£" or missing value [ 188.250406][ T24] audit: type=1400 audit(1639001851.192:277): avc: denied { write } for pid=19478 comm="syz-executor.2" name="file0" dev="sda1" ino=1248 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:auditctl_exec_t:s0" [ 188.265806][T19642] FAULT_INJECTION: forcing a failure. [ 188.265806][T19642] name failslab, interval 1, probability 0, space 0, times 0 22:17:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYRES16]) open(&(0x7f0000000140)='./file0\x00', 0x80000, 0x42) [ 188.280484][ T24] audit: type=1400 audit(1639001851.192:278): avc: denied { remove_name } for pid=19478 comm="syz-executor.2" name="file0" dev="sda1" ino=1250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:auditctl_exec_t:s0" [ 188.280516][ T24] audit: type=1400 audit(1639001851.192:279): avc: denied { rmdir } for pid=19478 comm="syz-executor.2" name="file0" dev="sda1" ino=1248 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:auditctl_exec_t:s0" [ 188.293110][T19642] CPU: 0 PID: 19642 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 188.293132][T19642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.367144][T19642] Call Trace: [ 188.370420][T19642] [ 188.373381][T19642] dump_stack_lvl+0xd6/0x122 [ 188.377996][T19642] dump_stack+0x11/0x1b [ 188.382183][T19642] should_fail+0x23c/0x250 [ 188.386588][T19642] ? ext4_fill_super+0x1f0/0x78f0 [ 188.391675][T19642] __should_failslab+0x81/0x90 [ 188.396434][T19642] should_failslab+0x5/0x20 [ 188.401035][T19642] kmem_cache_alloc_trace+0x52/0x350 [ 188.406391][T19642] ? ext4_fill_super+0x62/0x78f0 [ 188.411394][T19642] ext4_fill_super+0x1f0/0x78f0 [ 188.416238][T19642] ? vsnprintf+0xe8f/0xed0 [ 188.420675][T19642] ? snprintf+0x83/0xb0 [ 188.424825][T19642] ? set_blocksize+0x197/0x270 [ 188.429580][T19642] mount_bdev+0x1e8/0x290 [ 188.433909][T19642] ? ext4_mount+0x40/0x40 [ 188.438238][T19642] ? ext4_errno_to_code+0x110/0x110 [ 188.443448][T19642] ext4_mount+0x2d/0x40 [ 188.447601][T19642] legacy_get_tree+0x70/0xc0 [ 188.452331][T19642] vfs_get_tree+0x4a/0x1a0 [ 188.456747][T19642] path_mount+0x11cf/0x1c40 [ 188.461285][T19642] ? kmem_cache_free+0x65/0x110 [ 188.466151][T19642] __se_sys_mount+0x24b/0x2f0 [ 188.470859][T19642] __x64_sys_mount+0x63/0x70 [ 188.475444][T19642] do_syscall_64+0x44/0xd0 [ 188.479860][T19642] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 188.485753][T19642] RIP: 0033:0x7fef4d1a102a [ 188.490158][T19642] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 188.509821][T19642] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 188.518245][T19642] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 188.526212][T19642] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 188.534227][T19642] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 188.542197][T19642] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 22:17:31 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 94) 22:17:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0040676ea58689a300"]) [ 188.550200][T19642] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 188.558170][T19642] [ 188.567110][T19714] EXT4-fs (sda1): Unrecognized mount option "data_eJ 6gn¥†‰£" or missing value [ 188.586559][T19713] EXT4-fs (sda1): Unrecognized mount option "ÿÿ" or missing value 22:17:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0048676ea58689a300"]) 22:17:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) unlink(&(0x7f0000000180)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) chmod(&(0x7f0000000140)='./file0\x00', 0x140) [ 188.633398][T19744] EXT4-fs (sda1): Unrecognized mount option "ÿÿ" or missing value 22:17:31 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001, 0x1}, 0xa85}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1}, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x2200001, &(0x7f00000001c0)=ANY=[@ANYBLOB='transTfd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c7766646e6f3d5bf48da6b24ad73df5cfb76921aecd58c3e7483b5c05b19b0c120be323a99e4be9030142b5f592f1c6a79721246118f532b1066d4405974bf0e74a5e678f2def4517a6924985cea43f17d5ba769a8b29f38834e093e0517b1b39d45058ae11e2e1ccbabe1a1adcf55210703a61c9b48e81d36ee83472b674da70591efadf8d3d4d6308b79974f24fb643ce", @ANYRESHEX, @ANYBLOB="b4dd9623c84b7e32f6ac7108ce266c505e95d57e044af0f6956b2aa41cbfeca6666eb4498c948eff2aa5ce900fbf3f2ee2e96a579d8b"]) 22:17:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d004c676ea58689a300"]) [ 188.683872][T19754] loop5: detected capacity change from 0 to 512 [ 188.709160][T19754] FAULT_INJECTION: forcing a failure. [ 188.709160][T19754] name failslab, interval 1, probability 0, space 0, times 0 [ 188.721824][T19754] CPU: 1 PID: 19754 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 188.731982][T19754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.742035][T19754] Call Trace: [ 188.745321][T19754] [ 188.748505][T19754] dump_stack_lvl+0xd6/0x122 [ 188.753094][T19754] dump_stack+0x11/0x1b [ 188.757275][T19754] should_fail+0x23c/0x250 [ 188.761786][T19754] ? ext4_fill_super+0x1f0/0x78f0 [ 188.766842][T19754] __should_failslab+0x81/0x90 [ 188.771606][T19754] should_failslab+0x5/0x20 [ 188.776107][T19754] kmem_cache_alloc_trace+0x52/0x350 [ 188.781393][T19754] ? ext4_fill_super+0x62/0x78f0 [ 188.786469][T19754] ext4_fill_super+0x1f0/0x78f0 [ 188.791333][T19754] ? vsnprintf+0xe8f/0xed0 [ 188.795746][T19754] ? snprintf+0x83/0xb0 [ 188.799901][T19754] ? set_blocksize+0x197/0x270 [ 188.804676][T19754] mount_bdev+0x1e8/0x290 [ 188.809029][T19754] ? ext4_mount+0x40/0x40 [ 188.813357][T19754] ? ext4_errno_to_code+0x110/0x110 [ 188.818719][T19754] ext4_mount+0x2d/0x40 [ 188.822926][T19754] legacy_get_tree+0x70/0xc0 [ 188.827603][T19754] vfs_get_tree+0x4a/0x1a0 [ 188.832106][T19754] path_mount+0x11cf/0x1c40 [ 188.836656][T19754] ? kmem_cache_free+0x65/0x110 [ 188.841541][T19754] __se_sys_mount+0x24b/0x2f0 [ 188.846226][T19754] __x64_sys_mount+0x63/0x70 [ 188.850833][T19754] do_syscall_64+0x44/0xd0 [ 188.855331][T19754] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 188.861231][T19754] RIP: 0033:0x7fef4d1a102a [ 188.865636][T19754] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 188.885243][T19754] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 188.893658][T19754] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 188.901835][T19754] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 188.909930][T19754] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 188.917909][T19754] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 188.925877][T19754] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 188.933849][T19754] 22:17:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0060676ea58689a300"]) 22:17:32 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:32 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_NOACK_MAP(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r0, 0x100, 0x70bd2b, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x4cc}]}, 0x24}, 0x1, 0x0, 0x0, 0x44}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 95) 22:17:32 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="0204000000000000e95e8a4848241e876fe1fe"]) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000000080)=0x3, 0x4) socket$inet6(0xa, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000240)={0x0, 0x0}) r3 = perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f00000001c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x4}}) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0xff, 0x8, 0x8, 0x80, 0x0, 0x7, 0x20010, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xc0, 0x4, @perf_bp={&(0x7f00000000c0), 0xa}, 0xb128, 0x5, 0x6, 0x3, 0xaef3, 0x7, 0x1c, 0x0, 0xdf73, 0x0, 0x100}, r2, 0x3, r3, 0xa) r4 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) connect$unix(r1, &(0x7f0000000140)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r4}}) 22:17:32 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0068676ea58689a300"]) [ 189.726160][T19778] loop5: detected capacity change from 0 to 512 [ 189.752499][T19778] FAULT_INJECTION: forcing a failure. [ 189.752499][T19778] name failslab, interval 1, probability 0, space 0, times 0 [ 189.765169][T19778] CPU: 1 PID: 19778 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 189.775373][T19778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.785468][T19778] Call Trace: [ 189.788804][T19778] [ 189.791754][T19778] dump_stack_lvl+0xd6/0x122 [ 189.796349][T19778] dump_stack+0x11/0x1b [ 189.800558][T19778] should_fail+0x23c/0x250 [ 189.804972][T19778] ? mempool_alloc_slab+0x16/0x20 [ 189.810078][T19778] __should_failslab+0x81/0x90 [ 189.814934][T19778] should_failslab+0x5/0x20 [ 189.819451][T19778] kmem_cache_alloc+0x4f/0x320 22:17:32 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x0) 22:17:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000140)=ANY=[@ANYBLOB="646792ffdbd95216112548594e10773feda9e3548763fc59d09b2f4d2e73b9e6e4be733ebabce0011dfdf6c35580c41964a2b56383e2af0989322118312431bd149eba07896017a2faf729a04c6fc2eaee75114bf3bdc1371e7eb9b4fe3e5e77d0fd14b8ccee126456fd65d83f79d4286e51d80a92491613e38c"]) [ 189.824216][T19778] mempool_alloc_slab+0x16/0x20 [ 189.829074][T19778] ? mempool_free+0x130/0x130 [ 189.833899][T19778] mempool_alloc+0x9d/0x310 [ 189.838411][T19778] bio_alloc_bioset+0xcc/0x560 [ 189.843206][T19778] ? __find_get_block+0x6a1/0x9b0 [ 189.848224][T19778] submit_bh_wbc+0x133/0x320 [ 189.852812][T19778] ? __getblk_gfp+0x493/0x530 [ 189.857487][T19778] submit_bh+0x21/0x30 [ 189.861602][T19778] ? __wait_on_buffer+0x60/0x60 [ 189.866458][T19778] ext4_read_bh+0xf1/0x170 [ 189.870948][T19778] ext4_sb_bread_unmovable+0xf7/0x1a0 [ 189.876350][T19778] ext4_fill_super+0x427/0x78f0 [ 189.881199][T19778] ? vsnprintf+0xe8f/0xed0 [ 189.885687][T19778] ? snprintf+0x83/0xb0 [ 189.889837][T19778] ? set_blocksize+0x197/0x270 [ 189.894604][T19778] mount_bdev+0x1e8/0x290 [ 189.899083][T19778] ? ext4_mount+0x40/0x40 [ 189.903416][T19778] ? ext4_errno_to_code+0x110/0x110 [ 189.908617][T19778] ext4_mount+0x2d/0x40 [ 189.912864][T19778] legacy_get_tree+0x70/0xc0 [ 189.917517][T19778] vfs_get_tree+0x4a/0x1a0 [ 189.921934][T19778] path_mount+0x11cf/0x1c40 [ 189.926457][T19778] ? kmem_cache_free+0x65/0x110 [ 189.931325][T19778] __se_sys_mount+0x24b/0x2f0 [ 189.936057][T19778] __x64_sys_mount+0x63/0x70 [ 189.940642][T19778] do_syscall_64+0x44/0xd0 [ 189.945153][T19778] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 189.951054][T19778] RIP: 0033:0x7fef4d1a102a [ 189.955529][T19778] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 22:17:32 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x0) [ 189.975326][T19778] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 189.983743][T19778] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 189.991712][T19778] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 189.999681][T19778] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 190.007648][T19778] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 190.015612][T19778] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 190.023605][T19778] 22:17:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d006c676ea58689a300"]) 22:17:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x41) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x10800, 0x80) r1 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x116) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r1, 0x5f00f000) preadv(r0, &(0x7f0000002640)=[{&(0x7f0000000280)=""/7, 0x7}, {&(0x7f00000002c0)=""/87, 0x57}, {&(0x7f0000000340)=""/222, 0xde}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/63, 0x3f}, {&(0x7f0000001480)=""/49, 0x31}, {&(0x7f00000014c0)=""/192, 0xc0}, {&(0x7f0000001580)=""/150, 0x96}, {&(0x7f0000001640)=""/4096, 0x1000}], 0x9, 0x1000, 0x44) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) syz_mount_image$ext4(&(0x7f0000002700)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x0, 0x0, 0x1392431, &(0x7f0000000040)=ANY=[@ANYRES32]) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$setpipe(r2, 0x407, 0x81) [ 190.039183][T19778] EXT4-fs warning (device loop5): ext4_multi_mount_protect:292: Invalid MMP block in superblock 22:17:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0074676ea58689a300"]) 22:17:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 96) 22:17:33 executing program 2: r0 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x116) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x5f00f000) [ 190.121292][T20015] loop5: detected capacity change from 0 to 512 [ 190.136137][T20015] FAULT_INJECTION: forcing a failure. [ 190.136137][T20015] name failslab, interval 1, probability 0, space 0, times 0 [ 190.148792][T20015] CPU: 1 PID: 20015 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 190.158992][T20015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.169098][T20015] Call Trace: [ 190.172369][T20015] [ 190.175295][T20015] dump_stack_lvl+0xd6/0x122 [ 190.179954][T20015] dump_stack+0x11/0x1b [ 190.184107][T20015] should_fail+0x23c/0x250 [ 190.188522][T20015] __should_failslab+0x81/0x90 [ 190.193281][T20015] should_failslab+0x5/0x20 [ 190.197787][T20015] kmem_cache_alloc_node_trace+0x61/0x310 [ 190.203572][T20015] ? __crypto_alg_lookup+0x36d/0x3a0 [ 190.208859][T20015] ? __kmalloc_node+0x30/0x40 [ 190.213640][T20015] __kmalloc_node+0x30/0x40 [ 190.218178][T20015] crypto_create_tfm_node+0x4a/0x1f0 [ 190.223478][T20015] ? crypto_alg_mod_lookup+0x397/0x4e0 [ 190.228941][T20015] crypto_alloc_tfm_node+0x100/0x290 [ 190.234235][T20015] crypto_alloc_shash+0x2b/0x30 [ 190.239101][T20015] ext4_fill_super+0x657/0x78f0 [ 190.243963][T20015] ? vsnprintf+0xe8f/0xed0 [ 190.248432][T20015] ? snprintf+0x83/0xb0 [ 190.252585][T20015] ? set_blocksize+0x197/0x270 [ 190.257371][T20015] mount_bdev+0x1e8/0x290 [ 190.261744][T20015] ? ext4_mount+0x40/0x40 [ 190.266073][T20015] ? ext4_errno_to_code+0x110/0x110 [ 190.271284][T20015] ext4_mount+0x2d/0x40 [ 190.275442][T20015] legacy_get_tree+0x70/0xc0 [ 190.280117][T20015] vfs_get_tree+0x4a/0x1a0 [ 190.284543][T20015] path_mount+0x11cf/0x1c40 [ 190.289042][T20015] ? kmem_cache_free+0x65/0x110 [ 190.293934][T20015] __se_sys_mount+0x24b/0x2f0 [ 190.298637][T20015] __x64_sys_mount+0x63/0x70 [ 190.303230][T20015] do_syscall_64+0x44/0xd0 [ 190.307719][T20015] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 190.313614][T20015] RIP: 0033:0x7fef4d1a102a [ 190.318195][T20015] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 190.337825][T20015] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 190.346252][T20015] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 190.354273][T20015] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 190.362242][T20015] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x2, 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x5}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000001340)="84b219a8a8b6a5bac0a3893fe211e2fced6e7226fa30d4cbd134e80aa7cd4aa7b06017ca092f920d77fc8c2a1145efa942f5b111b47b5c7906cfddf8ab28bad69c9892857744157261c69f6ed67360c2838546d2e5a0d9071bdbff78e40bd08f74b948b91149919e09648d6382f055c46e568449af7f7cfdc8c8ed14287c9f64f99f0e7432f255f98ea9250fd662305dc7b8a5ea1dbe240519075bdccf5e42db79df485d1a3bf0db0b5da20fde524e0af622db2910cd888b0d147722786f4f27c208afcb7f070be3c7", 0xc9}, {&(0x7f0000001440)="b245f8b6c9e3dbf0a3690b6500838b2ed03ac58f3c2296ba11fa9db452b7220385faaa3b9d541b5148333020d283ab26615ab88d4f5575a4867bd895c284b9684ab60985aab866351945a1d3bc32fab902387d75ac3d0e398c8087a1f303e4845e0abff9813ac92b2b732a141683a6bafb7926bb4921bfa18e7da59201ac0afeb37e22747c98ecd01de9850fae04bad9e7a7c89f3d873ca2a0f718739b5cb150dcf1205bf7653c8e42904531f3cf", 0xae}, {&(0x7f00000001c0)="75e2df78a04c9b3d61c988125642ccf8a3d3a4466f144ad154d8ee51ad", 0x1d}, {&(0x7f0000001500)="12dd58a65459f619f4e98a1c263e80180897747ceaf69c1744bdfc36c5091acb3dc382e3288ada20ad1017f282a57b53eef75a918afff196b13dd8247915e70ee9743773a1a1a214cb5b3630e0cb5b98c3d8c64f63a31bb59c643aa18c2005ba37fd93b83ed5c8074ca262ae9563594ab9c59d28dcb00ed5ce8ad9b05cf5f6894d2adbcfb46cecd3a4476227431881f210ce00e5f9543ef80680287479ecc3cb6150fefb61c12eb9c05fd74671d76bd9634cf8a307d1f495cf304c8f38e8b3ef85", 0xc1}], 0x5, &(0x7f0000001680)=[{0xb8, 0x29, 0xacfc, "b50db0ad36d374c3eaa78366591e2799d0bc0e3045bdd59ebd2d7ffa9adc0d1f24d42ab100179adbd057ef4eedf4b3796f3cd9f48c8ee6c63ab5f01ce52021d561dded273f96f2fc04661b9f228be8970b2dc4a308e5a9e3c660c3288b0b210131d8687139599dabd8e0df97cef7f252f0f99fff32e3ebabcc814988eb493e473cef188bbf6139d0743e8bbd9bbadb9f52a598c0be56a5787098449cfe580941f3b69367"}, {0xf0, 0x102, 0x100, "88a6d8a72f16e0b15212ce0aa73c8104f4bfaba41056df0948e6b272e8bbb89f0b227cb4663896bbd2e0977d71bd759ced5317b20a62eae1315bf29739c691f09c4e18ab58706e64f2d049a13269f90bf25f8dca5bda29975f78aef146d5683f50f31cea3ab65a15b7ed8c07c563dd211b0b853a5bb9e7e9b541d43af61403c8684594cb3f7dbc2ddd7c62ed016c1728f50829a9117513f6753e70c9038de8c012e9198fc737af669761176c7b14ab448e716a52e6992bdad696e95b4601ed0179d22503af9b2225bd2e22ac8f71ca96995f0eead086bcd9fc7991f64afe2796"}, {0xb0, 0x10e, 0x4, "7c0cd5a352501b3c9c34d70213a2ae35a15e673b1b8c251b406e8894a6a8ca321ca00ac9bff47212a6ca3de154b8d6cb27b61890b0b97795604eb9dbb1163a28b20e0bac947eee6ec69769029dd15c5f009d37a9bb09542b29e0ba56044c8fc7be4be1f28b2f1978fe278026fa47154ec53f2a7f93d4daa7cc799eff228bbea2902fe456a3682449485ae34037828a30d94fd227b4dc1c7ccdb3"}, {0x70, 0x111, 0x7, "61fc6c6f1788610ead09bc156415dc87b4be4e8b49bf30d51959a9ad820cb4cc319ecec3964f633cfa990d1ac8708aa3ad7c009da1af0fbc37e90856918438542012d6a384261b4976f27dac7d10a043ea3ad372539a78b74d"}, {0xc8, 0x0, 0xfff, "89a597af4f2a08399e98be3b5e7ddfe0a51981e6da02725e2d69893d4d658d8d7ac7253f7f88a9c9ea98fd1bb0ee1212d8ad298c203a1f5413ff57d8eda9902020aff2ac2554c6e54dc9e64be724862e85ee0f7a0d69a0fbfff541ebaec0e8930f764b2eb4c4b57e9a147bd313d6f2202e3e61d84c5ae3596d7bac848893854cdcd07e096a72711478eb9cf6ae8ba0feae9379fb0a6322ae4b0d48c3a130342fd715defd4b1b22be5206a44afd4a851b6ff9cf73a0d905b7"}], 0x390}}, {{&(0x7f0000001a40)=@ll={0x11, 0x8, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80, &(0x7f0000002bc0)=[{&(0x7f0000000200)="bd52b1879a22", 0x6}, {&(0x7f0000001ac0)="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", 0x1000}, {&(0x7f0000002ac0)="f2df5dc11268057777359f19e39c97ddc5d9742edd6dffa83c4b5d315df0ff78b452746e26d794338424c08ec52aaa2212917388946a4f90467e95dfe613ab27f28a8c14ab79081ee8b888053a8920f699eff92465f79fc099c52a482c2856b73652056f7aa3a05b15d380c7caa4f3c9280c11ba383cf6f411486ecc243e55c66d82327fdce9f753695c7558b9dd89dd8981d1a6fa67a615da05e53fa9afcd3d6c5098a431d4b990bcc27f705a041d0f87d9db7613aabbe28cc901db23ae44868fd6ccd7fe71c0b27b5ce48f4a24eda2cd9f3356a1bfb0bb034573c2600727186f941b40def195b02e7997cd89d2f983b05d57ab27b31eb7df4a533b", 0xfc}], 0x3}}, {{&(0x7f0000002c00)=@rxrpc=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e20, @loopback}}, 0x80, &(0x7f0000002d80)=[{&(0x7f0000002c80)="644815613c0c02f175ddfbc0c77d7f1edc15a4a7da86fc5a05d1875a090cdfd15fcf8c6084883f5cb3a620c68cdad35b5ab9800f375050e5be3e65a34241745d93e644b1750327abef71573acc1e3012c21c4750c88d892c7a1298699a2045a4ee6bfdce4e9d3463a682a6fbd06f796600f17e2636caa5a2b4ab1dab9e2e8855cf91774b705ca9242304520b8588358e1e2633ce8280b706a5392f7fbc47e33f3c5e96685d8550f9ef16f7b96f2e5013291c65dab8321fb43de94e776efed559cb3880ae8f77510f4644984f8a539886ba9c61", 0xd3}], 0x1, &(0x7f0000002dc0)=[{0x70, 0x88, 0x9, "10d7aa082137b4119296c9f565b36ec36dbe9c2c215d563c29f67bd69990e033f402ca4d4c148600e66ca2f8f617a06b1240a84cb92f38067b7d048c1613cf266a9335ac2cf0522dce884f9049d2e6eeb08f61dd7ae3535ddf2f02756146"}, {0xb0, 0x117, 0x9, "6bb4166295219f3570fcebbc28aaa2418e8b093500a5925ff0301cf08c14ebbb8a6a12111eed95b3cbc6003052735ec228d02dc90d61e201fb6b410f6cb4608588c856449d29ba9c01489a953329e4af5ead2549a575825af415c6f46848aaff33ce90e7b50e4c53b9dffff17d300518c4940ac0e17c3f0a4c65135aeb00a1ecd87c3e15e5f0315435b530d317eceda9c924cd75d80b253e81224376"}, {0x100, 0x115, 0x7, "d2ba8fe5903ac4e3b7246c97b4d87c3f8ee5d6187a7eb8eb5e315fd73a0165705cb73265c27cc8a9f9164b0b5a45c6964bf70dd1f06350ffa2fb6682a41dfbab2e10055c28e5dba6881fb6a082d340a629921563ae18bcc5378e386e942cee53cc7a2c7f1c8f48562072e502a45134d9f5037e865d27c82b9c181e8a4cd1b280c46f7494d8f676896ef18d12c51b1dfdbef482572684b992cf12694997baa3e1bc3dba7b7b785fbd991ec3ee6c988612864e8345f910985ad4d321b5e8f167d68845763b668f82f1742512cc372a08fab23bbfb6ad4e8fb193ac9b6b8fda305ae240fccb8c492590a35697f628dc"}, {0x30, 0x110, 0xbbc6, "2f53fe0e9a4365b5f1c5f71e6862bc333f6eef602e0e19254deec0"}], 0x250}}], 0x3, 0x880) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000240)=ANY=[@ANYBLOB="ff22b6d1477675c28c13c6c2c44464c8dfdda0c0d5d2023e377bad941feadd3e6ecd8d914f66e735ab1bec70540e7765da711aed3f3bf4a70bf51b1dbbb19901f4d84a0fac457f265e3896668decd17ddc04d26382c09618db07b089bdd37290701e31caa91275473a46b3fbb7cdf629a87e1c0c68079cc3bbe9ae711f4a8a593305004d6c526a95536f014437020000cf48e29c90dd165308acd56e287d73856b9a28d3fda9f7ebbb80b854816d8f26316d98d94062b626b87944a679e24f968ca560ce3ad835aa2ac38a6cf3"]) rmdir(&(0x7f0000000080)='./file0\x00') [ 190.370209][T20015] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 190.378333][T20015] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 190.386455][T20015] [ 190.389543][T20015] EXT4-fs (loop5): Cannot load crc32c driver. 22:17:33 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0}, &(0x7f00000005c0)=0xc) r2 = getpgrp(0x0) r3 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r4, 0x5457, &(0x7f0000000080)) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r5, 0x5457, &(0x7f0000000080)) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r6, 0x5457, &(0x7f0000000080)) sendmsg$unix(r0, &(0x7f0000000740)={&(0x7f0000000080)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000140)="e9f109cf929c770f45ceed73b71ae37e9ad803cb7968e638b1800b200c9a121ae47c7d3604a93e1e76130fc817014e7f31c93c30c9c998a4a6a2b5c330013bdc35f54963dfc3e0f5edae8ffc2bc7da6179ef1c575ec2ea8d9cb9e2e84e17d211af74490c96fc8325d1f425900267bf63083c9bd858b9a5c15332d1df65f037e229a185d117e0b58d", 0x88}, {&(0x7f0000000200)="c2e2957e407cf89d1d5def47da4bae5a0e2f1d0f037c0ac98e7b6b4535e354bb44c81e789588374acecb2485fa6803c7d14251eedd72ca886b009eb745a5a9791858afaa58874a9c34ad3fd19bd343bf40ce71f1538a0f04752be5092a70241654ec0bf3fd442b7760387bef3458e0cfc88913f57b628d96309e3ef3b539789a5f9897c82c25551d5e2fbfced2a9008a7107cee1d26feaf6cec0eb71b1abf1eda87c2bc7668469fd653f31d4d5145512346b3f52c10a93c12594d61c9def8a", 0xbf}, {&(0x7f00000003c0)="0a76ecf376e250b43f2df8156d105009abe98124d6fbdc79064c446a4760c07ee0aa511acd724e127f62f2667fe96ac48572beb98b1d8bef6a593db3c290d8f4f46be3fc91d9101a462144c71d094f402315d6275656e76231aea5d8e5a10be59e7c299627b3b709a92f8745161738c9eea48d68898c4b55d287c0e05609bb44f499a54bc879c7", 0x87}, {&(0x7f0000000480)="b5bf3e536972037ccb45c942cee4dea58062081b5efb89fcec827519c546dbfe06e88b6dc61f5ee04db639ee4285389a8e84ab97271736fc4467bbb7367dd23a3bc0f5d4000496860ef0f2f555e849bb1883cddbcfb9f5bc9fe0fbe9412cf5400dfddbc9d2b2e6d0c1aaf1d69d1097caa26628f092e299e046eff4303ba542fb4877a72362c00f9260ddfd4575ec2c4f72c603e1c76bec2a845a28a275445f3efec476686c5b91fa8ecd970377f7509ed9067548006c1204a488f6bbe654870e00df6985c1da2fd1a0d946f5b8d4fa3b0ef3561a35171a858fc543", 0xdb}], 0x4, &(0x7f00000006c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, r1, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xee00}}}, @rights={{0x30, 0x1, 0x1, [r0, r3, r0, r4, r0, r0, r5, r6]}}], 0x70, 0x40080}, 0x240000c9) socket$inet6(0xa, 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r7}}) 22:17:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d007a676ea58689a300"]) 22:17:33 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:33 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x0) 22:17:33 executing program 2: r0 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x116) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x5f00f000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0x9f, "dea81647c2e688dad2b55e15b7b2a0bd8ab97fbab42dc8beebee3e6f50b424218396d2dfcc4bbb6420388ce77da75d6d1149be2da0812faaf27036db88088ed66b8f61983adb6032d44dffa0c1d3faf09f145680c3bdf18433883f9b5410692d340916b6381110eb2d6b54ccdd369b2bbd09238225b5103725528e75ba0788272e76a19700edd9cc51ee7e84ec6ca9994515077ea852b07f16cd28281dc51c"}, &(0x7f0000000200)=0xa7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 97) 22:17:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@getqdisc={0x38, 0x26, 0x200, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x6}, {0x0, 0x6}, {0xc, 0xe}}, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}, 0x38}, 0x1, 0x0, 0x0, 0x4040081}, 0x40) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') 22:17:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d00000a6ea58689a300"]) 22:17:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000256ea58689a300"]) [ 190.588092][T20119] loop5: detected capacity change from 0 to 512 [ 190.645113][T20119] FAULT_INJECTION: forcing a failure. [ 190.645113][T20119] name failslab, interval 1, probability 0, space 0, times 0 [ 190.657787][T20119] CPU: 1 PID: 20119 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 190.668108][T20119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.678218][T20119] Call Trace: [ 190.681493][T20119] [ 190.684411][T20119] dump_stack_lvl+0xd6/0x122 [ 190.689004][T20119] dump_stack+0x11/0x1b 22:17:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0x0, 0x0, 0x108ac20, &(0x7f0000000080)=ANY=[@ANYRESHEX]) r1 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x116) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r1, 0x5f00f000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001480)=0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000080)) r4 = fcntl$getown(r0, 0x9) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000014c0)={{0x1, 0x1, 0x18, r0, {0x0, 0xee01}}, './file0\x00'}) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000001500), 0x8000, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000080)) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000080)) sendmsg$unix(r1, &(0x7f00000015c0)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000001440)=[{&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000001240)="d4c35b87ffd00cdc360450ebefb7dfbbaf4e386fc88eb443684b10fa636d660f0fb3f5c173faa65a2ffbdffe4fdc8989cb5692ce9de990ed2e221495027f73dc0a1390871c10e5bbb5c2f1ce7e6e464aa73d84a9b8122a6798c9602dd5cea879f7b5b9f4ce4a945017c1d26931b26cad3affc8ccfd84f79319c5e1389c7b2f829095c57aa5ba9880ba139cf8bd8a5cdbe15f01a37d67946ede3ba107dfcb585f4413aee4049fee4abb3f01f13f15875dc851aeac4e", 0xb5}, {&(0x7f0000001300)="401a003404996d28772098355fc923dbbaffe3deb2c95bc857f3ffee08ed1827bc28869552b83d1ade731f3d56e7f03937da2a5c93620ed16e1b22115df73d", 0x3f}, {&(0x7f0000001340)="d8f81bfc16bab6ff45bc7b15ea65ad40fc8833b37c7975dc2d75a937c9fa51cd1ca98e10c3ea89b2fcbf8dba8c1fbd7b68c4806e90accfdd1805e340869e534af3b769e9be10b39f1c8f76d92d39c7a15263efdd67dd21b5d138f7795446694487f5c0b358b93db4bb5a7903f9dbd55740e18212321465a15203fe34b57f7f1bc04285bb0d0747ae0484befe95af2bc86a576d8d3941c61db594a2e058538179af9842f0de1d293affac337896774a8f67148d9d59854e3224d5f3c0ab6dff3e723d605071f471e4043bb99f88535de71e875538397f2dd1fa16526407", 0xdd}], 0x4, &(0x7f0000001540)=[@cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee01}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r0, r3]}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, 0xee01}}}, @rights={{0x20, 0x1, 0x1, [r0, r6, r7, r8]}}], 0x80, 0x4040000}, 0x4008097) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000180)={'gre0\x00', &(0x7f0000000140)=@ethtool_sfeatures={0x3b, 0x4, [{0x9, 0x5}, {0xb9d, 0x200}, {0x2, 0x4}, {0xfffffffd, 0xc4}]}}) [ 190.693217][T20119] should_fail+0x23c/0x250 [ 190.697625][T20119] __should_failslab+0x81/0x90 [ 190.702428][T20119] should_failslab+0x5/0x20 [ 190.706962][T20119] kmem_cache_alloc_node_trace+0x61/0x310 [ 190.712706][T20119] ? __kmalloc_node+0x30/0x40 [ 190.717386][T20119] __kmalloc_node+0x30/0x40 [ 190.721931][T20119] kvmalloc_node+0x81/0x110 [ 190.726473][T20119] ext4_fill_super+0x3193/0x78f0 [ 190.731411][T20119] ? snprintf+0x83/0xb0 [ 190.735576][T20119] mount_bdev+0x1e8/0x290 [ 190.739903][T20119] ? ext4_mount+0x40/0x40 [ 190.744286][T20119] ? ext4_errno_to_code+0x110/0x110 [ 190.749544][T20119] ext4_mount+0x2d/0x40 [ 190.753697][T20119] legacy_get_tree+0x70/0xc0 [ 190.758283][T20119] vfs_get_tree+0x4a/0x1a0 [ 190.762691][T20119] path_mount+0x11cf/0x1c40 [ 190.767187][T20119] ? kmem_cache_free+0x65/0x110 [ 190.772040][T20119] __se_sys_mount+0x24b/0x2f0 [ 190.776740][T20119] __x64_sys_mount+0x63/0x70 [ 190.781354][T20119] do_syscall_64+0x44/0xd0 [ 190.785766][T20119] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 190.791699][T20119] RIP: 0033:0x7fef4d1a102a [ 190.796169][T20119] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 190.815870][T20119] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 190.824284][T20119] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 190.832286][T20119] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 22:17:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2500000000000000, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 190.840252][T20119] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 190.848231][T20119] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 190.856246][T20119] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 190.864223][T20119] [ 190.867569][T20119] EXT4-fs (loop5): not enough memory 22:17:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0002676ea58689a300"]) [ 190.875369][ T24] audit: type=1400 audit(1639001853.822:280): avc: denied { read } for pid=20240 comm="syz-executor.2" name="rtc0" dev="devtmpfs" ino=219 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 190.898892][ T24] audit: type=1400 audit(1639001853.822:281): avc: denied { open } for pid=20240 comm="syz-executor.2" path="/dev/rtc0" dev="devtmpfs" ino=219 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 22:17:34 executing program 1: unshare(0x40400) unshare(0x48000400) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000004700)=[{{&(0x7f0000001900), 0x6e, &(0x7f0000001d40)=[{&(0x7f0000001980)=""/235, 0xeb}, {&(0x7f0000001a80)=""/217, 0xd9}, {&(0x7f0000001b80)=""/133, 0x85}, {&(0x7f0000001c40)=""/199, 0xc7}], 0x4, &(0x7f0000001d80)=[@cred={{0x1c}}], 0x20}}, {{0x0, 0x0, &(0x7f0000002ec0)=[{&(0x7f0000001dc0)=""/4096, 0x1000}, {&(0x7f0000002dc0)=""/240, 0xf0}], 0x2, &(0x7f0000002f00)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x100}}, {{&(0x7f0000003000), 0x6e, &(0x7f00000045c0)=[{&(0x7f0000003080)=""/78, 0x4e}, {&(0x7f0000003100)=""/13, 0xd}, {&(0x7f0000003140)=""/130, 0x82}, {&(0x7f0000003200)=""/193, 0xc1}, {&(0x7f0000003300)=""/126, 0x7e}, {&(0x7f0000003380)=""/241, 0xf1}, {&(0x7f0000003480)=""/244, 0xf4}, {&(0x7f0000003580)=""/4096, 0x1000}, {&(0x7f0000004580)=""/40, 0x28}], 0x9, &(0x7f0000004680)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}}], 0x3, 0x40000000, &(0x7f00000047c0)={0x77359400}) r1 = syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000180)='./file1\x00', 0x631, 0x8, &(0x7f0000001600)=[{&(0x7f00000001c0)="153851c4bdd9136a4f2e14a5f932979ee59b50712b63c9b75722e3b1334aa90e72468187899665a7cc7cd8056b6cb477233cd573a65be13e3fd9a609802f24bd3f2258693eb897199466b21f73bc47ead1a49843c7ac31ce9c7602d6d015e3b4f49989347a0e07badcc343a91a67bfa3567a28c015b119d2e021c0dde18b8c61adcb0605174b7f55b04860d19ec8698f1cfbbe08f0100295c356b89a9c5353125809b13347a47c63b4230644ce625dc248190dac3314aea8cf1c29d3a76b5ee3fa21bfa834505df319e13eb32b776ad94e52", 0xd2}, {&(0x7f00000002c0)="dffb0f480cda2bae0379e8f2310701f84cf1466386daf86ae55df5dedd38445d676d4eb09e7801faa5a6515be2f15b1b1d6b185cd9beba83e9cfef95c9b6cde9321c9671e2fccb3291b2b9869cfaac5b", 0x50, 0xb}, {&(0x7f0000000340)="5ceeec71c75df76a745974276d8ec6c5951d40d55184c1eef099c5005da104c18abdb24b7da22a99e71413c7d70f2123a78d5f12483b1f31d85dba67f6", 0x3d, 0xa1}, {&(0x7f0000000380)="d4db33bc40558cf165e66f0afdc4120896c444b4bf42f867cfeeb035777ccd95232d4056bffafbf068a89aac93d57cb6e1bda8f59c02d85c00d82502a5f18c82e225e16f7940b0e3e641c24cb7da7fa4c24d2436a891432ba650807ccb6c4de9ab3780cc48af2f34a2d2eb1b4d464738a4e3dfdddeeac39a4027f239b8d9f7d6441d86fa7c3c5994183b9727049e9c359ff2", 0x92, 0x2}, {&(0x7f0000000440)="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", 0x1000, 0x5}, {&(0x7f0000001440)="dcbc2b2506756300b99910b9dc47f4495d7bdcada1753b59de5c7844df0d061ae294894d74a5", 0x26, 0x1}, {&(0x7f0000001480)="e69928d339b86783d1dffc8bd5079e9bab5d954f1a05bee539db19621b9f568aff7c13a1265e1dee172dcb3dbdb246b4950def45b0eaea7adbbcd07c70c65dfa1e9087", 0x43, 0x8}, {&(0x7f0000001500)="9caea8b15ed218b8a878fc5b3d88459fc0ca46160db3c4a5eea9a235f70723f6c564171423ce5aaf1c0dbc7f3e10a92e22848ceba55f85db468dab945d11350f7c57493fc5f7ed5785d7b9de698bdbbc0f591bd3adccf1b93b32e71173beb525b3290b80c906b1c8dab8defa1528d55ca1bc9cd0b83c1b18f24813f8ad9927c777df54354dd092bbddf0c9f8b053e9ae48857de140d84045003c3ef0aca31854593686240b1d98996a010324504a7c6d9d95468490b42af29d3336ff0640c78822eacc9429", 0xc5, 0xe24}], 0x20c80, &(0x7f00000016c0)={[], [{@fowner_lt={'fowner<', r0}}]}) r2 = creat(&(0x7f0000000400)='./bus\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800), &(0x7f0000001840)={0x0, 0xfb, 0xb2, 0x0, 0x3, "19f5bfc6ea877a1cf434b5de7982d30f", "0a98d669f6b890a254c2192ede432b60ef11b37f94104431e1490221b40bcd63cdfd43c70b5e24a9cb6ba2bf4a07d3401e31edf05a2221a7f3c6866a124049efa7cd44a52d6bc81aea2b2cad089191c938ab45dcceca2d458e8d66e629dbbe1478a8a3e084285ecc8565ccb268cf5e79005d1af99fa7fa456b258a99a3c2768808969064ed7bf63894517ec8137599e76c9582c9df421750cfd1152e93"}, 0xb2, 0x3) fallocate(r2, 0x3, 0x0, 0xb329) mount_setattr(r1, &(0x7f0000001740)='./file1\x00', 0x2100, &(0x7f0000001780)={0x83, 0xdc76d78097e63bc2, 0x100000, {r2}}, 0x20) 22:17:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0003676ea58689a300"]) 22:17:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 98) 22:17:34 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0004676ea58689a300"]) [ 191.503189][T20259] loop2: detected capacity change from 0 to 14 [ 191.509874][T20262] loop5: detected capacity change from 0 to 512 [ 191.528616][T20262] FAULT_INJECTION: forcing a failure. [ 191.528616][T20262] name failslab, interval 1, probability 0, space 0, times 0 [ 191.541309][T20262] CPU: 0 PID: 20262 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 191.551564][T20262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.561621][T20262] Call Trace: [ 191.564896][T20262] [ 191.567816][T20262] dump_stack_lvl+0xd6/0x122 [ 191.572478][T20262] dump_stack+0x11/0x1b [ 191.576679][T20262] should_fail+0x23c/0x250 [ 191.581123][T20262] ? mempool_alloc_slab+0x16/0x20 [ 191.586154][T20262] __should_failslab+0x81/0x90 [ 191.590924][T20262] should_failslab+0x5/0x20 [ 191.595423][T20262] kmem_cache_alloc+0x4f/0x320 [ 191.600206][T20262] ? folio_mark_accessed+0x34/0x380 [ 191.605487][T20262] mempool_alloc_slab+0x16/0x20 [ 191.610335][T20262] ? mempool_free+0x130/0x130 [ 191.615011][T20262] mempool_alloc+0x9d/0x310 [ 191.619512][T20262] bio_alloc_bioset+0xcc/0x560 [ 191.624275][T20262] submit_bh_wbc+0x133/0x320 [ 191.628918][T20262] submit_bh+0x21/0x30 [ 191.633012][T20262] ext4_read_bh_lock+0x184/0x1b0 [ 191.637945][T20262] ext4_fill_super+0x3667/0x78f0 [ 191.642884][T20262] ? snprintf+0x83/0xb0 [ 191.647125][T20262] mount_bdev+0x1e8/0x290 [ 191.651510][T20262] ? ext4_mount+0x40/0x40 [ 191.655878][T20262] ? ext4_errno_to_code+0x110/0x110 [ 191.661089][T20262] ext4_mount+0x2d/0x40 [ 191.665337][T20262] legacy_get_tree+0x70/0xc0 [ 191.669932][T20262] vfs_get_tree+0x4a/0x1a0 [ 191.674347][T20262] path_mount+0x11cf/0x1c40 [ 191.678844][T20262] ? kmem_cache_free+0x65/0x110 [ 191.683735][T20262] __se_sys_mount+0x24b/0x2f0 [ 191.688408][T20262] __x64_sys_mount+0x63/0x70 [ 191.692997][T20262] do_syscall_64+0x44/0xd0 [ 191.697503][T20262] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 191.703444][T20262] RIP: 0033:0x7fef4d1a102a [ 191.707858][T20262] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 191.727610][T20262] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 191.736024][T20262] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 191.744004][T20262] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 22:17:34 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = creat(&(0x7f0000000400)='./bus\x00', 0x0) fallocate(r1, 0x3, 0x0, 0xb329) statx(0xffffffffffffffff, &(0x7f00000005c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x6000, 0x200, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getpid() sched_setattr(r3, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000080)) close(0xffffffffffffffff) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setfsuid(r5) clock_gettime(0x0, &(0x7f0000000fc0)={0x0, 0x0}) recvmmsg$unix(r0, &(0x7f0000000f40)=[{{&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000ac0)=[{&(0x7f0000000780)=""/12, 0xc}, {&(0x7f00000007c0)=""/225, 0xe1}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000900)=""/245, 0xf5}, {&(0x7f0000000a00)=""/186, 0xba}], 0x5, &(0x7f0000000b40)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8}}, {{&(0x7f0000000c40)=@abs, 0x6e, &(0x7f0000000e80)=[{&(0x7f0000000cc0)=""/177, 0xb1}, {&(0x7f0000000d80)=""/252, 0xfc}], 0x2, &(0x7f0000000ec0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}}], 0x2, 0x40000021, &(0x7f0000001000)={r6, r7+10000000}) sendmsg$unix(r1, &(0x7f0000001080)={&(0x7f0000000080)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000000)="9f1a2ef4a039a2a15d72525fd24ca8e1d8aebeac0e690f635f13422e92ae1cde88f741fe1be5801fe8ad65cd", 0x2c}, {&(0x7f0000000140)="1b30f2df276e9493f121eae08fa8e3985c8064fd5972", 0x16}, {&(0x7f0000000180)="ce3d530459897ae8dc55f98b1810e4e8294bece8dd8d886037b15444bf614d1d285d289bb50e83d741f66a34eb4fada64bdf7de0e3fcfeadd87b499aa20fff73a910ef58711ae11687b5c45b676dd9964fdb9e9d4471ff3bf44c6a07b4663b256d66b89da044b2bc1e94e2b92c296c6a2284e132fe7ca48587d08f452365e5b403551109cb7657021c00a368b89215c2964db694426dfcc8a08f9cf93b49e6a56819b75cc46b85207c1abd3b0871a717a0965dcd70de9e2e7d4f6bde", 0xbc}, {&(0x7f0000000240)="9e7df463cb80d357cd6accd923f39aaf586decbcfd07874d81b5f121e5822f9b5673effa804d5ca13ad5c6fc9fd794cf7e76506bd58f6e0f2fbe151e7daf2be9d2a508c73c24d8bc8579eebd75c4489b755a999e0dc75a608087d8361fee53c774a1da1eb6a595a7287c79554e8d806cdbd3bcd8c6", 0x75}, {&(0x7f00000003c0)="88d1248ddf238780f69dffd32136ca1f79ebaaf9e9462562c9494fc03c4813f2c527e5ffe3d44dd5e6cc3b41007e7de793f2238cabb23a88807a7953e93a837b5cc9d505e295dbd67fdad83bd652d4c2d7a78ce81e717dbbf592281b38059145bb51dc84d4ebd29585a288a79ec343911f0c26e317fb96a6910ed9410ac1c853165f3edb5e40b33ff6e4ef0cd092666cf458bffc2a792d56a9", 0x99}, {&(0x7f00000002c0)="583df79c72ae0b76a8aca3b05c815473cafdebeea6f7b5e32c18c9dab490a8de7f175e", 0x23}, {&(0x7f0000000480)="24f0d7afea7b203db2e60b1524e9960568ee1b61b18eb9cbaca1a35fa5055b9fa8e25dae66eaf9e8adf8715a6f3c382e46844588feb62788e308b164c1732f20bd7871330da054883889fd8f24ffc97ab04bfc74b779a1e07d8f7c04cf269fdde9036b3167e231069d531ac6c3fcce1b207017f3b935fe32b9241e8e06de1f4446", 0x81}], 0x7, &(0x7f0000001040)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r2, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r3, r5, r8}}}], 0x40, 0x800}, 0x4000) r9 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r9}}) [ 191.751968][T20262] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 191.759941][T20262] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 191.767914][T20262] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 191.775884][T20262] [ 191.789835][T20262] EXT4-fs warning (device loop5): ext4_multi_mount_protect:292: Invalid MMP block in superblock 22:17:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0005676ea58689a300"]) 22:17:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0006676ea58689a300"]) 22:17:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 99) [ 191.804406][T20269] loop2: detected capacity change from 0 to 14 22:17:34 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) mkdir(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x100) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c759ecdf16fa41360daaea11492aa2cf1b6a799d98857f902eaee94"]) 22:17:34 executing program 2: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) unlinkat(r0, &(0x7f0000002980)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000004480)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000004240)=[{{&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/43, 0x2b}], 0x1, &(0x7f0000000240)}, 0xb1a0}, {{&(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @empty}, 0x35, &(0x7f0000000680)=[{&(0x7f0000000300)=""/167, 0xa7}, {&(0x7f00000003c0)=""/140, 0x8c}, {&(0x7f0000000480)=""/118, 0x76}, {&(0x7f0000000500)=""/152, 0x98}, {&(0x7f00000005c0)=""/131, 0x83}], 0x5}, 0x5}, {{&(0x7f0000000700)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/126, 0x7e}, {&(0x7f0000001800)=""/192, 0xc0}, {&(0x7f00000018c0)=""/92, 0x5c}, {&(0x7f0000001940)=""/121, 0x79}, {&(0x7f00000019c0)=""/101, 0x65}, {&(0x7f0000001a40)=""/150, 0x96}, {&(0x7f0000001b00)=""/113, 0x71}], 0x8, &(0x7f0000001c00)=""/241, 0xf1}, 0x5f}, {{&(0x7f0000001d00)=@nfc, 0x80, &(0x7f00000020c0)=[{&(0x7f0000001d80)=""/179, 0xb3}, {&(0x7f0000001e40)=""/200, 0xc8}, {&(0x7f0000001f40)=""/106, 0x6a}, {&(0x7f0000001fc0)=""/215, 0xd7}], 0x4, &(0x7f0000002100)=""/39, 0x27}, 0x9}, {{&(0x7f0000002140)=@ax25={{0x3, @bcast}, [@bcast, @netrom, @netrom, @rose, @bcast, @default, @null, @default]}, 0x80, &(0x7f0000002340)=[{&(0x7f00000021c0)=""/177, 0xb1}, {&(0x7f0000002280)=""/165, 0xa5}], 0x2, &(0x7f0000002380)=""/164, 0xa4}, 0x2c56c0b6}, {{&(0x7f0000002440)=@ax25={{0x3, @rose}, [@remote, @remote, @default, @bcast, @null, @netrom, @default, @null]}, 0x80, &(0x7f00000027c0)=[{&(0x7f00000024c0)=""/119, 0x77}, {&(0x7f00000045c0)=""/80, 0x5b}, {&(0x7f00000025c0)=""/162, 0xa2}, {&(0x7f0000002680)=""/48, 0x30}, {&(0x7f00000026c0)=""/198, 0xc6}], 0x5, &(0x7f0000002840)=""/1, 0x1}, 0x1}, {{&(0x7f0000002880)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002a40)=[{&(0x7f0000002900)=""/31, 0x1f}, {&(0x7f0000002540)=""/118, 0x74}, {&(0x7f00000029c0)=""/80, 0x50}], 0x3, &(0x7f0000002a80)=""/245, 0xf5}, 0x1}, {{&(0x7f0000002b80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000002d80)=[{&(0x7f0000002c00)=""/101, 0x65}, {&(0x7f0000002c80)=""/218, 0xda}], 0x2, &(0x7f0000002dc0)=""/15, 0xf}, 0x3}, {{&(0x7f0000002e00)=@in6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000004140)=[{&(0x7f0000002e80)=""/4096, 0x1000}, {&(0x7f0000003e80)=""/72, 0x48}, {&(0x7f0000003f00)=""/108, 0x6c}, {&(0x7f0000003f80)=""/182, 0xb6}, {&(0x7f0000004040)}, {&(0x7f0000004080)=""/43, 0x2b}, {&(0x7f00000040c0)=""/122, 0x7a}], 0x7, &(0x7f00000041c0)=""/83, 0x53}, 0x3}], 0x9, 0x40010001, &(0x7f00000044c0)={r1, r2+60000000}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000004580)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000004540)={&(0x7f0000004640)=ANY=[@ANYBLOB="340000006600200029bd7000fbdbdf2500000000", @ANYRES32=r3, @ANYBLOB="09000f000e00000006000f0008000b00d922000008000b0000000000f809c52075dd24bbbc805b866f3be874cb6dfc55bc6dda8378a539cc8006f71d9b26f10cc8a01bdaf1cc64c5d89430cd7f22274ccf172788fe4e3bae29a783403d1530332be44b4b9078f9a9d1d12b4feae08d1d7ad2e009f479f0009f7a3d6c441546d8ef1b5ffdd10aec64e1476245b4fb53e9ff4f6e4ab61dbaaa3b"], 0x34}, 0x1, 0x0, 0x0, 0x6d9c03c9cbf1d2f3}, 0x4000040) removexattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000002940)=ANY=[@ANYBLOB='securitY.\'\x00']) [ 191.868201][ T24] audit: type=1400 audit(1639001854.812:282): avc: denied { read } for pid=20266 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 191.923936][T20389] loop5: detected capacity change from 0 to 512 [ 191.940621][T20389] FAULT_INJECTION: forcing a failure. [ 191.940621][T20389] name failslab, interval 1, probability 0, space 0, times 0 [ 191.953396][T20389] CPU: 1 PID: 20389 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 191.963544][T20389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.973593][T20389] Call Trace: [ 191.976862][T20389] [ 191.979947][T20389] dump_stack_lvl+0xd6/0x122 [ 191.984692][T20389] dump_stack+0x11/0x1b [ 191.988883][T20389] should_fail+0x23c/0x250 [ 191.993478][T20389] __should_failslab+0x81/0x90 [ 191.998615][T20389] should_failslab+0x5/0x20 [ 192.003190][T20389] kmem_cache_alloc_node_trace+0x61/0x310 [ 192.009018][T20389] ? __kmalloc_node+0x30/0x40 [ 192.013770][T20389] __kmalloc_node+0x30/0x40 [ 192.018277][T20389] kvmalloc_node+0x81/0x110 [ 192.022807][T20389] ext4_fill_super+0x3193/0x78f0 [ 192.027998][T20389] ? snprintf+0x83/0xb0 [ 192.032155][T20389] mount_bdev+0x1e8/0x290 [ 192.036649][T20389] ? ext4_mount+0x40/0x40 [ 192.041041][T20389] ? ext4_errno_to_code+0x110/0x110 [ 192.046240][T20389] ext4_mount+0x2d/0x40 [ 192.050396][T20389] legacy_get_tree+0x70/0xc0 [ 192.054992][T20389] vfs_get_tree+0x4a/0x1a0 [ 192.059425][T20389] path_mount+0x11cf/0x1c40 [ 192.064082][T20389] ? kmem_cache_free+0x65/0x110 [ 192.068982][T20389] __se_sys_mount+0x24b/0x2f0 [ 192.073657][T20389] ? __this_cpu_preempt_check+0x18/0x20 [ 192.079283][T20389] __x64_sys_mount+0x63/0x70 [ 192.083870][T20389] do_syscall_64+0x44/0xd0 [ 192.088290][T20389] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 192.094275][T20389] RIP: 0033:0x7fef4d1a102a [ 192.098690][T20389] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 192.118296][T20389] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 192.126708][T20389] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 192.134692][T20389] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 192.142655][T20389] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 192.150675][T20389] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 192.158645][T20389] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 192.166614][T20389] [ 192.169716][T20389] EXT4-fs (loop5): not enough memory 22:17:35 executing program 1: unshare(0x40400) unshare(0x48000400) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c4139909265e15587fca777d663de0c61dc72195bde12b1ddb5ad22de8a6d736f10361fafb20f915cb437a5843812b29138e02a81cbe9a1e7efad9b20ccb1ab1785661b87f59205afecc47022b53ce8f48179517123c269364427d53ff5617eb0f68e521d6a84264077a987c9c4a57613cd27464ebb962f9c9967da2deb310cc0b8e8e0d902a3c05e1c3d985699eb06fe0c07e1e5f74aa63e30ea5924c012cfd53c15727d28ff3db5d82dbe0c2175f59b146873"]) poll(0x0, 0x0, 0x1ff) 22:17:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0007676ea58689a300"]) 22:17:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="e4"]) 22:17:35 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) (fail_nth: 100) 22:17:35 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = creat(&(0x7f0000000400)='./bus\x00', 0x0) fallocate(r1, 0x3, 0x0, 0xb329) r2 = memfd_secret(0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000080)={0x7, 0x0, &(0x7f0000000000)=[r2, r3]}, 0x2) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) r4 = socket$inet6(0xa, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x30081, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r6, 0xc0189377, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4, {0x1, 0x100}}, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r5}}) [ 192.848150][T20400] EXT4-fs: 46 callbacks suppressed [ 192.848164][T20400] EXT4-fs (sda1): Unrecognized mount option "ä" or missing value [ 192.848722][T20402] loop5: detected capacity change from 0 to 512 [ 192.867884][T20405] EXT4-fs (sda1): Unrecognized mount option "ä" or missing value [ 192.880674][T20402] FAULT_INJECTION: forcing a failure. [ 192.880674][T20402] name failslab, interval 1, probability 0, space 0, times 0 [ 192.893430][T20402] CPU: 0 PID: 20402 Comm: syz-executor.5 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 192.903632][T20402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.913780][T20402] Call Trace: [ 192.917056][T20402] [ 192.920042][T20402] dump_stack_lvl+0xd6/0x122 [ 192.924656][T20402] dump_stack+0x11/0x1b [ 192.928831][T20402] should_fail+0x23c/0x250 [ 192.933251][T20402] ? prealloc_shrinker+0xae/0xe0 [ 192.938184][T20402] __should_failslab+0x81/0x90 [ 192.942951][T20402] should_failslab+0x5/0x20 [ 192.947457][T20402] __kmalloc+0x6f/0x370 [ 192.951621][T20402] prealloc_shrinker+0xae/0xe0 [ 192.956386][T20402] register_shrinker+0x18/0xf0 [ 192.961141][T20402] ext4_es_register_shrinker+0x19e/0x1f0 [ 192.966831][T20402] ext4_fill_super+0x439b/0x78f0 [ 192.971776][T20402] mount_bdev+0x1e8/0x290 [ 192.976104][T20402] ? ext4_mount+0x40/0x40 [ 192.980549][T20402] ? ext4_errno_to_code+0x110/0x110 [ 192.985747][T20402] ext4_mount+0x2d/0x40 [ 192.989918][T20402] legacy_get_tree+0x70/0xc0 [ 192.994502][T20402] vfs_get_tree+0x4a/0x1a0 [ 192.998927][T20402] path_mount+0x11cf/0x1c40 [ 193.003430][T20402] ? kmem_cache_free+0x65/0x110 [ 193.008341][T20402] __se_sys_mount+0x24b/0x2f0 [ 193.013042][T20402] ? __this_cpu_preempt_check+0x18/0x20 [ 193.018660][T20402] __x64_sys_mount+0x63/0x70 [ 193.023251][T20402] do_syscall_64+0x44/0xd0 [ 193.027671][T20402] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 193.033568][T20402] RIP: 0033:0x7fef4d1a102a [ 193.038086][T20402] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 193.057732][T20402] RSP: 002b:00007fef4c915fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 193.066172][T20402] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fef4d1a102a [ 193.074181][T20402] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fef4c916000 [ 193.082148][T20402] RBP: 00007fef4c916040 R08: 00007fef4c916040 R09: 0000000020000000 [ 193.090180][T20402] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 22:17:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000000140)="368b04ca37e93ddf938571a88cc045a0a3066467a9e7c71baa1738f5de6ac56300224fbccf3e67dae5675e74600a1c248fd9438200b4e2219eda52101cb6c085c11cb10b7d8854d91fdd276ee0e32287bcb634fba6dc5c73f4d629ad7683d0e1c5655613d99b1b2dc57920a70143ac6b70647f6320c0776dbb94688811fefbbfcdecfbffe073a8d77b355c813603d6b29511e26286b6b3c1be3db03720a4f1bb2655ba3993a486aa87b50bf277b2f1f28ddc2ae3b8b7c5abde53d479ca5d99c3bf96f6d7b0656cebf0fa54b59088c18d29dbf955dc7f96096e5ecbb828e0fae3f2f31f0794acfc96833d1c65d372fec5f97ac3a63c8981f61012ebaae1ffa0f2774037e086ee6d3b3f132ce10a3c2849dd5d2861b9b7699ee0982e3c20720430ffffcf61470f2404b26c3b3aae20d7cd3deef3506c30ce402909ca0b2f7be87dc96875ff1d35808acffa1fb92b2b06cb5d8bc473087ebe2545d6eeb6096c1906bb899e0cf2f3df3bd35d202ffb906059dc17b1d36d93a2ae6be5a5763e400d629bfa0eecc7f2ce90bf7d54380c1d6f700bf662ee2b4821df94da24ad80017caca42acfa95b907bd4379b626bf4a1ff782a623d2f059a9ca445ada717ba17cecce35a41efbc4ce7922a017b2049e18522c10ed2a40157e9ac28062a87e075d40d1ea2d5a227adabe6f34eece932fbc103d86be420a60ee969da9883f555efd1fc970466288883ebc6ab0b66d5aa306eeba895fbe21c7361f6140162f05aedb19e33cdea731e27b4be5b4d72b1b5c6acd1b1e50cd6e3253b0f06d02b6fcccba89b3bf52ae146374686b1010beb5880de46e38c76578f5a5e9b0d62dd80dbd9b83c566255fc5c465d51abb77f7b774e0dbc0d1ff047f4ba0f8a520c52ff99c0f3617b2cd38012d46d8715ca5906815a649c3bde7c0fa1a9136c6b128e70efcda3308cbd01e077802241bcbc490590a3883862d8267585b80470aa6048d8efc483c5dd817616ca20c7611d6555a85a67823e3062bd61b033b9a22793898c1f44a1530ebd0db318aa2f64e28487618bb628691e01055b59da6f6924a4860c8d24b6e75892a578c52db8701fe58bfaa747e15fd8c1e71edf4d2eca1a7f85303343f32e829e6cac47895e52f169b6f2781c7bdb792c23c7f3b530231d27059b92b0aa9ec4d1eda182e0bbbe4d2235fee2ca91a115ff9b666ac72e56999daceceaf97356871b6dfd45fc969eae3943e7bd0322959a7fc40fb3c6e43dead9f4a0ed7b7f0cbbdd80375619bec2f78e47001f718e31506f7c40b1e0159791dfd689826ad82d04b1de9a442133e3678bcbba9bf59801bc50300a5e35a56818ab725271a9a944c201e5186965f3d8cecb8f4469501e5fdc8f55e3a96dce3347c3dc93e868c91d393f4f84537ec479207bcc96aa8eb5ad4970ab39fb3a89c43e063108620763cd94eeaa60ecd5aea60586107aad8d9ce14a95c2aa1261d1fe1ec6fc45127513c4b919b1a36bc7e059cb95a0ce12b965b53c55436e04313686581cf096684d299a7d4ecf4a749e9c24710910389653b3820aa9f193af6b4a9557d0188beeb4c628a57b2724e9558ed961ff72561d59e51ceb82fd8a70a7f3aba010299ed46ea1566384f3e2366885408a5c8aa966994c30f2c8b3645d9228c59222fe13ccc70cc9267a50c378f766c6989cca2e0960b0bcba7b086df5a3bc4145440ca7935331ef63124c8d50bb87501f9726e9a07f65b763b248dad379ef45e421ca29055db2998bb01067b817f4e4fda0c95dee4d0405fcb54ef02e67eb2f8baeebbb634dbf416a4b5023b91e7c4680870bc1abeb3fc6a5ba633018f04659074d5f003e30527a63c0ac8ccbdac3ef63736e56ac94b44427767b62d7256a08ed5522bf13b30c737349085c183395180be07d7b4d90b6489b82a92824e407c1c8f8159d5c4c3b0c15af21b7c068dc697ae2cbc0d2d0139fea8d9a0772181fa859e72fa69a118767bb582f4513cff9e4145703a2ba50491a82864be698668ba26790f81c5911381101df693545185075e8c821e0de5d6922c8c2e1bb8aa64dff644489b5287db638d728784e6a8b426b7b892bc9aab6e9cc6f2721005435f9722a133714651f8b2194e4ea9ff3923be6d42b21e99a938e020908f0c147cdae85c4d3294cc8c77b09b6db509312624a52ba576887b0fc4e7b929b56af595e8694f2f2da7d6b552f02c78bd3cd950cc814249791c8505c902f09b8a455f9990d0ab23f0757be76b2ed8477fbcee19b9e8a83b9ebcc4ec86056e41e820496a2f7d41f3ce9e082b15d4b3646e395fed38b0c48d972c32af92d85a2d75a34189266fa2f7628de36e694cdb99c3106ce5272eb3efab5415f00c6c3bcffc633764956510104ee6befe3eac66951d0c085358bfdab77c98e700d9342baf37318a18faea84600530f94a5860f9df0e6ca101880afffd79ba60f0d99a1bbd5b2e9f55d36e27ba52700374b0c4d50630a5769d97584cfb5bd9eaeb2507ee9474947311c57cd08d23eeeb1a75cb57d5acb68b8ae9446218e0233ac79833685bf494537cfa49097c6fefcdbe2ecb28edf28a76be0afa52c18dc7afcd10c93b41065a7468451ac35eec1972602f61bdf1a205c6cee7e0bab7c9df5a5c37bafa3d2672a35cccb2a396f744f1a0e09cba235413b2212e9785c2afe94cbc27803059a76fc86442d935aa7d9b1f37d7490464e64250edc81c96e9ecdd572ea2abc4334fe082b395a5f4060b9c8f56c74390dc55bdf660b6161327e7f3bfba62b8649127af5a48df653f5c11426dbab19a8f2dcaa34817df8288b12c025dfa744709d38f859e330c1da962e7d35b7977555faea1ac5b8ee424a397e48e15081668ed39c4aa2bef57cdc15c7d117afe6c3515e537d8e6082913f9529b21c4b1bc925785e15560f06aef88bab442ab163b15b5ffd0db3d0793a1f1ac28fa8b2c4ae5bd9afe07ddc6453d9b8642d429a88f2a1779faf5939816b25d757d85c2ab5050024cfdb682a1b7442ded4c865bc21cd328af3667a8c801f8581a1f7254b698a9c66f9e49a9aa8a7db6b36a869eafbc43f8ed9670c084e59512aec702a0e83ac7e49eba45ebf1be6330975f68c4b25d8ae333f03dfa4c9c3de182c2d089056c3585890c9f1815ee0809d1b5e02ed59f262cd2ca878c9309a3e2d68843f1f0931bc7f4c10c3c6e778289fb4f0f70b7474fe0dce3ec7ab551cffd44b70dd367e5b3254c01d910f0e40434e27ea38c53b48cfe0a45dcfd749f22754de56422443297e45d16b1e1e0e2ad840e93947c1d22b67165e29266e90b5add0265154384a056c3011e70210075cb5c541c2c7f4bf11ffbee307495652e9228e7603dbf4eb07dce9c0e7e075904f73f815458a03876a835aef389417be6296d1e10875df3f5752f2d3399d4a3011b64c809ed207371b187b8fa04f7b4a4dd3f447b1a53bf78e7950f480ae915afa8e40eb83972d059f8b986a47114c3d2692b0a76a9b4fc7d57b819b6939ac6ff4fc4d8d7b48169a21658e9accec046bd63cab9caf2ac5655cf7fd44292fbcf6c3f5e6061977bd949a780ae3721f9f47b1e6c76d8963e13630b8330bd7690006b55d608e146549aab869f7afa0849d717072c2ce63e5dff1c291e25a9a025ccd9de8e8690431ed3eeb1b5bef06ed9c1636b6eb000e18ee0642c8a00eb70d57306a4bdc4d5c09ecaea0ff574bd7a0f1535195340d2313485a4ee59c0886c53ed32ffee9608db2c2b83c652f664e476207d0e59daa3291a6cdace2e26f45479ac5b7ed41150cb9d8909bb650ff87091784502b78dc285196b693f5c75c0c7db4cf24063821894b2e2e980519ff4db930fc80d2e61947ad4c3205c35b74d2722cc07f0566790c26bd1cfa606fe816f5bacbf5759e44b2c6b1a037875f72356794ac46427254069a2689a5ebd16550317d1548eee1573027fb6912e363ae41313a867bbb5bbdf9d589bae564f836eb7c33c3e4ce898e96a4bc0c0311f9c1a122e27df20d8d21d1513fd1538fbe8bd26332f70cca506da8243a1efa6b676cb3ccd4153fd66adcf71a8d63044f97ded5636273303f964d2a928847e0f4c075dce6ae3197a0bd1e45e84f912a2e8af9d85d0f31fa84dc3fa3b1f5eb3782379b856c568de010ced6f1f463d135c3410b95b4d84f738713936a4504ddfdccc837029810733a156d3ba31d10a8b551d8cfa663d09df1b37c3bfd7e36350a81c600dfc34a7f7078e82ca34b35b6b65fb39308ea318e5750e76feeeb66146fec33a8866026cb8242f53c17bafecdb8b216ffc1b1b1e27f3a8a23fa4191b403f5e05113e28b78a489d965ee5e2d9bf5aa4eabbf8e6f61182c62c659499d5e3566ff617097eb27c0325b04d6ad3fdd7291acc6ada68db9b99daa3d4c96b69bc950d3e7ba8f5af5ecf3d169e566b8d496054eda8b531486fb0643f43fd950be1c375b6f48d56918d090cdabb3743d41b0d8a460f979581ea3596f200425da11220c8925fb352bad19e3ede17190f0e10692723d8822838d43cb11ddeee0faa699d5d2f918ece5429a50d5709c56f3a4dd54179fd7f4eb62096f23904fec785e8e515a5f95e536009bda1409edbf36739a3ae8154842ca1a650d231abd4918e19998cff9dba2b0e87b9866f328c77c02cbbfebbbb29de476f6fb1e1e8eae7091c2800f237d7580d5e8b75c146f286f2aba1cf42e0b43de0b4a8aa221133a91325f501e211dec4fef677fa56fed166697bea54f15572a63e19d5f770dcb884d7664d104e12d4252d4fb2cf2b0d772205c879ab6241937a5a2e3cd4a0291e0d0cab8f9b3900cc6da8f4157c43dc9c9933622156e46eb7b994ee65a1e64506f804152aa994683dcf74a2c317b407243f62da1e1975c882e2c38776a509605abafea4c6efe25095d37c363ada709f87c44fff631b3a75d7b601581319e0002259ed3999dc9f48686258302c68d68799f7da28d194b32bca4163184781ab7bbe3aa6df5d1d66d829ecfaa2a34e4150f211b4da5daa464aeb3f123708f2bd1382da579ce93f7ee53c3111f8b6336c23b9e5625e39b4fb5864d13718865f25992a65e7aab801cd4f155c34f8432b6466d48f1479112e4270b4e7aa63f4eef935b542bd583f24ed5757ef5e523939b8ec8c95506297bd1c693de24d20e8550ecf16926235267ecc906a4af492bbd333860be7cc57506a4731f7b27f3bba31e1d876627c99c2276dfddd7a35981415ef5118f4cf3d3ff7047ec1095b1e8d66fc7d729dfbf7e74c851ebe323182b48d335fcbd8045ef9b498a791ee332c9a7a2e7e2493a613751a0fb7dc79431a54fdc517440664eac3efec36ddea5c9dd72e7928e53b1a0ae163e4767e852301471598b47abc5b100670f5f8f062b13753b12d3f50ac7b52277d4bd5193f68c7446ffc8272bd282cee532cfe23f261a8eaef486afb4fde5773efae59abd4dae4c9c6fe018c91af8b493966517bb70295da74c748f862a8adf600cc0c9bb36f63ea642185bd756f6956fad00735af4ece041b1293c385b1886389f4e3c13b40d8a6b9ac0156093e1404795f70de5b0f9d4cedf4673f1f1db169427c25f6e6a8f7361120b34edfee66eeb38ce0941b840b8f84f2a7d5f06b1c5d7e09d8a3fe491ddda874639f785665a3499e189908607e6754a6516cc88383fa32c555053ae258a8ee56bb0767f5c76a6988b7716157a8bc4b32dc1f581b9f94684819f6528d2fb58b359d6848152824673c7759420c99a65075f37f6961120ff8d18bdc6c98fc11d440a4f3a09bee6d6", 0x1000}, {&(0x7f0000001140)="b1a878be124602edc5ff6b1f98d9b95508c228e11c176e262d568afec371b789b1eed12767532ac4c33610ca8b011803e7669a5e41bc5c96aa", 0x39}], 0x2, &(0x7f00000011c0)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18, 0x40}, 0x0) [ 193.098159][T20402] R13: 0000000020000100 R14: 00007fef4c916000 R15: 0000000020000040 [ 193.106179][T20402] [ 193.117007][T20403] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 193.137999][T20416] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value 22:17:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0008676ea58689a300"]) 22:17:36 executing program 1: unshare(0x40400) unshare(0x48000400) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 193.155352][T20415] EXT4-fs (sda1): Unrecognized mount option "d" or missing value [ 193.168249][T20458] EXT4-fs (sda1): Unrecognized mount option "d" or missing value [ 193.192923][T20519] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value 22:17:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x9) ftruncate(r0, 0x80) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) open$dir(&(0x7f00000001c0)='./file0\x00', 0x88180, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x116) openat(r1, &(0x7f0000000180)='./file0\x00', 0x202002, 0xcc) 22:17:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 22:17:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0009676ea58689a300"]) [ 193.203809][T20522] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 193.232630][T20524] EXT4-fs (sda1): Unrecognized mount option "d" or missing value 22:17:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d000a676ea58689a300"]) 22:17:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x180) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="1f5b5732d17faf03527ea64ac074dd5fd214"], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x28800, &(0x7f0000000200)='--\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) acct(&(0x7f0000000140)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffffffffffd93, 0x0, 0x108a420, &(0x7f0000000140)=ANY=[]) 22:17:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d000b676ea58689a300"]) [ 193.257462][T20540] EXT4-fs (sda1): Unrecognized mount option "d" or missing value [ 193.268865][T20567] loop5: detected capacity change from 0 to 512 [ 193.294181][T20567] EXT4-fs warning (device loop5): ext4_multi_mount_protect:292: Invalid MMP block in superblock 22:17:36 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:36 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 193.438268][T20641] FAT-fs (loop1): Unrecognized mount option "000000000000000')ù‘ŠE000000" or missing value 22:17:36 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="743dc95ed7ae84efb6db61fe5278fe3ecff74db35d51bf05d9929047696fe43e11ca4070367797d74be7d23f04629392ec1d5c6a05a51bd6f4f53714d8ec4d40bcfd4859cbd5cb197317c688d8d0caf1005f76e1da29897da81cfe8b58de95e1a872899d7248cefb623e7d5c7b63265d9f4a4078ae01d79b10e401049afb7ba23f6c79f6008cba2a6b7455d1be14bf882cf8be16a2458c5864737ffae953626a8c703cea001e06ba923946a8ae6952fd2d547bc82ea41701f098e66bb7856d1cd2bee967048554e73db46344002b7ab8d7276325c4c85d77632a6ba8081c39318b", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c00accb8abd8d2be30805d0261b46c3535d9d5316642bf69d7482fab2c407"]) 22:17:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x105000, 0x0) getsockname$unix(r0, &(0x7f0000000180), &(0x7f0000000200)=0x6e) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d000c676ea58689a300"]) 22:17:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x157, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) [ 193.764875][T20653] loop5: detected capacity change from 0 to 8 [ 193.773266][ T24] audit: type=1400 audit(1639001856.722:283): avc: denied { read } for pid=20650 comm="syz-executor.2" name="nvram" dev="devtmpfs" ino=97 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 193.792214][T20653] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (4 blocks) 22:17:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d000d676ea58689a300"]) 22:17:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@filename='./file0/../file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='ocfs2_dlmfs\x00', 0x200000, &(0x7f0000000200)='ext4\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000140)=ANY=[@ANYRES16=0x0]) 22:17:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d000e676ea58689a300"]) [ 193.796773][ T24] audit: type=1400 audit(1639001856.722:284): avc: denied { open } for pid=20650 comm="syz-executor.2" path="/dev/nvram" dev="devtmpfs" ino=97 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 22:17:36 executing program 3: bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4470, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x800000000000000, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000000)) bind$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e20}, 0x6e) setsockopt$inet6_IPV6_RTHDR(r1, 0x29, 0x39, &(0x7f0000000080)={0x3c, 0xa, 0x0, 0x5, 0x0, [@dev={0xfe, 0x80, '\x00', 0x15}, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0xa}, @private0]}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=':wfdno=', @ANYRESHEX=r0, @ANYBLOB='\x00\x00']) 22:17:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x116) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x5f00f000) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000300)={'gre0\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="69705f76746930000000001c00004f93a2c75042a52e8df97fd51d79510828fb0049b043aaee311cd76df533a8fcf18d9265d17d9dec34d4e0f3d7e1c56adb312a9e1c653668f8097907b9cf322f535c3015750e189139bd", @ANYRES32=0x0, @ANYBLOB="00100007000001ff0000000146d800180067000080299078e0000001e000000100000000"]}) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2040008}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@getqdisc={0x28, 0x26, 0x4, 0x70bd25, 0x25dfdbfb, {0x0, 0x0, 0x0, r1, {0xffe0, 0xffff}, {0xe, 0xf}, {0xffff, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x40000c4}, 0x20000080) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='t']) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000000000)=0xaa4a, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) connect(r2, &(0x7f0000000280)=@in={0x2, 0x0, @multicast2}, 0x80) syz_emit_ethernet(0x32, &(0x7f0000000080)={@link_local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @broadcast=0xe0000001}, {0x0, 0xe22, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) lgetxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000180)=@known='system.advise\x00', &(0x7f00000001c0)=""/156, 0x9c) 22:17:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0010676ea58689a300"]) [ 193.882928][T20653] loop5: detected capacity change from 0 to 8 [ 193.905060][T20653] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (4 blocks) 22:17:36 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:36 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x102801, &(0x7f00000001c0)={[{@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x8000}}, {@mode={'mode', 0x3d, 0x6}}], [{@smackfsfloor}, {@obj_role={'obj_role', 0x3d, 'ext4\x00'}}]}) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:36 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x158, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 22:17:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0011676ea58689a300"]) 22:17:37 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000080)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000380)={0x0, @aes256, 0x0, @desc1}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000440), 0x101800, 0x0) syz_open_pts(r1, 0x80) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000280)=@filename='./file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='mqueue\x00', 0x40000, &(0x7f0000000340)='\'[]!/]-,--\\--$$\x00') pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000003c0), 0x20400, 0x0) openat$cgroup_ro(r4, &(0x7f0000000400)='memory.stat\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x5}}, './file0\x00'}) openat$cgroup_procs(r5, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 194.037393][T20701] loop5: detected capacity change from 0 to 8 [ 194.058805][ T24] audit: type=1400 audit(1639001857.002:285): avc: denied { ioctl } for pid=20705 comm="syz-executor.2" path="/dev/vsock" dev="devtmpfs" ino=231 ioctlcmd=0x5430 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 22:17:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0012676ea58689a300"]) 22:17:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f00000003c0)=ANY=[@ANYBLOB=';d']) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@reiserfs_4={0x10, 0x4, {0x7f, 0x6, 0x2}}, &(0x7f00000001c0), 0x0) creat(&(0x7f0000000300)='./file0/file0\x00', 0x140) r1 = creat(&(0x7f0000000400)='./bus\x00', 0x0) fallocate(r1, 0x26, 0x8, 0x1) openat(r1, &(0x7f0000000340)='./file0/file0\x00', 0x111002, 0xa2) truncate(&(0x7f0000000380)='./file0/file0\x00', 0x3000) mount(&(0x7f0000000200)=ANY=[@ANYBLOB='\x00'/10], &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cifs\x00', 0x4, &(0x7f00000002c0)='\x00') 22:17:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0022676ea58689a300"]) [ 194.061121][T20701] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (4 blocks) [ 194.124296][T20701] loop5: detected capacity change from 0 to 8 22:17:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0025676ea58689a300"]) 22:17:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x159, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) [ 194.138137][T20701] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (4 blocks) [ 194.176625][T20819] loop5: detected capacity change from 0 to 8 [ 194.208524][T20819] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (4 blocks) [ 194.272065][T20819] loop5: detected capacity change from 0 to 8 [ 194.278940][T20819] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (4 blocks) 22:17:37 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/156) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000140)=ANY=[@ANYBLOB="645116680af7ec4de32d4a7855fdcc4a88b15059a39d9c48795713796c475de661f91c1589e76a2ba2c9637986a425eb2a125881b7a32e35b24b3b7c2b4616f3b5c493fa6ad104d454a1e42ba4442147c94ad6a2dca0206e854c65d18356e89b63d66a4be4f60fc74785e07f74015543eec381000000c48fd8b19472313af5d6451a1595481138027fc0"]) pivot_root(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') newfstatat(0xffffffffffffff9c, &(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001880)={{{@in6=@mcast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private1}}, &(0x7f0000001980)=0xe8) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x2, 0x6, &(0x7f0000001700)=[{&(0x7f00000003c0)="d9ff0f1870f1c24d38140afe46dff7e416357ec437fed4fdb6e581e731f905869caa0687ffbd2a086da65d583353de097111d89237900d7649cb91af29177c829c43f6871b13450ccb9ce3bd5eb79f2a8473ac7e888d991e8b943699ee83430dadbfd6382572f8f64717b8319455f0ea9bf8ecc173e460fb710c9ca693a26289e713404e9d595bcb3c7177d0494ced9f8442a3db40f2f46f1cf1b1e8899d61338851e23ad4084aba2dad6f307cacadbf613ee2a0a21cc80821982bad4cfd84b0225ce325f0f550974e7e2ce9ad4022193c6a01e1626301d96b2c5103b3271efb9424db99cc28eff8eb36ee42b815311f8e9f6413a7b9c58a", 0xf8, 0x8}, {&(0x7f00000004c0)="0b6283079d9162", 0x7, 0x5}, {&(0x7f0000000500)="8af3f7cef40247c56b78f54f7c10068818e92ce408a91fa90970b302bcd974fcbdc8c5eb226f6c6990e347c738aba6dbb8510ac7a9a18c55a6090b34baf663cf629e36e5e5abc36800e8a34d201dde87d5cd37df790d4eeb8c31ef5958b549b0438df1751ff3be47c930cf6e7d5a98e98a12dbee40925948463a9a24aaabfae8f6a13748a6c3ac897c26aee10b8b64ef2299a41beb93ba444b", 0x99, 0x7}, {&(0x7f00000005c0)="df9a2e7e1103339478a5e703a70482aae9f30ba6c237ffb62b043333c3628f26d3a2a99b4c6f3ba7a7987ecd01c9674bf987390df22e95dbcd3406adc0ce352e576c3f425e6eb13ca8c91066718254133b6c19bbf275ce5e8bafd45103d6d6242c5e5c4f5147279f977edab095f06ac2cac5e9cd140e18dc0d7db1f8cf3d0a5f70b230c8d633eff5c96d76929e2fd7fa0781e3c5cfd83b414c3e31725a032590adc9d60a48bb44634b30ffc90f136c81015b7835f5fe1cb42a4e21b7581e63bd7eb9e36d5e3d444dbf89e8d5db3fe642b5ca2a9b7ba6f37b71d19d76ccd58eebc89384ecc7d3cae955bc8365b659d51265793e7b3e2ddec0cf88f14ac4c8e91b8e4d1e17c8691c47dd6a7575f3990480a4ed47ed554a28a58d6eedfebbd999d89bd48f039384abe317267640d069f531895c89bcdc9b0c950273d5f044d113b439980b7cb0ce6f87d03c51f75ea858d2908bf491259943ba8663f7bdd5a2ff00c1fbcd579e9317eb2793d06c7db022d3a9dc80b93377371df02fcc58dc7e9dabe5e30253cef5717bdee7e9dd49d2f0327d6c4754a4700017e4c159ad81e1e7ed2b26108229e27ff406d7fa816800bb8198b92c5912e54da6786ced3e9f5fadf674f8296c383dc3882d1f9d9ec75ea77ca7aa9eec177de64dbd738ca4ae4f3ca40b7bb54d0ae710835eb998d62172b1463dd25a2e8d532970f360f13d5c1a2937b19b5f23260295dfa972d61168a34fbfe9c62d97251754a879cdc3cd2b3c4a470d956267e11391f1d55cdd6b5854c223eb76c3d095ecccf21eb14b20ebca52ecd2c1a43080882589bbb154e07ca9c0354eddb4f7106a12bb71b1f9510d5b09376dbe0a0694582dbc606e669ec2584ce8f4cca18f8f9d4942f05ac793ce0cd7f5755378cd296f1edeb66ffccd2244ca96321ef0f48163d03eb0e495a9ac7e01489ebdafa6c355aca9e0f527ca30d5f5235945e203f7f8400ba3db28fe583e24e7e0f5097da03985e525531c832e092277bc5ec63d7b501ad105de186ddbd2be172fd772741f0672b0bb34062ad3864a4326ee40842545295dc2902bf3d947035f1013dda3e9d1b675a1f32a0151c89b2a9329d1542142b6c02dcb2a2e30cc60ce78cd348bd46964143261a29f0d127f00113831de0dd48e03c373d2a941e6408ab76f628aa360d621aea116017ac0ddb765113ce35d5f49f412acfb19a966c44f836cf47d602cb1f025e727ecea11dbae25b5ab5f50bdfeba2a4d6c22775c30e7bd83d034133a816069669a97fdc43e6152ff105469360421518b5f419f35f8032f3e9ba0c3f1eba17b01dcf352045191d4934fd53f070f330cd7b3fd6c2fd5b61e269c80960fe3679f7447a6af7a11cec461ae3cf4d8567514f2acf901cbb4075abeb19532edcbf8b8eebc613fcc043b83762b17e5201d577114e2870bbb73766a36706a67a5393034bc1293f495c89b183c6def8937782ee28f31c961ffbe1023bc960992e5cae4e0cb69f28cd848077816b94c09bbb72288be0551ee49b68a7bc7853bc61e57edbd5c49f41bf32d7d5c129df0ddccd1ca82a0df731ca3f88e53c53463e5f33ef267e9be64bcf925ae16b1041a94b5d42abde9b453293459e944881c8c73e2aed41607b9c57639801c5e80546621df2c9f12b58786624fb01122f62f90dd8ebfbfd2a66bdcea5f6b47e0e435ab0bd5ac5d537452ea4f5b3cbe4fde9ae42e6cc36fa172757656b818ca83bfb62b1de051d4c2670716b2867087213c2fd7ac13b60ce411c0ce3dcc62e7264bb333f8032b7cdd4d9768e04114a3f9331def6c91c9fe4d99df125c01decdbb4c396862a8b0dd0b5dbb6ad1197ca99021ba0e290e1c9e82ff1260d383767b6eeafa1159acb7d0c2f83845c44aef77dfeb8bd9527c6b73578ee8d9d7398cdc79bc4baa81ef7b197de850233b1f533e913ab587c2934272bdada2313bb7ce8bb8241956a69cb36bbe9117ef301dc79e7b4b3dd984f9c9068b6088c265a8346b2175672a6001e67247e9b1fbacb7c4378cc10af7c6f701db4029b601473f0716225ed98def2683d26ccebf1442afafefb4d56195d7bdc6d2447a613dfb2b0a6273fb3eeba12c27eebd0e95edd286a0d54e53f3ca659e40bb3a5dff04daf1e7c2863190980eb035089844525f0436cf9125c2ec7624e4a4a67dba41e96d32d2e83648085df67cc5d5d600974b4132b8fcf358ccd0774610505153036ae5e3e7410a3f5eafe6808430902ef8142c888bd1391f7f2cfe25a470be7f5a7811c98673ee0a0270f970d3dd883915f4954bb0f613ea27b34fbb1fafd68f7c44b804bb6b7bfe293fbe3bc22401ef760330fac8f2484e2dab3c718094372784a4c778243fb5349746953b1c51c591b2770b1c33b032a6b12d48b8efa3ce91ddcdefda35214929b1e7c497c1837c209cd3a53fce5adb57c1bf802d19eabb2b327c0d685dc6a0b8eff64bace784bcf8ce8a7155154eea9088b1cd50013df677d40c2752a3ff55a2ba15aa923e5370c2e361548b0209b9b6c16e26cd7007ae03203dbf707db0755b6df74cd141f71bd0a49145a9f122c7d02c36cab9ec67484c76ed045afc3bbbaa83eab0c91bd2b75969b6f0556b087d39170ac29c8c684150fd35e08f6fb21ced5378302aa282be56e83bb9266c7fa70bf96f02c36f2077674b72f573186b434d538a5b00982b0c91f94e5d35ad4c8d350c524edad94423144f4a87a77537dc425f8758f341438c6f6c49eeb7f0032a400deac201af73e0ae6b8ab198f9ac6d7e51321cc3d16c8b1eb419ec4218c65bffb1747a060a7f301e52d78a73cb867ef5ad675b3499d77cd31a6399d506d811dd9173ef14b373e445ba3433a6c037c351bae9b3b3c24927a77380c3eb892fc05f99800cab6d7f7c27c42aa15ba224689243b194aaa0ddd66d1863ed6e5f3285d7f145b412a486727d0da0bc4f0b641d05bbce62f1a8aa76dd394974a5304a8faf74e989f185552fb65e44a7d818f2390ed125bbf8a524ad94b0016caf2095740863775cd5d01f3d0040556d8b0fa2c8af69f0ebc79845210eb38da4ad700cc30f1dcbd16b50e97e10fbde324576b78cece5f3d2d20b6a731b287cd21278af575b6f5dadfd63ffc2e7e87e12752bde0e2db1075b96de37acf5a201d5618e0d979531a1ed3c73a7fb08636d1da8ad93c4843e70af3d2a0c6ea72282d1536514d4aca1e9d9dbc8d0ff0177e2dbbe14bb0da92427af0c66780596bdc6506657f2dd757e02a1a25790da0574625af80cd35972475e18ce2fe99f18fa696a70b67e7b2a52c4deae945c0809e926cb4b3400ea75cd3cf29c96617f40087ff5d29ef6f5a6b7891e642f9e214ae9609c17a486ec49c41e7bc744f5181318b2d0a9e2d2a8fb7cf8f32cff5328ced16f71ea5f96f1e200af499eccecf0e19185ff5eaed673f5e533a9d82ee19198fbb7e8a1e92cb747f9ce94ec3d0843e8c6ec349d4df4f1a3f6a78f5f3b4cbb7051080b42c4949caad3a0874f7f2156ab22a2a47ef5d2ea089cb3cacab7569ef7679874eecdd15aea1f8ca186678038f556c1a3cbf43bc9d1d78d4a89814d20bef2a929478a41573433f9dd1a1e55406c4a669accc13ffc1b94e6285e7f472671206e5e4a13c5702fa79bc6720ee2af8f1e61a473bf67d20ae6c265234e6008f2ef85dc35f635742992adf878861130236c83fbd12446dd7ce9bd51a5107ba73a753b26b5096148af8f6a3de0ad564694cbad4b254664e686cad1cae946c01ddc3dba0e72ce4b65ebac11a29409d6c14131bfddd11ce56ee227b5c2ee243f69fd814ed50bc3cbdc2fc348245282a4bfcbe16f5c18ec78dc2b3082bf1a426dbfa12d6dc54d8f8703c3c9b2a03584e9e06b71bdb72cd8399dff223075586fbc219600902db321bd8153f8887b6310d86451850c46e4fb91e178b5f0f7f270e69034d4880619838127aec4aa6055f3f469493ac5bba2f6e29cc691e1f6401ae13c28ea5cdcc5aad06cad23ef7d07962b3cc972f6d0ed57ab5aa2d095d7391a0aeb13fd3c09520783ec107a96ff9030bc082a75c1d9414acbe116136b89c1488512a8064841108d31ef02a399c9b81e16126500c5a27da8e6d7c6b2310d9471885bbbf726a658f99fd72de5e3a0f9d3e6d81745a82ac4f14a76b7af8bbf37f112e0ab67fc0a12d1065a3b1f1952584fa380717d76207302b87293b8e1ac53f1a3efa82b7d87019fd9c2a04aab4a03105a80d753fd17a71f38837fbbbddea088adb7b2dae3a817c3c91b9eaf6bce42455f9eb31c00efdc8a94b26786a260a945a1705f096dae2f11b2d8db474adc35fbb3ce57210825530e74251e56540a9ba2ae65ba5146078037928c706719307662708c5eca8fdbd19895d90961edba345d3423a461e7e59dbfb295792e721c3fba520041d4a007fe8ed155c39dc52081de507bfad39e096383a1ff1510f086a81689f15c0ea014034f894d84e9ccf848ff448733d35e10b54219167e6178a41c772118791c9b9965bfcbaabef04a06ee59dbd8c89d21de21f965740864a803464821364c2e63ce2f58af8344f871bf62d4f7ddf5ada32c29d54a6801fef5c25aa93738ba5677a3cd6685608d72149591c42d36be916170e6f384232f915e51e87649eee872b8b4c4fc31ac4354715af381ae5d1f01f20cb3a766c476b0aaf5e24e046c52cf66859aa8edde085d06641ea3ba54fbc4e656b5db1137eed1f6898e85831ad6780972e0bad492aea0dc72a03383078deff843fc8f1ae9d191dc51ca0cc186a8b1a8cce02ea02b4b6a26648c264a87d4c9daba8a7fb580196efe1b13764799b6c08f40ff45206891f60731a08952b2dcb9eb65bfd3bc36707366d38e743c0ef92aa44b67609cbbe61439b2be26623415b526eea1e8acdb2554efdb36ab62054d8a766328ecdb7c8774ed694ccb5bc93c956f735b6048b127ddc22add78e65cdebb4f20d510ac101a330b8934e304f22fe0fccf9d6d3db34570120e68779d447c66bc266130693bd3ba519543fa56f455e57ccb86cb576ccc5ca6caa9970220da9621660e6c19fa7c575dfee6863dad98d0566724736b8e28b4a80a74792492a7f9dc8e76ed5e91f3acb096113c3c36f5ba202135a9d573411a6f1eb700d136248eded4cd9142816f74f186966b7d2190165fd8dd92077b7296465c5f3ff5a1a8ddef2ec8ffa5d4d76e789abdc2db02ebfcc8107892d290cfaa277d931016b17c6c94bcfe54adc5975e2d9a30c398e16fe00f410b1af616e95830796c1127a308b5bd257c723e6f79ea7471b987265dd9ec93dae7c9ebf18c78fa9680d5bdb8d8ddaa72c3e4aecc9af3d60a2922ff19303dcb0563ee262b7292d7280155fb7e0fcb7a618f6818fba390770168435065e29e44dd20c7a472a07cbe97de6431a322b8b3ab24354f9c653d1c089ea175f8cd7dc34b3b58d41bf8721ab7a71ebff7030f7424ceaad4f8003d4939cfa2b0e2240969c281fa118e2251fe980d5b2a24a8ad6fe51e665618c7b37463a0665df138169a917c3355b8311a69d4d49ad8d0f0f69cfa80ca7110d979fb65ff1a94f1668e33a409da3793a6cef7071f41dcb27af56fa8ca4c248031ac1dc7b11718a4a175af914b183d7f5774b0f7a7f14a419317adef70ab46428010bdbd9fb799fb6de36f48a532f257de780688e70021dc1d692d931f07327ce893aa9a20d3879a71c34269467f1b1e4001c6647f6630f943d489336600a90d40ac45964e638a103435b91b4a3b443d50926badacca499ef058016dc9fb43", 0x1000, 0x7ff}, {&(0x7f00000015c0)="38912c0e0c6de7767a2767f98184fd54b31c9e985be869ee4f04fc4e9bac11efd8ffdf11920b5d1969134cb2b06ce72c49e030cbf3ea36e44973e74193644f80092578f5b075d322756d7d1efba38638885a7ca8fd962dd20f8f18505b124870a1475ec06eec589ac4818470df", 0x6d, 0x5}, {&(0x7f0000001640)="92686b2b40566509435b77d16d9b16a552a0c0659aa1cad4c8824e3c337f4a7c238d9aadf349fa46632412da57f3ef8a827727b8d8c76c1dfc945941d95d1138484a07cac55612c44bc3020dd9e57aa525f29802270f113eab37840406068041bef345b27d6e9bf6271747a0da5216944d5c1693667025b1a8760793c6f15b358d88abbe28c5042435d328238b8332e937b5edcfa5e02466df21f2064ae204eff3ba3a81695032911b81", 0xaa, 0x9}], 0x802000, &(0x7f00000019c0)={[{@shortname_winnt}, {@numtail}, {@utf8}], [{@subj_type={'subj_type', 0x3d, 'vfat\x00'}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@dont_appraise}, {@permit_directio}, {@uid_lt={'uid<', r1}}]}) 22:17:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d002e676ea58689a300"]) 22:17:37 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x15a, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 22:17:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0048676ea58689a300"]) 22:17:37 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x6, 0x100a) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB='\x00\x00']) 22:17:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d004c676ea58689a300"]) 22:17:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0060676ea58689a300"]) [ 194.931232][T20836] loop5: detected capacity change from 0 to 8 [ 194.970891][T20836] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (4 blocks) 22:17:38 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0068676ea58689a300"]) 22:17:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d006c676ea58689a300"]) [ 195.035304][T20836] loop5: detected capacity change from 0 to 8 [ 195.051364][T20836] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (4 blocks) 22:17:38 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c4139909265e15587fca777d663de0c61dc72195bde12b1ddb5ad22de8a6d736f10361fafb20f915cb437a5843812b29138e02a81cbe9a1e7efad9b20ccb1ab1785661b87f59205afecc47022b53ce8f48179517123c269364427d53ff5617eb0f68e521d6a84264077a987c9c4a57613cd27464ebb962f9c9967da2deb310cc0b8e8e0d902a3c05e1c3d985699eb06fe0c07e1e5f74aa63e30ea5924c012cfd53c15727d28ff3db5d82dbe0c2175f59b14"]) poll(0x0, 0x0, 0x1ff) [ 195.504560][ T2062] device hsr_slave_0 left promiscuous mode [ 195.512710][ T2062] device hsr_slave_1 left promiscuous mode [ 195.519017][ T2062] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 195.526477][ T2062] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 195.534966][ T2062] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 195.542433][ T2062] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 195.550276][ T2062] device bridge_slave_1 left promiscuous mode [ 195.556523][ T2062] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.565747][ T2062] device bridge_slave_0 left promiscuous mode [ 195.571883][ T2062] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.584700][ T2062] device veth1_macvtap left promiscuous mode [ 195.590696][ T2062] device veth0_macvtap left promiscuous mode [ 195.596765][ T2062] device veth1_vlan left promiscuous mode [ 195.602782][ T2062] device veth0_vlan left promiscuous mode [ 195.714849][ T2062] team0 (unregistering): Port device team_slave_1 removed [ 195.725068][ T2062] team0 (unregistering): Port device team_slave_0 removed [ 195.734753][ T2062] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 195.746761][ T2062] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 195.794095][ T2062] bond0 (unregistering): Released all slaves [ 196.765314][T21065] chnl_net:caif_netlink_parms(): no params data found [ 196.805379][T21065] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.812459][T21065] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.821675][T21065] device bridge_slave_0 entered promiscuous mode [ 196.829018][T21065] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.836122][T21065] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.844124][T21065] device bridge_slave_1 entered promiscuous mode [ 196.882858][T21065] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 196.912611][T21065] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 196.951826][T21065] team0: Port device team_slave_0 added [ 196.958392][T21065] team0: Port device team_slave_1 added [ 196.987825][T21065] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 196.994803][T21065] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 197.020907][T21065] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 197.041839][T21065] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 197.048783][T21065] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 197.074810][T21065] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 197.124973][T21065] device hsr_slave_0 entered promiscuous mode [ 197.131490][T21065] device hsr_slave_1 entered promiscuous mode [ 197.137888][T21065] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 197.145633][T21065] Cannot create hsr debugfs directory [ 197.182802][T21065] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.189852][T21065] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.197172][T21065] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.204362][T21065] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.235326][T21065] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.246713][ T2009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.255401][ T2009] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.264411][ T2009] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.276391][T21065] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.286333][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.295014][ T1912] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.302051][ T1912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.324317][ T2009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.332850][ T2009] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.339894][ T2009] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.348846][ T2009] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.357922][ T2009] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.366807][ T2009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.374998][ T2009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.384571][T21065] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 197.394553][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 197.409148][T21065] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 197.417360][ T2009] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 197.425055][ T2009] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 197.481634][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 197.490555][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 197.549861][T21065] device veth0_vlan entered promiscuous mode [ 197.556502][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 197.566237][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.577288][T21065] device veth1_vlan entered promiscuous mode [ 197.585596][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 197.593440][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 197.602913][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 197.617605][T21065] device veth0_macvtap entered promiscuous mode [ 197.626618][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 197.635120][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 197.644767][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 197.654620][T21065] device veth1_macvtap entered promiscuous mode [ 197.664078][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 197.672421][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 197.684422][T21065] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 197.695013][T21065] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.704864][T21065] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 197.715355][T21065] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.725195][T21065] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 197.735621][T21065] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.745449][T21065] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 197.755865][T21065] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.765708][T21065] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 197.776152][T21065] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.788252][T21065] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 197.796266][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 197.805038][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 197.814559][T21065] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 197.825041][T21065] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.834982][T21065] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 197.845461][T21065] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.855281][T21065] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 197.865757][T21065] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.875586][T21065] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 197.886045][T21065] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.896431][T21065] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 197.906969][T21065] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.920924][T21065] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 197.928747][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 197.938795][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 22:17:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:17:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa726, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 22:17:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0074676ea58689a300"]) 22:17:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d002e676ea58689a300"]) 22:17:40 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c4139909265e15587fca777d663de0c61dc72195bde12b1ddb5ad22de8a6d736f10361fafb20f915cb437a5843812b29138e02a81cbe9a1e7efad9b20ccb1ab1785661b87f59205afecc47022b53ce8f48179517123c269364427d53ff5617eb0f68e521d6a84264077a987c9c4a57613cd27464ebb962f9c9967da2deb310cc0b8e8e0d902a3c05e1c3d985699eb06fe0c07e1e5f74aa63e30ea5924c012cfd53c15727d28ff3db5d82dbe0c2175f59b1468"]) poll(0x0, 0x0, 0x1ff) 22:17:40 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) close(r1) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="acb98c7f4933cf", @ANYRESHEX=r3, @ANYBLOB=',\x00']) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r4, 0x5457, &(0x7f0000000080)) r5 = socket$inet_smc(0x2b, 0x1, 0x0) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140), 0x3254c1, 0x0) ppoll(&(0x7f0000000180)=[{r2, 0x4000}, {r4, 0x2106}, {r5, 0x232}, {r6, 0x404}, {0xffffffffffffffff, 0x72aa}, {r2, 0x400}, {r1, 0x2000}], 0x7, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000200), 0x8) [ 197.976919][T21094] EXT4-fs: 41 callbacks suppressed [ 197.976933][T21094] EXT4-fs (sda1): Unrecognized mount option "dQh [ 197.976933][T21094] ÷ìMã-JxUýÌJˆ±PY£œHyWylG]æaù‰çj+¢Écy†¤%ë*X·£.5²K;|+FóµÄ“újÑÔT¡ä+¤D!GÉJ֢ܠ n…LeуVè›cÖjKäöÇG…àtUCîÃ" or missing value [ 198.019492][T21104] loop5: detected capacity change from 0 to 83 [ 198.029533][T21107] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 198.045186][T21104] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (41 blocks) [ 198.055183][T21108] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value 22:17:41 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:41 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0xde}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d007a676ea58689a300"]) [ 198.064404][T21105] 9pnet: Insufficient options for proto=fd [ 198.076575][ T24] audit: type=1400 audit(1639001861.022:286): avc: denied { create } for pid=21103 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 198.099232][T21113] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value 22:17:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) chdir(&(0x7f0000000140)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000180)=ANY=[@ANYRESDEC=0x0]) [ 198.154317][T21104] loop5: detected capacity change from 0 to 83 [ 198.163798][T21104] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (41 blocks) [ 198.168642][T21122] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value 22:17:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa727, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 22:17:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d00000a6ea58689a300"]) [ 198.218550][T21188] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 198.236790][T21192] loop5: detected capacity change from 0 to 83 22:17:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000256ea58689a300"]) [ 198.265074][T21229] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 198.278006][T21192] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (41 blocks) [ 198.285525][T21230] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value 22:17:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000670aa58689a300"]) [ 198.333450][T21232] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 198.353488][T21233] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 198.374573][T21192] loop5: detected capacity change from 0 to 83 22:17:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d00006722a58689a300"]) 22:17:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d00006725a58689a300"]) [ 198.395605][T21192] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (41 blocks) 22:17:41 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa740, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) [ 198.569384][T21244] loop5: detected capacity change from 0 to 83 [ 198.582951][T21244] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (41 blocks) [ 198.632151][T21244] loop5: detected capacity change from 0 to 83 [ 198.642820][T21244] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (41 blocks) [ 198.862874][ T1830] device hsr_slave_0 left promiscuous mode [ 198.873695][ T1830] device hsr_slave_1 left promiscuous mode [ 198.894811][ T1830] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 198.902895][ T1830] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 198.953915][ T1830] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 198.961379][ T1830] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 198.986763][ T1830] device bridge_slave_1 left promiscuous mode [ 198.993077][ T1830] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.019152][ T1830] device bridge_slave_0 left promiscuous mode [ 199.025393][ T1830] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.054335][ T1830] device veth1_macvtap left promiscuous mode [ 199.060344][ T1830] device veth0_macvtap left promiscuous mode [ 199.066434][ T1830] device veth1_vlan left promiscuous mode [ 199.072391][ T1830] device veth0_vlan left promiscuous mode [ 199.196544][ T1830] team0 (unregistering): Port device team_slave_1 removed [ 199.206441][ T1830] team0 (unregistering): Port device team_slave_0 removed [ 199.216185][ T1830] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 199.228494][ T1830] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 199.260468][ T1830] bond0 (unregistering): Released all slaves 22:17:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa780, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 22:17:42 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000672ca58689a300"]) [ 199.399514][T21254] loop5: detected capacity change from 0 to 83 [ 199.431506][T21254] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (41 blocks) [ 199.473333][T21254] loop5: detected capacity change from 0 to 83 [ 199.482644][T21254] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (41 blocks) [ 200.416728][T21361] chnl_net:caif_netlink_parms(): no params data found [ 200.511184][T21361] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.518249][T21361] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.527026][T21361] device bridge_slave_0 entered promiscuous mode [ 200.541227][T21361] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.548289][T21361] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.561374][T21361] device bridge_slave_1 entered promiscuous mode [ 200.580008][T21361] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 200.591221][T21361] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 200.609717][T21361] team0: Port device team_slave_0 added [ 200.618481][T21361] team0: Port device team_slave_1 added [ 200.633488][T21361] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 200.640425][T21361] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 200.666410][T21361] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 200.677611][T21361] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 200.684610][T21361] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 200.710597][T21361] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 200.734093][T21361] device hsr_slave_0 entered promiscuous mode [ 200.740552][T21361] device hsr_slave_1 entered promiscuous mode [ 200.747126][T21361] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 200.754684][T21361] Cannot create hsr debugfs directory [ 200.791762][T21361] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.798813][T21361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.806074][T21361] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.813111][T21361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.845939][T21361] 8021q: adding VLAN 0 to HW filter on device bond0 [ 200.856790][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 200.865238][ T2343] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.873214][ T2343] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.891510][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 200.902550][T21361] 8021q: adding VLAN 0 to HW filter on device team0 [ 200.913072][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 200.921565][ T2343] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.928581][ T2343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.949233][T21361] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 200.959601][T21361] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 200.974406][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 200.983136][ T2339] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.990150][ T2339] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.998905][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.007907][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 201.016690][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 201.025112][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 201.040366][T21361] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 201.049702][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 201.057460][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 201.065103][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 201.073025][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 201.123750][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 201.180323][T21361] device veth0_vlan entered promiscuous mode [ 201.187571][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 201.197862][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 201.205452][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 201.216841][T21361] device veth1_vlan entered promiscuous mode [ 201.224968][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 201.242129][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 201.250402][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 201.261328][T21361] device veth0_macvtap entered promiscuous mode [ 201.269345][T21361] device veth1_macvtap entered promiscuous mode [ 201.283600][T21361] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 201.294071][T21361] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.303878][T21361] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 201.314377][T21361] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.324189][T21361] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 201.334594][T21361] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.344409][T21361] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 201.354824][T21361] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.364645][T21361] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 201.375105][T21361] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.387580][T21361] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 201.395945][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 201.406378][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 201.415731][T21361] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 201.426259][T21361] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.436053][T21361] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 201.446542][T21361] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.456341][T21361] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 201.466753][T21361] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.476638][T21361] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 201.487044][T21361] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.496857][T21361] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 201.507304][T21361] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.519921][T21361] batman_adv: batadv0: Interface activated: batadv_slave_1 22:17:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000140)=ANY=[@ANYRESDEC]) 22:17:44 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x1943a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000), 0x4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) sendto$isdn(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="1f0000003d1b280b9adeaff5000000c6894117f57e905d70eed83a424c1fb9374f76c610ec5e81f7980934c553bd2d6d1934bc5980d8097e"], 0x16, 0x24000040, &(0x7f0000000140)={0x22, 0x99, 0x7f, 0x4}, 0x6) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x8002, 0x0) bind$unix(r2, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=0x0, @ANYBLOB="2c9466646e0600", @ANYRESHEX, @ANYBLOB=',\x00']) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000240)={'syz0', "5998f54ec6eb3584f881ddf2c48c9409843eada577dbef4379160302723d46947dfb5144fb94e449b1d18e984df7b1c28089aca21407daa9192f8517c8c892b43e95db43c2f7e76ab8aa8b8df641a37d1c8b7ac02d77eeb0ec9e2b90390d14d36fdc6786fd255161da85f6fd16cfb4b40d4aa19dae9bb41c3e9a45f582f1e0c4523cfa51e49bb9ff8c324691"}, 0x90) 22:17:44 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a302"]) 22:17:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa7c0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 22:17:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x10, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 201.528762][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 201.537574][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 22:17:44 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a303"]) 22:17:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a304"]) [ 201.590036][T21395] loop5: detected capacity change from 0 to 83 [ 201.620873][T21395] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (41 blocks) 22:17:44 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003f80)={0x0}, &(0x7f0000003fc0)=0xc) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000880)) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) r2 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000004000), 0x2, 0x0) kcmp(0xffffffffffffffff, r0, 0x0, r1, r2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000040c0)={{0x1, 0x1, 0x18, r3, {0x1}}, './file0\x00'}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003d00)=[{{&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/86, 0x56}, {&(0x7f0000000240)=""/37, 0x25}], 0x2, &(0x7f00000002c0)=[@rights={{0x10}}], 0x10}}, {{&(0x7f0000000300), 0x6e, &(0x7f0000000780)=[{&(0x7f0000000380)=""/232, 0xe8}, {&(0x7f0000000480)=""/219, 0xdb}, {&(0x7f0000000580)=""/66, 0x42}, {&(0x7f0000000600)=""/147, 0x93}, {&(0x7f00000006c0)=""/163, 0xa3}], 0x5, &(0x7f0000000800)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}}, {{&(0x7f0000004100), 0x6e, &(0x7f0000000bc0)=[{&(0x7f0000000900)=""/224, 0xe0}, {&(0x7f0000000a00)=""/47, 0x2f}, {&(0x7f0000000a40)=""/37, 0x25}, {&(0x7f0000000a80)=""/69, 0x45}, {&(0x7f0000000b00)=""/22, 0x16}, {&(0x7f0000000b40)=""/105, 0x69}], 0x6, &(0x7f0000000c40)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000001000000de2902000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x98}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d00)=""/111, 0x6f}, {&(0x7f0000000d80)=""/122, 0x7a}], 0x2, &(0x7f0000000e40)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xe8}}, {{&(0x7f0000000f40), 0x6e, &(0x7f00000012c0)=[{&(0x7f0000000fc0)=""/96, 0x60}, {&(0x7f0000001040)=""/94, 0x5e}, {&(0x7f00000010c0)=""/109, 0x6d}, {&(0x7f0000001140)=""/190, 0xbe}, {&(0x7f0000001200)=""/147, 0x93}], 0x5, &(0x7f0000001340)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}}, {{0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f0000001380)=""/76, 0x4c}, {&(0x7f0000001400)=""/67, 0x43}, {&(0x7f0000001480)=""/18, 0x12}], 0x3}}, {{0x0, 0x0, &(0x7f0000002500)=[{&(0x7f0000001500)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000002540), 0x6e, &(0x7f00000038c0)=[{&(0x7f00000025c0)=""/139, 0x8b}, {&(0x7f0000002680)=""/189, 0xbd}, {&(0x7f0000002740)=""/111, 0x6f}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f00000037c0)=""/193, 0xc1}], 0x5, &(0x7f0000003940)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x40}}, {{&(0x7f0000003980), 0x6e, &(0x7f0000003bc0)=[{&(0x7f0000003a00)=""/56, 0x38}, {&(0x7f0000003a40)=""/78, 0x4e}, {&(0x7f0000003ac0)=""/193, 0xc1}], 0x3, &(0x7f0000003c00)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc8}}], 0x9, 0x20, &(0x7f0000003f40)={0x77359400}) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) ioctl$AUTOFS_DEV_IOCTL_VERSION(r5, 0xc0189371, &(0x7f0000004040)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) ioctl$TCGETA(r6, 0x5405, &(0x7f0000004080)) 22:17:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f00000001c0)=ANY=[@ANYBLOB="81a91235474611c0d3f6b6d887f7bb7ffb0653cde6242e96bae0aa1a8523052b92e4cf4000000000000000b4a3338618280be8e5c8a0c08a4395e255ca0ed195ec85e0b1"]) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') 22:17:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a305"]) 22:17:44 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000006, 0x4000010, r0, 0x199c0000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 201.653798][T21413] 9pnet: Insufficient options for proto=fd [ 201.683226][T21395] loop5: detected capacity change from 0 to 83 22:17:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a306"]) [ 201.702333][T21395] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (41 blocks) 22:17:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a307"]) 22:17:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa800, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 22:17:45 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c4139909265e15587fca777d663de0c61dc72195bde12b1ddb5ad22de8a6d736f10361fafb20f915cb437a5843812b29138e02a81cbe9a1e7efad9b20ccb1ab1785661b87f59205afecc47022b53ce8f48179517123c269364427d53ff5617eb0f68e521d6a84264077a987c9c4a57613cd27464ebb962f9c9967da2deb310cc0b8e8e0d902a3c05e1c3d985699eb06fe0c07e1e5f74aa63e30ea5924c012cfd53c15727d28ff3db5d82dbe0c2175f59b146873"]) poll(0x0, 0x0, 0x1ff) 22:17:45 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x0) 22:17:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000140)=ANY=[@ANYBLOB="1829119d425947921c61af0c4e"]) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000080)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000002180), 0x240000, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000080)) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r4, 0x5457, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0/file0\x00'}) r6 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000080)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002600)=[{{&(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000200)="c7dd59098dfe047feb844512041d86039ffea6242c9e44a9f66408dc4888e1a8027b7d3dabc687f694099fdaa0fd672a0e5bab8dba487b4b1ebe0d989030ed4c3fc6367be2d669edcc7e03a77c78e7d801d81c41088d2d132e38d38d7fa35750c3f2e1db4bcb4ca0ef403bbbf3b3be07f9352eae19b41e84b08c", 0x7a}, {&(0x7f0000000280)="7e18c5eea8a31e072326856d19a39ebb798ec3717c9cb416d4b49c64cb1c641ed3336fc26280d4ad76a717195d8e96b8476a28343099814b7240439e4613a94f915e34cb9a2c137b4206b55682", 0x4d}, {&(0x7f0000000300)="d8d89847246b8f1daa8521b1befea5482ba0ed2684e9824469b92fc9a85c96adc7ece47c75204c5992d0142fabfeb3582eeebe7d21c7b0bf2cf075da41d7665ae00885ec5905bd7aee7ba3e09faa4fca256434950c81eeb0c39be304b1b0b5681a62b4c9d607a801e628722ae38c231bc047b801bee4eb8630f0817e26f32db17802248aeefe8799285d0be6b9a22dd8abd42ad522db19a60f291ac83ba145dc0a9823b92ea22bd7afeec19c3993745de5fb2cb7", 0xb4}, {&(0x7f00000003c0)="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", 0x1000}], 0x4, 0x0, 0x0, 0x40}}, {{&(0x7f00000013c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000001600)=[{&(0x7f0000001440)="95a69ac1f41e01057b63d3faf7928bc166041f", 0x13}, {&(0x7f0000001480)="ad219d3cbdf025372431a0ec7f3495517e3ad4cfbd841628c9eaf5a552b3bf8bda3fe709ee52aea3eb1a240f54f47854f7b033ddb499976f0689ac41fdacf6f0b97639e0436b169dc4ec48f6036a7ed029248cc93169cce050c116ce99921e7b7a2164e13bb4def25a98f0ad065b99ab75e7a805b1ab1f81e0d7", 0x7a}, {&(0x7f0000001500)="efd93e1d9c4893b4201a1ef857ca1dc2c71b265edfc8345b14be1bcf484715af4c6b5534df9267995f494cba1d1d70ce635d47a1062443629e5929bc5acd8cf207094ea3c8c311a6f31d28573e09a92d800192a83c4ec93403dc15d991a81eef8fde93564b56a56225b0ee5df03659f06b861a5667e1de4f389fd6c0d893b47f1b8e37114b0bef16c72c70d9cf2421fb2ac9eb0b4017f5a38c9c9de08fe248f5bc95686751edfa85addb3c51b9ef9af07f61218f5f4abc9d6ba97a21cb2e3e04565e5ad0b8dd5136cc48f8921bf0d087a43948f6d638f50c96efcfc61d97ea95cf47367f03fcc15dfacd99d0890deb99e985", 0xf2}], 0x3, &(0x7f0000001a80)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r0, r0]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x100, 0x20008840}}, {{&(0x7f0000001b80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001d00)=[{&(0x7f0000001c00)="36293fb5d90ab9bf69b147b57efc86609e599cbe3be5bd1e37d4fb7ee02c97843e72f186ecaf9442ce3ad76d91ac49b61b5c0c70d96601d0e029c1546fae1b742e3593a5048acd35f9e36bc4116d89fa3d01a4d4b70a3efa532d74d7995ca965ff2d33b92e1ae034892394d2553d86f5ec2ca563efe676340259eddbca4fd6a663e4", 0x82}, {&(0x7f0000001cc0)="1d4826c0fb71995d145f401c2daa4b07dce7f9d0885544751b1d11646c78576dd5d28886fbe0d3618fefd92d00110a62c1fd004ba9ae68681050", 0x3a}], 0x2, &(0x7f0000001d40)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}], 0x20, 0x8001}}, {{&(0x7f0000001d80)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f00000020c0)=[{&(0x7f0000001e00)="3c108c53b87ce39ecf36253c7c6859cf5756d6eb821b54d3b63427910a88ca4fb5487d81b3deaecee017f8b9f9ed8d9185aad1d979a6dd29781669ee207818fe167388fe1254fadae61635ffc3292fae4d8442c9e44df99db31cc82797027df15415a240b26cc30626c17e57df42df2d79fb028088bd0459e1f4f9020eb94209ae62dacb37fb9ca9abb6ce9728abe487ae5ef6d82088bd0f712bff6c6c9707764a94623c37ef2d77fd8d1d79c187046ad5db2d25ccc12b2a4c7d3e51d6fa9c38024f81b65087d6875466c2c8943a4dddfe8789", 0xd3}, {&(0x7f0000001f00)="d0c3997107ddc425cd3f45df93c68de55bef6ca000b0a3fcaee84a8fd2d6865910f012458c0838bb8ee339cf102608cfc4c0d56bc811fdd4cd14affe9444dba98a357db2b462b69ba0ffa1a0caa641612c3062ed0d69dbb93ef2bd04ec0a24f40a713c9f7981fcd600e4ff98aaf43794b7ceb54a54c314ae0855cb775434d10abee15207596bb917a5b6b115150cb2cc849437949bf00488b547dcf3cf0cad05cb482133fd4ccc77a9543939375ec4a29c22ff369226298322996bd97bac7d1ccdfa1774604c6c49a1056571e5cf629eae504da7c37e411f47e6b6bd61820e6ab9bf2381fc434e13e2bdc9ce8aec", 0xee}, {&(0x7f0000002000)="19533f13efc35b0d01242d7fc327c31d753fb117fd877af2976e593ed1b27bd334f74c04b673fd7206980ea28e8d59ad683edc28292681dfe63175d7e327acc1bd3912769f302f42cd2f36d5757c691c524c1d0195a2c76c344e5f4f142688e2dc86b9786bf5da651ee016948832d8274f4052d431480bede9a64fbf9dfa918db6863b54f079190bfc8228ebcc88879ebcc5ff95412a0f81456557cb0cb1b4a88e177743d6d312e7fd0c8801972706", 0xaf}], 0x3, &(0x7f0000002340)=[@rights={{0x24, 0x1, 0x1, [r0, r0, r0, 0xffffffffffffffff, r0]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}, @rights={{0x18, 0x1, 0x1, [r0, r1]}}, @rights={{0x2c, 0x1, 0x1, [r2, r0, r3, r4, r5, r0, r6]}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x1c, 0x1, 0x1, [r7, r0, r0]}}], 0x100, 0x4000000}}, {{&(0x7f0000002440)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f00000025c0)=[{&(0x7f00000024c0)="6dcaac9c7e348e64acbdf23c82d8a566eca58fff11f3aac8c4f8d1a50c59ce933c4cf99976eff65fdd1b8692209686a98181b54d7dcea0fd5d5d24d34cc5bdc1de11f7efbdda775eb31179e99af5ae95fde281f317f33426ca888b42317282bc91dba6d84d85daaa0a34a161480d4c6021c18f115ab7377f0dda85103d7af954316e4fe5848819e2201744410934d483c91e180326c004f83d8c0d0993443fb14cb14a9767c0ea48a04de29f2d2b2f293f45beec886666f950a3816861b2b97376d402885632ded3ee46", 0xca}], 0x1}}], 0x5, 0x4000800) 22:17:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a308"]) [ 202.137408][T21544] loop5: detected capacity change from 0 to 84 [ 202.171625][T21544] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) 22:17:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a309"]) 22:17:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a30a"]) 22:17:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a30b"]) [ 202.246381][T21544] loop5: detected capacity change from 0 to 84 [ 202.263363][T21544] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) 22:17:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa840, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) [ 202.336759][T21751] loop5: detected capacity change from 0 to 84 [ 202.354762][T21751] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) [ 202.411866][T21751] loop5: detected capacity change from 0 to 84 [ 202.420622][T21751] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) 22:17:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a30c"]) 22:17:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a30d"]) 22:17:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa880, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 22:17:45 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x0) [ 202.614431][T21774] loop5: detected capacity change from 0 to 84 [ 202.643780][T21774] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) [ 202.713649][T21774] loop5: detected capacity change from 0 to 84 [ 202.724246][T21774] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) 22:17:46 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c4139909265e15587fca777d663de0c61dc72195bde12b1ddb5ad22de8a6d736f10361fafb20f915cb437a5843812b29138e02a81cbe9a1e7efad9b20ccb1ab1785661b87f59205afecc47022b53ce8f48179517123c269364427d53ff5617eb0f68e521d6a84264077a987c9c4a57613cd27464ebb962f9c9967da2deb310cc0b8e8e0d902a3c05e1c3d985699eb06fe0c07e1e5f74aa63e30ea5924c012cfd53c15727d28ff3db5d82dbe0c2175f59b146873"]) poll(0x0, 0x0, 0x1ff) 22:17:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a30e"]) [ 203.063150][T21879] EXT4-fs: 37 callbacks suppressed [ 203.063162][T21879] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 203.099652][T21882] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 203.553207][ T1853] device hsr_slave_0 left promiscuous mode [ 203.560102][ T1853] device hsr_slave_1 left promiscuous mode [ 203.566624][ T1853] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 203.574096][ T1853] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 203.584125][ T1853] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 203.591557][ T1853] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 203.599283][ T1853] device bridge_slave_1 left promiscuous mode [ 203.605538][ T1853] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.615484][ T1853] device bridge_slave_0 left promiscuous mode [ 203.621700][ T1853] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.640992][ T1853] device veth1_macvtap left promiscuous mode [ 203.647061][ T1853] device veth0_macvtap left promiscuous mode [ 203.653245][ T1853] device veth1_vlan left promiscuous mode [ 203.658969][ T1853] device veth0_vlan left promiscuous mode [ 203.761306][ T1853] team0 (unregistering): Port device team_slave_1 removed [ 203.771835][ T1853] team0 (unregistering): Port device team_slave_0 removed [ 203.781350][ T1853] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 203.793316][ T1853] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 203.823759][ T1853] bond0 (unregistering): Released all slaves [ 204.444672][T21984] chnl_net:caif_netlink_parms(): no params data found [ 204.478904][T21984] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.486237][T21984] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.494691][T21984] device bridge_slave_0 entered promiscuous mode [ 204.503557][T21984] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.510719][T21984] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.519555][T21984] device bridge_slave_1 entered promiscuous mode [ 204.538392][T21984] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 204.553160][T21984] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 204.571721][T21984] team0: Port device team_slave_0 added [ 204.578148][T21984] team0: Port device team_slave_1 added [ 204.595755][T21984] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 204.602762][T21984] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 204.628662][T21984] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 204.641793][T21984] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 204.648733][T21984] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 204.674758][T21984] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 204.703971][T21984] device hsr_slave_0 entered promiscuous mode [ 204.710517][T21984] device hsr_slave_1 entered promiscuous mode [ 204.717116][T21984] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 204.725909][T21984] Cannot create hsr debugfs directory [ 204.769789][T21984] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.776851][T21984] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.784135][T21984] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.791160][T21984] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.828102][T21984] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.838501][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 204.847004][ T2339] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.854840][ T2339] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.865614][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 204.876748][T21984] 8021q: adding VLAN 0 to HW filter on device team0 [ 204.889389][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.897916][ T2343] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.905392][ T2343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.922705][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.931356][ T2341] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.938420][ T2341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.947324][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 204.955848][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 204.970690][T21984] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 204.981198][T21984] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 204.993306][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 205.001510][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.009834][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.024071][T21984] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 205.032870][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 205.040445][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 205.048476][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 205.132876][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 205.264579][ T2342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 205.274707][ T2342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 205.282521][ T2342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 205.290898][T21984] device veth0_vlan entered promiscuous mode [ 205.299158][T21984] device veth1_vlan entered promiscuous mode [ 205.308360][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 205.324846][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 205.333115][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 205.344166][T21984] device veth0_macvtap entered promiscuous mode [ 205.352900][T21984] device veth1_macvtap entered promiscuous mode [ 205.364706][T21984] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 205.375209][T21984] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.385119][T21984] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 205.395548][T21984] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.405383][T21984] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 205.415874][T21984] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.425711][T21984] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 205.436149][T21984] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.445963][T21984] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 205.456382][T21984] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.469112][T21984] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 205.477207][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 205.488046][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 205.496946][T21984] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 205.507403][T21984] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.517304][T21984] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 205.527743][T21984] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.537632][T21984] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 205.548400][T21984] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.558212][T21984] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 205.568634][T21984] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.578619][T21984] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 205.589041][T21984] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.602300][T21984] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 205.610151][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 205.618887][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 22:17:48 executing program 2: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000200)='ext4\x00', 0x5, 0x3) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0xffffffff, 0x5, 0x3, 0x1b8e}, 0x0) r1 = getuid() sendmsg$unix(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000340)=[{&(0x7f00000002c0)="12b8a366036574cbf8084bcfaa5b2cd61174c4b72201573cbcd831732109bc3f6127dadac9d5fb4cce7296da0cf0c86db280f2b958f6038f5849aa38860e2bf5b68f744f519a99cef757ca05", 0x4c}, {&(0x7f0000000000)="b5b2b20f1f3af8951c91f6b3729aee8286b9e8f90eb8d2b2da", 0x19}], 0x2, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {r0, r1, 0xee00}}}], 0x20, 0x4000081}, 0x20044844) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) mount$bpf(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0xa10004, &(0x7f0000000480)={[{@mode={'mode', 0x3d, 0x70b}}, {@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x5}}], [{@smackfshat={'smackfshat', 0x3d, 'trusted.overlay.nlink\x00'}}]}) truncate(&(0x7f0000000140)='./file0\x00', 0x9) 22:17:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa8c0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 22:17:48 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) r1 = socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0xc5, 0x0, 0x1, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x4, @perf_config_ext={0x1, 0x9}, 0x1011, 0x1, 0x0, 0x9, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x1000000fffffffe}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000100)={0x0, @aes128, 0x0, @desc3}) r5 = accept4$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000080)=0x1c, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e22, 0x90c, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7edea418}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000e80)={0x0, ""/256, 0x0, 0x0, 0x0}) dup3(0xffffffffffffffff, r3, 0x80000) r7 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180), &(0x7f0000000140)) io_uring_enter(r7, 0x2ff, 0x6c00, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003ec0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYBLOB="000000007db068cd94dc59035af1eb3c186ed2d52a02e0a2db13c57ee3953d33b1220c1caa02bee01af0ac08afe2b92c347b9e9ce3fee0f853aa7f09223c5c86a16ed01ca7065715dfc694e21510586305eab6ec19ff5fa2cfdbf00abdedae721de60167447b083cebc5adb3b2a261b01581044e7fa74ec34929dbdebcb82208256ca322f664f947a0e62ea096c3686e247b32af572755be723b031bd23956cb2cfa69ddd270aa03370a7850fc8798cdbf652e5ebd965762bf677db4a5eb5fcf4ebb"], 0x50}}, {{0x0, 0x0, &(0x7f0000003180)=[{0x0}, {0x0}], 0x2, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC, @ANYRES32=0x0], 0x50, 0x4041}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=r6, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c0000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="000000003000000000000000010000000100", @ANYRES32, @ANYRESDEC, @ANYRES32, @ANYRES32=r7, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYRES16], 0xd0, 0x20000000}}], 0x3, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000200)=r6) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, &(0x7f0000000240)={{r2}, r6, 0xa, @unused=[0xfffffffffffffff7, 0x3, 0x6, 0xce], @devid}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 22:17:48 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x0) 22:17:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a310"]) 22:17:48 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) move_mount(0xffffffffffffffff, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c4139909265e15587fca777d663de0c61dc72195bde12b1ddb5ad22de8a6d736f10361fafb20f915cb437a5843812b29138e02a81cbe9a1e7efad9b20ccb1ab1785661b87f59205afecc47022b53ce8f48179517123c269364427d53ff5617eb0f68e521d6a84264077a987c9c4a57613cd27464ebb962f9c9967da2deb310cc0b8e8e0d902a3c05e1c3d985699eb06fe0c07e1e5f74aa63e30ea5924c012cfd53c15727d28ff3db5d82dbe0c2175f59b146873"]) poll(0x0, 0x0, 0x1ff) [ 205.657571][T22012] EXT4-fs (sda1): Unrecognized mount option ")BYG’a¯ N" or missing value [ 205.670319][T22013] EXT4-fs (sda1): Unrecognized mount option ")BYG’a¯ N" or missing value [ 205.693889][T22016] loop5: detected capacity change from 0 to 84 [ 205.712931][T22025] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 205.735446][T22016] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) [ 205.755280][ C1] sd 0:0:1:0: tag#2697 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 205.764137][T22044] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 205.765146][ C1] sd 0:0:1:0: tag#2697 CDB: opcode=0xe5 (vendor) [ 205.779753][ C1] sd 0:0:1:0: tag#2697 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 205.788801][ C1] sd 0:0:1:0: tag#2697 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 205.797860][ C1] sd 0:0:1:0: tag#2697 CDB[20]: ba 22:17:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf, 0x0, 0x10aa420, &(0x7f0000000080)=ANY=[]) [ 205.803351][ T24] audit: type=1400 audit(1639001868.752:287): avc: denied { ioctl } for pid=22015 comm="syz-executor.3" path="socket:[38143]" dev="sockfs" ino=38143 ioctlcmd=0x6615 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 205.829183][ T24] audit: type=1400 audit(1639001868.752:288): avc: denied { mount } for pid=22026 comm="syz-executor.2" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 22:17:48 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) move_mount(0xffffffffffffffff, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c4139909265e15587fca777d663de0c61dc72195bde12b1ddb5ad22de8a6d736f10361fafb20f915cb437a5843812b29138e02a81cbe9a1e7efad9b20ccb1ab1785661b87f59205afecc47022b53ce8f48179517123c269364427d53ff5617eb0f68e521d6a84264077a987c9c4a57613cd27464ebb962f9c9967da2deb310cc0b8e8e0d902a3c05e1c3d985699eb06fe0c07e1e5f74aa63e30ea5924c012cfd53c15727d28ff3db5d82dbe0c2175f59b146873"]) poll(0x0, 0x0, 0x1ff) [ 205.851158][ T24] audit: type=1400 audit(1639001868.752:289): avc: denied { mounton } for pid=22026 comm="syz-executor.2" path="/root/syzkaller-testdir313299291/syzkaller.7nsZir/1/file0" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=dir permissive=1 [ 205.877577][ T24] audit: type=1400 audit(1639001868.752:290): avc: denied { remount } for pid=22026 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 205.897489][ T24] audit: type=1400 audit(1639001868.752:291): avc: denied { unmount } for pid=21984 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 205.926415][ C1] sd 0:0:1:0: tag#2698 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 205.936308][ C1] sd 0:0:1:0: tag#2698 CDB: opcode=0xe5 (vendor) [ 205.942678][ C1] sd 0:0:1:0: tag#2698 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 205.951798][ C1] sd 0:0:1:0: tag#2698 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 22:17:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a311"]) 22:17:48 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:48 executing program 0: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 205.960881][ C1] sd 0:0:1:0: tag#2698 CDB[20]: ba [ 205.973906][T22016] loop5: detected capacity change from 0 to 84 [ 205.992227][T22244] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 206.002606][T22016] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) 22:17:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 206.003856][T22242] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 206.043098][T22346] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 206.051185][T22354] cgroup2: Unknown parameter 'd' 22:17:49 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) move_mount(0xffffffffffffffff, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa900, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 22:17:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a312"]) 22:17:49 executing program 2: mount$bind(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x2000000, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 206.052490][ T24] audit: type=1400 audit(1639001868.992:292): avc: denied { remount } for pid=22340 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 22:17:49 executing program 0: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a322"]) [ 206.129411][T22459] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 206.140204][T22465] loop5: detected capacity change from 0 to 84 [ 206.169162][T22465] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) 22:17:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x5f555fb4f324508, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@initdev}}, &(0x7f0000000300)=0xe8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setfsuid(r4) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in=@remote, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @empty}}, 0x0, @in6=@private0}}, &(0x7f0000000440)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000580)=0xe8) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setfsuid(r8) fstat(r1, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r11) lsetxattr$system_posix_acl(&(0x7f0000000180)='.\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, r4}, {0x2, 0x5, r5}, {0x2, 0x5, r6}, {0x2, 0x7, r8}], {0x4, 0x1}, [{0x8, 0x0, r9}, {0x8, 0x7}, {0x8, 0x2, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x0, r11}], {0x10, 0x6}, {0x20, 0x3}}, 0x7c, 0x3) 22:17:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a325"]) 22:17:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002b80)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000240)="5c743a01ae94c81b8c001ae585a4ab5cc9e5298bb5dc23c886ad59d5b08a839a36cafc92e00ac0ceac653448bb54e757a9155c9ab2da83eaaba38420a511fd7f641c6c0474919880a0ee7d242f60246375dbd09a915f6f785b0177e76e5562c95b7c0760dd5044ebc6374d9e3bd4a88a9bf4431d88efbcad66ceca1f8ab7de06006070677865306037a4c1ea81187639b7b166374c3529e42fd1903236249802808a047e", 0xa4}, {&(0x7f0000000300)="657250db0fc0828c01237325c3aa2a9713e8cce35d02c72910b199eb2e97cbd85e39aaec3ef0df1d21eac7e7b96941849bd6526a3abe721079d94e0c78bcb4b0c544f8fb55e687f40e725df988c955ba89a83bbc1aad0126f0ab47b0e3bc491bd826029b5819f9d3f7243fa6cdc06aba0d6d28564496435d8a5bce8952421849be692a5a94c307b0b1a213a52b55c23d98efb56b574659389b2623d35c25e6743267e33b0695ec2bfb996a208c8d14f514d4d1d230bfa4726d781ac3293fff16afa5c99ba146337bc2dcfe043c207582789fea683c83863c8302763220c8c6605ea32997dfb2", 0xe6}, {&(0x7f0000000400)="f828773d8b22ff891731c62d01b1144d0e14b8f6efbd3c92f487e4bcd92d44987dc9bdcd670cc7e27e09f592cb7f006877018021", 0x34}, {&(0x7f0000000440)="9856d86455d38ddd480517056bfa745c", 0x10}, {&(0x7f0000000480)="7ee0a3d0c61005d95fe51583844e605e93a0e69f04f5e4d45c32888b3c2d90e91b3dfa9f2647a75a6680e518df0c9ed02eea0b1df38777efcc7fc5aeb7cd14b22e8998521831d43437d2990f8fbe0cf254f99d8ae4f1aa642a0cc724cd1e08d04456172e842eb0fe2fe76bc1f0bcec5d8efd8262e13f1fac0ed0863c0b5746e7938bc42791876fd36cce20562f8114eeb758d46a003b52a1a6780562c89c5cfe9e4c2cc9cdb28dd891", 0xa9}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="0d0c7c69761a46a63865c2d856e52d2802768fe8cacc00663916", 0x1a}, {&(0x7f0000001580)="0585dbeb463b4f249da63ee8bf53a4d55cf8104e55e1cedb95547b44059870804cf3417182ba6cfacfd64cc750e4dadb3623927689a735e6926252639a3d6acd8f580829c30d4aec2eddeb97dceb5f4ee7ab92a5ed9726d8c49ad3d35e12488fd3dfc3041be246c7a7496dab4ebdd886b7a68cfa7dc127fb8d8b1b1159318a3ae03cd28784949662f764175827d01c45b1e51d3bb47f1e44b1bf2a762ac47889eafafea904330762", 0xa8}, {&(0x7f0000001640)="5cd4e0f7c32b11f0e58968e0369a59107516b39415892f442e4dfbd7ae178a8c135a7e44d7de8f935e6fd2549cec9df242ed3c2ed20e5ad7e6c72f1516ea2213bbca202cf14de25bd3d02f63d075a4847df626d149e7ed03e306444040b78e58f63bdba413be17a231ee7f53065c1b76683ac162fa8213b81857f12a2ff2004e7e703d4706d3203e6d630b7350b5535815ef927434901aa5e4f04ba6f4c0095d68df495dfbb62adc6d", 0xa9}], 0x9, &(0x7f00000017c0)=[{0xc0, 0x4, 0x8, "a9309159a162c0c35f81696cf29b1bf250acfd3fa02dd8c9e55878e024ecfdadfd746d5a1411ffed8492d1cfa2df5e1691b3c0aef87053ba0ef2e2b15367ab426a67626898c5a2ff70970bfeb515ca6d7d5b22408ab874d5e1bb01778a800c5b5bdb14778eb1c325befd14de72d976764c62691ff079c74f28a5234320b4d7075e3ca3a5a7fdc32dec5d21cc4b3dc408f9fd043fc0f330e048e75fd8001fe4354987a2b196aa6bc4c1805cfd2cc1"}, {0x20, 0x88, 0x4, "520dfd9d3e9a2378c122b0"}, {0xa8, 0x75a693200aba3804, 0x400, "74a47541ee2e4aeacd818d965b8cbdd8c8e85962b91d1c73d81673f4264273482ff16280911522a955df30fb278598b42c934a5f75b10c7cb77485343c82a3a3375afb9d7202dc5ccfba9235ce30bdd775f628733e74c94863bf5c48aadc7a6156ca3d557c961e215cec1c627d68ab8d3facfe3d45669c8f962c7fa8c5b60f66af3b154a2b67837b0b69a7ba05b64d72ed502423e81cbe"}, {0xc0, 0x110, 0xfffffffc, "9cfc2347261d22146c0642f5bc283280a4d36f970b00e7d0996ee42d61f1593a4da9da0525f4b9067da12c3588340aedeac828d4677aa1f8d4efb4b4f9bf78cbd0fe928119db4c0d6f57ab06190f2ede40a8f5bf98f7f0ff408a7ac8f6861bf996144feddbdfdd95dda1dac466f2579cc2fe7a4e9df7321bd882e4a911d047669c2361b419ce014c1d7d4fec43af7a23c304a2fc5b3b4b718fbf591627155e178d08fea7e7678682bbf2e0eb3e"}, {0x1010, 0x1, 0x3, "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"}, {0x80, 0x0, 0x4, "124b56da3a5f3d426263864d32631e9b158c87c55610d862ef8755f29e7ff0596ece7513643ffadf1fdbc0edc60014a55e3639c60c32cb2e231f368b3264a43972682774bd5ddad20f7d1e37a2e72f8b45ee02e349ec4a07e5a83c76e88e02177d4f12e0287b9fd303f0"}, {0x18, 0x10d, 0x32a6, "49bfef92"}, {0xc8, 0x1, 0x3, "43ebe9b2ec898b29e41e0fa4e35b2a6f3595b95c2c599a1a9a8476aace373017856c8f9474d8d94a6b4a14636482ff43fda4e428c281a31a8e016e40d5df7f59e9ef5773effdaedaaee43206bfd86b6dd05b14a291b5a47ab780281556b94220124410fafe294b5105f980dadbb3e5e0739097553bd5c7cfad39056a2128bd2829f05a03ffe6e0defbc1789eff6dfc6287dd84da5fde40890d326c1f2869e99e9f5a0f866fe305a64b5202ddc1c6f1eec1"}], 0x13b8}, 0x814) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00']) r0 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x116) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x5f00f000) sendmsg$kcm(r0, &(0x7f0000004400)={0x0, 0x0, &(0x7f0000003ec0)=[{&(0x7f0000002bc0)="a4de0e1f5660e498b1f952586b82ee4e1d1b1ec2d98fe665b8fc87f2178db15b81d03f20e016177a844a336ae374a0c6aac3306ce659978f60b5f6ff975c1d258ac236d491fb12814057fecc214eab32d7ef0fba3894a86894e9c234ad28de329b29a4e3850a1ef9c7b4b9216686ca3d8ad357d93a9d3ecf15b89e1bad74ffa649455b59150f4d0747004edd6127554bdbf54f1c7d58b9f51e9156b6b529bc19e99b2db7822860d2deccbf649e04e9ed3b3f626242dd206282be829db2a37995448254c935fc00cf9b6c694adb88615a8731133486e5080129", 0xd9}, {&(0x7f0000002cc0)="4bfcbdb38ec9bfcd8d77798585d920fa4fa6556f26f42544c7da8f31b8204b97f4d046279a416e0361f0fe9c34b17ccaf4c2450c8b3dab23267e7db369f03af9509ace15ed0956c7e2db933086d2b03461dbadeb07211d0c08cbf484508174fe802a78148e99cc912f971790639211f330457b9143abc50a8175fe963967a8370a1e9f5f75e0461da317e5db0f58db1560a616829369", 0x96}, {&(0x7f0000002d80)="b353a8cfc23fb17dc7579603fc53aae4845418b6a3248ff3d39f54936ba77a07b98f327865db29cf44f4", 0x2a}, {&(0x7f0000002dc0)="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", 0x1000}, {&(0x7f0000003dc0)="a30fa48c064b1f73c0c1932ec61ddd79f7f58b6a49862eb121ad574170512a1d0e05ec186edceb995e30033a90e3ee253f80a75f06df4b07d5c92905bd52735bf35566057a5686b1b33e995d6245d5338c4e023a7e582b5d0894a89caa04d56936dba0c87e775f70fb7094ac4183b51345febf72b228ed07ac711da417caf74e24334a5e6e613ce908e475a79c05dbed0dc8e7e1eadb7b127c481a35b4322c3c7d2d609b981b9728cb31cdc2977106d78747da5fd9c424db18beebc16f9943686194c8230a1ef837b7f0da20a07a617317ad94563edb", 0xd6}], 0x5, &(0x7f0000003f40)=[{0x60, 0x3a, 0x6, "ca81daca7fcb12a413792f180aeed5888a2431d634038062e2f3d6a3d02c028bcb8893592a8e410f97fd3a7124591b47b98acedc32a6e006a74a61c7e0229ccacf79c7c30c33b3891c7f96"}, {0xe0, 0x115, 0x74, "1a4fae0b53a7ba5758dcfb579008bfb6b3092f99a1e35a30f378f701f2f3e56dbc5fc8eb9632ff4a8959a94f994ba2ed57f083c3b5e59ce345428a39f1e88cc77afd6fa0f1108fbc065dc2297c56b1d23ad6aa7f0d8b6d144060c6e17f3ff78c4884a008958cd8fea24f515651c1c4b3b33a5ee2f34eaa0b7db46d4115e33cd9c3a39f0f54e81fe301d9b8d088878ce8341d72594ea8e4873185bffdaa288e886c651012eaa27e125408ee3f58e1723d9272a24ba7b4ecdedeaa9a67089511fa6425fa072cfbdd23345bef495da466"}, {0x78, 0x1, 0x1, "25acf5b2b4afa2d655298ce6d1522c670e9a3da6ee22586a96d996d3bc8532d3dd9d3d6fcf74c16aa65774365f4cc910a5f76d03c426f3bb28951566b059fe99d13d99eb092a787d8a0fa07044f2ffbcfac31774b2b5789c827ca6648d288ab5d2e0d801"}, {0x100, 0x10a, 0x9, "89fbb41f76d350198f020ae15dc63090371b0c3c0d305220dbd7f7281eda00e1d41abbb64c92337e91e9abc9753c21dada3921a77db359556c505e3e334b292a4bd3fc2ccdb11054d0850526552299e6de55b302a5d735f8a98c4be769a772db2fe69fe7fce6b20d0430096becfff86a66f43fe46a52d5298d7247a4ce8825e14d7a77c63290d3c6dfbdfb9601deb443b7820d2014257662521b83c3bad9bc663a486f44a42c69a58ac277cf8a00fe7fe682a6eae279c2ae26f8cfd23878b487d1fc55b767bd3ae219d5e3d66f7f2535d45335d7cda2064588d5aeff39e692b3e5ca216596c47a4b390f"}, {0x30, 0x10b, 0xffff8000, "92bb1fe6e44386862af3592f9aa3e4356f8316ae5d3e7e892a3ca5"}, {0x18, 0x0, 0xea3b, "8087e81417"}, {0xe0, 0x105, 0x4, "023530d44c12bda84078a13af0b19660a83b6c6334e27041c95647ad5cd321f418e80c6f8d5e361eb63dd7cecdf4a61765b255ed3b17dc7ffc8907337f37caf4f415871c8fac80673bdd3e5689d0110078d7f70cb54695352b1689dcc7d129971d33305f01e8b8db15ccad89835c0aeae9fd9744913adea99bb25e976f8ddd1263be4397c0086ceecdbbf112f0d289ba2d7e10d3ef71e542c3ecff41989a1b7aec6592667c97bdbffdcf34463ecfeb026b5d486930437f3472086059b34d1f5a0c58b7170b7617184b73"}, {0xd8, 0x103, 0x0, "4852846f8e6c74fc52f97cb8000cb9fdd0f76c097359f6d9296d22949dca533ae19c2a24cb6c60db5c74c67be55f7f20ba51b14fd64069855df4a7000ef434ecce1029315af6f13dbd6c57fbeed0c6213614bb72fdc25075749e8102b903710824add50a6fd0cddad9af526c48f5e971f978250dd11c64df2aa855a5f5d6e9a2d845f9139aba6f280152454d2253b2302d5dc3498f8183d93b060474c1477e045b2eb66aeb6a9d328fa9b22d83cfdbedf794e0b6de945beae257f684843eed2937a80452a0dbc022"}], 0x4b8}, 0x4008000) lremovexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'user.', 'ext4\x00'}) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') [ 206.243662][T22465] loop5: detected capacity change from 0 to 84 [ 206.268083][T22465] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) 22:17:49 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x2}, 0x0, 0x10000, 0x0, 0x9, 0x0, 0x800000, 0x1}, 0x0, 0xf, 0xffffffffffffffff, 0xa) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB]) 22:17:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a32e"]) 22:17:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20000, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108e420, &(0x7f0000000140)=ANY=[@ANYBLOB='\a']) [ 206.959107][T22692] 9pnet: Insufficient options for proto=fd [ 206.979646][T22694] 9pnet: Insufficient options for proto=fd 22:17:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002b80)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000240)="5c743a01ae94c81b8c001ae585a4ab5cc9e5298bb5dc23c886ad59d5b08a839a36cafc92e00ac0ceac653448bb54e757a9155c9ab2da83eaaba38420a511fd7f641c6c0474919880a0ee7d242f60246375dbd09a915f6f785b0177e76e5562c95b7c0760dd5044ebc6374d9e3bd4a88a9bf4431d88efbcad66ceca1f8ab7de06006070677865306037a4c1ea81187639b7b166374c3529e42fd1903236249802808a047e", 0xa4}, {&(0x7f0000000300)="657250db0fc0828c01237325c3aa2a9713e8cce35d02c72910b199eb2e97cbd85e39aaec3ef0df1d21eac7e7b96941849bd6526a3abe721079d94e0c78bcb4b0c544f8fb55e687f40e725df988c955ba89a83bbc1aad0126f0ab47b0e3bc491bd826029b5819f9d3f7243fa6cdc06aba0d6d28564496435d8a5bce8952421849be692a5a94c307b0b1a213a52b55c23d98efb56b574659389b2623d35c25e6743267e33b0695ec2bfb996a208c8d14f514d4d1d230bfa4726d781ac3293fff16afa5c99ba146337bc2dcfe043c207582789fea683c83863c8302763220c8c6605ea32997dfb2", 0xe6}, {&(0x7f0000000400)="f828773d8b22ff891731c62d01b1144d0e14b8f6efbd3c92f487e4bcd92d44987dc9bdcd670cc7e27e09f592cb7f006877018021", 0x34}, {&(0x7f0000000440)="9856d86455d38ddd480517056bfa745c", 0x10}, {&(0x7f0000000480)="7ee0a3d0c61005d95fe51583844e605e93a0e69f04f5e4d45c32888b3c2d90e91b3dfa9f2647a75a6680e518df0c9ed02eea0b1df38777efcc7fc5aeb7cd14b22e8998521831d43437d2990f8fbe0cf254f99d8ae4f1aa642a0cc724cd1e08d04456172e842eb0fe2fe76bc1f0bcec5d8efd8262e13f1fac0ed0863c0b5746e7938bc42791876fd36cce20562f8114eeb758d46a003b52a1a6780562c89c5cfe9e4c2cc9cdb28dd891", 0xa9}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="0d0c7c69761a46a63865c2d856e52d2802768fe8cacc00663916", 0x1a}, {&(0x7f0000001580)="0585dbeb463b4f249da63ee8bf53a4d55cf8104e55e1cedb95547b44059870804cf3417182ba6cfacfd64cc750e4dadb3623927689a735e6926252639a3d6acd8f580829c30d4aec2eddeb97dceb5f4ee7ab92a5ed9726d8c49ad3d35e12488fd3dfc3041be246c7a7496dab4ebdd886b7a68cfa7dc127fb8d8b1b1159318a3ae03cd28784949662f764175827d01c45b1e51d3bb47f1e44b1bf2a762ac47889eafafea904330762", 0xa8}, {&(0x7f0000001640)="5cd4e0f7c32b11f0e58968e0369a59107516b39415892f442e4dfbd7ae178a8c135a7e44d7de8f935e6fd2549cec9df242ed3c2ed20e5ad7e6c72f1516ea2213bbca202cf14de25bd3d02f63d075a4847df626d149e7ed03e306444040b78e58f63bdba413be17a231ee7f53065c1b76683ac162fa8213b81857f12a2ff2004e7e703d4706d3203e6d630b7350b5535815ef927434901aa5e4f04ba6f4c0095d68df495dfbb62adc6d", 0xa9}], 0x9, &(0x7f00000017c0)=[{0xc0, 0x4, 0x8, "a9309159a162c0c35f81696cf29b1bf250acfd3fa02dd8c9e55878e024ecfdadfd746d5a1411ffed8492d1cfa2df5e1691b3c0aef87053ba0ef2e2b15367ab426a67626898c5a2ff70970bfeb515ca6d7d5b22408ab874d5e1bb01778a800c5b5bdb14778eb1c325befd14de72d976764c62691ff079c74f28a5234320b4d7075e3ca3a5a7fdc32dec5d21cc4b3dc408f9fd043fc0f330e048e75fd8001fe4354987a2b196aa6bc4c1805cfd2cc1"}, {0x20, 0x88, 0x4, "520dfd9d3e9a2378c122b0"}, {0xa8, 0x75a693200aba3804, 0x400, "74a47541ee2e4aeacd818d965b8cbdd8c8e85962b91d1c73d81673f4264273482ff16280911522a955df30fb278598b42c934a5f75b10c7cb77485343c82a3a3375afb9d7202dc5ccfba9235ce30bdd775f628733e74c94863bf5c48aadc7a6156ca3d557c961e215cec1c627d68ab8d3facfe3d45669c8f962c7fa8c5b60f66af3b154a2b67837b0b69a7ba05b64d72ed502423e81cbe"}, {0xc0, 0x110, 0xfffffffc, "9cfc2347261d22146c0642f5bc283280a4d36f970b00e7d0996ee42d61f1593a4da9da0525f4b9067da12c3588340aedeac828d4677aa1f8d4efb4b4f9bf78cbd0fe928119db4c0d6f57ab06190f2ede40a8f5bf98f7f0ff408a7ac8f6861bf996144feddbdfdd95dda1dac466f2579cc2fe7a4e9df7321bd882e4a911d047669c2361b419ce014c1d7d4fec43af7a23c304a2fc5b3b4b718fbf591627155e178d08fea7e7678682bbf2e0eb3e"}, {0x1010, 0x1, 0x3, "8ee320504baa874319226415ee577f65a512bbc3bf52806731ea9dd9b4b1d5b83bdef06a7ca61161f4e14f367f76ecbc46d07de915596ca6a4cdca433e6beb1026f85168653efc2263884a9615c4c8db4dfbffce6908bba8f3c1aefb10ccb8eef2b64c6459876fe9e17815272aa5fde3992401192698c854c1d3124bda76bd00b7bb936b99b2e3564b77a23dfeb6227c198254fc0f0fd4d4f05a81c2b84016f02a7f48ce21527b794dcfba6f45e83d1b341ff4618227332ac0a094d87cd93801aae01a66e2bd63f7975cb62f5a9685560a1bf86719f39872f8fd478f2575992afe79dfbf808b8d91b3462f00ad4e6938e8af2ae3d2d749c6ab3765cdf36269885d3b526785607f1c4a26ca32695db5ca734cbbe839a50c406035963d2b614ba6a8185bebb522d2127d5493f3b8e4acfd3dd3921dfdc7058613005d07ab04aa283fea74b54410f7dea981299afdd1a1b940e4cfc75f8db23b962cd0ad55710d73b7c75d5698a65d383f11e30be82c2f36579d448b1158c4b5507e07ac53a94ec39aa98ab1543ce2f4bb444e1eb58130c3b6042e81bcbed6cc7209c381ae6022f88fea3e5f434ba78270ec7dc9e8d5632a5d31c23e8a4a85fc1e213e517b45d00db5a20421c373806e776a7b99fd71923e7f4b0c50ee16c851e160858a96d5387d2bfacfac60d96c6442f78fc9a801c1a7995624e5d890b96cd25b3cee98a53f6878722af3da59f3425cbf8752a8d340fe65fe1516cd77b71cde48a118d0618fd0a3f53065fa09ed72dd83974a56f96298c42668472e649cf6d681f7904ff4301e8cfd2da94413251d141bff04ee128a2de332cb5ff4722cd3bf0f69f8b96db82f9d60341b71e6d0cb5dfa41bf04d5d7b285728b1ca8190d8f23ddeb97bcbee56a144808c03122b9b8969fb487234066959317939f0ac0e386c186888d8aa19157bb086c93bfb8e03a54bca0d946773c6ff48eb9a767fff49b441fe88d96a1c455e0a9951cc5fa346774344869f779296a31b6bb2bba8cc741418ab65510bb7249fa12b7a603d26c13c9849e8340b85151ff7ff6dfbc35ad5dbec4b94709bff1ec26e2244638540a073b8ccb81d7d6c173886dd4ac1a0d83b4e3f098042ce0d4ebdf8064f8d3316e4f799478fcaf55b89aec9b5c4a59937be5702413bcbff0236112a3e5e8d2bcf5503c0581a5dfb82d18cdb7e1ff818edad0557ae9f367579be868359950bf738f77f98941d2566f372b7c59496dc07e263001f4376d21507c80cbe05e403e7a2b8ae3b6d0a47c69bb233ea665068737a9ccb9f3a65f8cce68a58008cdd7b0019f8c07ea20865e2b5bd23c8bcfcb2172f47667256af64b54eaf33751e4514dc53834ac272ad1bac5d71cf32535a6748aaf84e57ce09c12463cc313bc6710679c8083868fa96bd7407e284e28937364d99edf1d8d054ce463b1e03c3edf392a64b71e493b8ea11d6ce94f1de820af90be5028287add47c7a7e476158c8f98209a7cfb1e5f8a9575be1f5337ebd1530e9c824fafff1f0ed2e7d3e394bc48bd23c5f7beddffeebbbd8197bdb73688be798c28c8ab79f31a4a1e21a68bf8aabb5874d13690dccd91c6a75600e77e4c66c777906dc09ba21234e540db20acbf4377adf103b4983f8e6684e940a633288ca4db71010cdb471f98ac8748216b50aa19ac54bde8b8f8957217fb4cd74b68c149ddd45e9b70e3daf3165bf83270a641b2f13d5171a9e46fcc23066f66c26e8c6b5b545b1198bfe68f9f30eb64fbe567c92d4245239a0304dc78dcd0dba65b72d14a23410a0e1d330d68983931bbbc522c4514f39cbe664cc320d3a66ff5e547391ffffb3d32c92443e1c1caf8b304e6a9c525c45d71e3d5c0f011162dd0b74924e8dcbd86d5b59a50e7081965ee92d4257bb04cd34d835fc72339d3628a9c05f2d022b6839647f77aaf6dbe9fdb7cc0128393645477facbf00c91a91360a5c4c9dc29b42728e0f9729b9335814c77209836c6090238975267ec7f2c777df718d7f2936128c755ff7f8ae5fbe38c1cfb489a2bae078e8026d8c6c555ff026bd139f37daa37d2ac5fed0dff6482719c2735d854cee8dd4339492b41d7527cde66bfd8223f46a91606c048a3d150c403ad0797e63812e13c3b4f4ac26f92ca016d9e72fafc39cafa8fd3451e5cd9a97d0c7371d72b2c2a947b5f683bd4c40087ddc420bc7b1806b4b1a0ad140af75347330c7153ac22670383ea1afeb4f02e59797059490b413e0ef61cfdb425d295e11fe6a46c624d30418cdbcf105742f962f7aec35bced9d99967c37904751142c3c769a9ee6cf21138646464fe8ba7c08b0d7f62abbcde32bec173d483a636a3f8c55f45d84814b2bd56b791efca21529f85bc1a8675082247693a3acf13e9bf3a1adeceb170611683128017479c326c4a95877162d727faa9cb45f96c504da9bec4450a2a0d8605647207430ee6e3ced7649fc54614698bef771e8906628412c05513b0dcd7d885387d8aa9894a057851a7897898f2135901d5e8d792e3dbe3751b19f32fe3b431606ca6ce91f6a8416ac7e948cf729c0f058892ba616d456b4239cf02722d24fd7581d4a71d7bcd66e0b28e61cd6444e14e92231b0662b0d59522a7b39f6ca64442eb6ff8ce90cb2e07b26a09e676716a644ef574094112fe4b8e3cc2b6f78c40265c88961f746bf789fde669a52c9ebb367b46262ff63eaca635d2a427092dc2077fb285ebb077eeed1cae3b035f1dc94d0e3ec0ab55b8b327c4016d675ac28b820e8d730d329d85c52ceb01853407a80efec1eed5e778ae2d5c181bd6b74e21c699d7d6a280b1f36e87a16fbf523567fed60e9a788f325aef6f9a66ce494c01dd57649eb67de07b2a9748a712059f2d84b7076fa56dd621739a42b426a0819480d99bad2c92e646b4ae0f979d67b561914d79a633146745699fa03d16b850df494eb3d492b3ea24d10212f242b9d73b0335ca78796d40d013e849749adf46811d9edde68a992db1423395a1afd937a0d415308d54a739493a7b23413412a106e6c3b63048cd429adb10aff93ecffe41f1c70a9da017c7b22a956e3916c793a23f209644db1f249725168f1bb068473bb8237d67aabd46580dd3c11a9e508f5e5528de4f17ed4e1aabd5885c3b40345cf3458892e91f74614c2fd6da6d7746400d7363bf797da704bcacbfc4d7b4e90de3396e5a7dd823a9b9cdcd79b7d304f3beb668fd649ae2d2e0ab8a21dbd76c936a189233b29f3d1a960965fa18731c224005cf4f0bd8d920b6fb0ba58c4e9a2a5fc5d207fe7a3ba40bfab939a4246c19d39891878c17e23fa90865e7517f44405768d8ba3717c5aa79e5b3eec91a3e0fb88ddf53c27ee591789c60e267ae394756067570ca657ca3cc5c27c485640a970c7be4c284fde8a31123c3f3b4d122a68f787e189e8e3885d3aa13212763cd74c2c66e27196d7ea864b8f73c9d5aa9e135623b9da78bf5babaccca2e8856ad8926271c4bf776eb4e0b78dda79110bbf3ad4b9ce7912aeb99a9e8983e54c7805ab97cdba8065516fe5e32987b060c327cbc539992b6b7294e398f51e7cd0477f18d95be590bf5c610c66709d1d8d49c5102fc7614521d4e0996e219f27b9e63eea2f78ba0654f250347810aea2e201b2a2101f3a5368487077dcf16e15cdb6f61c4369c7588af6daa2cac69788bd98b6af0e2330917bf71d1af446e33319e812297bb068f381792f041c28cc5f36848c3c7c0fd85c0989f592bba518782e842b920f2b3a102b0ac3052dbf3c42c3bc59ce4862118d6ec425143b161daac04b16bf5424d11cb88b20a87e59c55dafe9ed1a98c3ee795593e9190ae2d911be3dcc77f1348c636d53c38ed4f6e7907c0f6829f57b570f330c026c92eba12ba3217a1b7647be5b4d4c4c6aa58e1d60e52087221c31a7cc0ce074093cd6cae4399ae729d539874b2db4f4f65c8aa015014402f150afc6817514ed4e48782a8226733f27ae04b8d01a037f9de1e3f5433affb57332b8975bfdab171321e5b77627560289d84c16d22de8843b43d93ed9645e8529a32901a4dac592677f925204c90cc492059df97a4f991527d3a654a0b9d31eb3a29efb82f753228faa7bca5380f8b88c8960f095d9ab95655375fddd51d12a17ef3fab11b3e54b72a0b1598e999559935750dae2fb92beb5aa999b25af04408d4cefc842891322cf03ad46670190e575f89df00657bebb62ef190943f542b33cdf583122bb37809951514f4dd125703fd831a396edbd4d14a8d226ee3ddd9a61a367c1974ed599871be7a0839dcc6ca3990eb33e93e766cf98a090909ed7be4d4d9f03fffa7950a1b2ff73358fe9e67563156f4df039f594cc12f13b9dd5be03d17c7dcb8ec3ae0e1765d931bb40ab4d40fd390cad5d810a4cb99618494f21d7c361677254c2cc1d2052461f20d3675e8598c9c0f14bc1f8e81cbfdf4e9e2ce46976d31b4f2022834962ce1e96e8bd4e3c6ca5508547879aa0491ebc5543aac8abc3c468de4a236256b19bcb8457ed6d81b68826189e881639384a1717404467b687f246da18adb30c8ddca51db12dcc4da5d359cbb8273ef7c00c8cfb9dcd6175c0ea09905d417707f79127c810e4c25819686c3d8e3cae489da412fa2ae3c891e9bf025b02d1883ab67ce739449cee8684848a227f8e17e0e145407d8ad70577777808d27cf061a261c25ede6b4fbf71d9f26143be0835a89a8fef34e803dbf0ca249249f29688807d3ea46d07f1344b8fd7cb17cb3e539c24d6ce624262c78ee8b935ed2166cdd107addfb32078f7014abc953749b918a7d077575333c4c80e5c1a3ed5de8a1a7102aed6528db5cae92256fd2ecebe14773eb5f91e4c6bfff6d3b8930b9c6ab97057cf361267dd8304b2a5e2515285674b959af01a19818096935b62ebaaf607a89b4d1313ebe259f5aff241efff308159613e86782c64d06b4938daacee47c1aac2239d85a41a56d27656c3b525c2a4ed05d4f2f8f238c3f1f32b2c5188f0ed6f921c3da853ce3b297cccaa9519c87c11c5ec1beb89d1d9ce5ec70d9d453e81b5274846e152f0cfa3678ddfb78defef8aaba5b79191982f07a30cbd98d4475986f7e85114b517dc0d9451025f87073f5aa75b6c720769a49c1d271690a1425a3b3cb8648adef5fbc642275d1d43e0ff7e71a83ca7717db686054aa71e87fb7c081b05f73139a937dd6d9a1a68cb73562d624e3cac1091874766fdd5b0ccdcd58a50707139b999aced2fd065f08c96a76316700885343f90e47c34fab51d7fa5b991a4cbd38178072950544caebd93de24686a9ba130d04bc0d8cb4162128289f4177fc57f257aa13d0099ce123478e81ac97e78d1207cb62a96ef250de898195688c1694ae66fba7a8a2943bae99f3a25b9a9238dfcbb74c32bc3a6b342ccc509ee6af9cd19561f8fa1a882c5c4843651c1a433d4aec476809d711e3d0904e7e71bd37dc87653e038701f3a3bd5829fe72b0ad28c087db9b5cca6bc05211f31f5c78e94a11ee5f029109759962eb9233b707d25ff51d46d734e5af9da1db5836130c086a7f720ef9078769e6516bd9416980a4aef3505a9f1f20fe40d0f53f3c36c16bb34ad44dd171f2205a0ff10690a511ed2b3ac7128859665bd87575a77af00e62338fe2b30eba1016c346e36278630e907ffa8497663339f2a2b38c814e0c33ecd19570bc97e27c5ea002036f9b8aa108e11db256174f5a3956a7cedf93fda0f80d0bea38178c0893087834fe3bef188eb72cc76f64dd5ed14eeb"}, {0x80, 0x0, 0x4, "124b56da3a5f3d426263864d32631e9b158c87c55610d862ef8755f29e7ff0596ece7513643ffadf1fdbc0edc60014a55e3639c60c32cb2e231f368b3264a43972682774bd5ddad20f7d1e37a2e72f8b45ee02e349ec4a07e5a83c76e88e02177d4f12e0287b9fd303f0"}, {0x18, 0x10d, 0x32a6, "49bfef92"}, {0xc8, 0x1, 0x3, "43ebe9b2ec898b29e41e0fa4e35b2a6f3595b95c2c599a1a9a8476aace373017856c8f9474d8d94a6b4a14636482ff43fda4e428c281a31a8e016e40d5df7f59e9ef5773effdaedaaee43206bfd86b6dd05b14a291b5a47ab780281556b94220124410fafe294b5105f980dadbb3e5e0739097553bd5c7cfad39056a2128bd2829f05a03ffe6e0defbc1789eff6dfc6287dd84da5fde40890d326c1f2869e99e9f5a0f866fe305a64b5202ddc1c6f1eec1"}], 0x13b8}, 0x814) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00']) r0 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x116) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x5f00f000) sendmsg$kcm(r0, &(0x7f0000004400)={0x0, 0x0, &(0x7f0000003ec0)=[{&(0x7f0000002bc0)="a4de0e1f5660e498b1f952586b82ee4e1d1b1ec2d98fe665b8fc87f2178db15b81d03f20e016177a844a336ae374a0c6aac3306ce659978f60b5f6ff975c1d258ac236d491fb12814057fecc214eab32d7ef0fba3894a86894e9c234ad28de329b29a4e3850a1ef9c7b4b9216686ca3d8ad357d93a9d3ecf15b89e1bad74ffa649455b59150f4d0747004edd6127554bdbf54f1c7d58b9f51e9156b6b529bc19e99b2db7822860d2deccbf649e04e9ed3b3f626242dd206282be829db2a37995448254c935fc00cf9b6c694adb88615a8731133486e5080129", 0xd9}, {&(0x7f0000002cc0)="4bfcbdb38ec9bfcd8d77798585d920fa4fa6556f26f42544c7da8f31b8204b97f4d046279a416e0361f0fe9c34b17ccaf4c2450c8b3dab23267e7db369f03af9509ace15ed0956c7e2db933086d2b03461dbadeb07211d0c08cbf484508174fe802a78148e99cc912f971790639211f330457b9143abc50a8175fe963967a8370a1e9f5f75e0461da317e5db0f58db1560a616829369", 0x96}, {&(0x7f0000002d80)="b353a8cfc23fb17dc7579603fc53aae4845418b6a3248ff3d39f54936ba77a07b98f327865db29cf44f4", 0x2a}, {&(0x7f0000002dc0)="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", 0x1000}, {&(0x7f0000003dc0)="a30fa48c064b1f73c0c1932ec61ddd79f7f58b6a49862eb121ad574170512a1d0e05ec186edceb995e30033a90e3ee253f80a75f06df4b07d5c92905bd52735bf35566057a5686b1b33e995d6245d5338c4e023a7e582b5d0894a89caa04d56936dba0c87e775f70fb7094ac4183b51345febf72b228ed07ac711da417caf74e24334a5e6e613ce908e475a79c05dbed0dc8e7e1eadb7b127c481a35b4322c3c7d2d609b981b9728cb31cdc2977106d78747da5fd9c424db18beebc16f9943686194c8230a1ef837b7f0da20a07a617317ad94563edb", 0xd6}], 0x5, &(0x7f0000003f40)=[{0x60, 0x3a, 0x6, "ca81daca7fcb12a413792f180aeed5888a2431d634038062e2f3d6a3d02c028bcb8893592a8e410f97fd3a7124591b47b98acedc32a6e006a74a61c7e0229ccacf79c7c30c33b3891c7f96"}, {0xe0, 0x115, 0x74, "1a4fae0b53a7ba5758dcfb579008bfb6b3092f99a1e35a30f378f701f2f3e56dbc5fc8eb9632ff4a8959a94f994ba2ed57f083c3b5e59ce345428a39f1e88cc77afd6fa0f1108fbc065dc2297c56b1d23ad6aa7f0d8b6d144060c6e17f3ff78c4884a008958cd8fea24f515651c1c4b3b33a5ee2f34eaa0b7db46d4115e33cd9c3a39f0f54e81fe301d9b8d088878ce8341d72594ea8e4873185bffdaa288e886c651012eaa27e125408ee3f58e1723d9272a24ba7b4ecdedeaa9a67089511fa6425fa072cfbdd23345bef495da466"}, {0x78, 0x1, 0x1, "25acf5b2b4afa2d655298ce6d1522c670e9a3da6ee22586a96d996d3bc8532d3dd9d3d6fcf74c16aa65774365f4cc910a5f76d03c426f3bb28951566b059fe99d13d99eb092a787d8a0fa07044f2ffbcfac31774b2b5789c827ca6648d288ab5d2e0d801"}, {0x100, 0x10a, 0x9, "89fbb41f76d350198f020ae15dc63090371b0c3c0d305220dbd7f7281eda00e1d41abbb64c92337e91e9abc9753c21dada3921a77db359556c505e3e334b292a4bd3fc2ccdb11054d0850526552299e6de55b302a5d735f8a98c4be769a772db2fe69fe7fce6b20d0430096becfff86a66f43fe46a52d5298d7247a4ce8825e14d7a77c63290d3c6dfbdfb9601deb443b7820d2014257662521b83c3bad9bc663a486f44a42c69a58ac277cf8a00fe7fe682a6eae279c2ae26f8cfd23878b487d1fc55b767bd3ae219d5e3d66f7f2535d45335d7cda2064588d5aeff39e692b3e5ca216596c47a4b390f"}, {0x30, 0x10b, 0xffff8000, "92bb1fe6e44386862af3592f9aa3e4356f8316ae5d3e7e892a3ca5"}, {0x18, 0x0, 0xea3b, "8087e81417"}, {0xe0, 0x105, 0x4, "023530d44c12bda84078a13af0b19660a83b6c6334e27041c95647ad5cd321f418e80c6f8d5e361eb63dd7cecdf4a61765b255ed3b17dc7ffc8907337f37caf4f415871c8fac80673bdd3e5689d0110078d7f70cb54695352b1689dcc7d129971d33305f01e8b8db15ccad89835c0aeae9fd9744913adea99bb25e976f8ddd1263be4397c0086ceecdbbf112f0d289ba2d7e10d3ef71e542c3ecff41989a1b7aec6592667c97bdbffdcf34463ecfeb026b5d486930437f3472086059b34d1f5a0c58b7170b7617184b73"}, {0xd8, 0x103, 0x0, "4852846f8e6c74fc52f97cb8000cb9fdd0f76c097359f6d9296d22949dca533ae19c2a24cb6c60db5c74c67be55f7f20ba51b14fd64069855df4a7000ef434ecce1029315af6f13dbd6c57fbeed0c6213614bb72fdc25075749e8102b903710824add50a6fd0cddad9af526c48f5e971f978250dd11c64df2aa855a5f5d6e9a2d845f9139aba6f280152454d2253b2302d5dc3498f8183d93b060474c1477e045b2eb66aeb6a9d328fa9b22d83cfdbedf794e0b6de945beae257f684843eed2937a80452a0dbc022"}], 0x4b8}, 0x4008000) lremovexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'user.', 'ext4\x00'}) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 22:17:50 executing program 0: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a348"]) 22:17:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa940, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 22:17:50 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd\x00\x00fdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',\x00']) 22:17:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a34c"]) 22:17:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a360"]) 22:17:50 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/schedstat\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 207.257697][T22701] loop5: detected capacity change from 0 to 84 [ 207.284700][T22701] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) 22:17:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a368"]) [ 207.347190][T22701] loop5: detected capacity change from 0 to 84 [ 207.355041][T22755] 9pnet: Insufficient options for proto=fd [ 207.373767][T22701] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) 22:17:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa980, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) [ 207.420634][T22817] 9pnet: Insufficient options for proto=fd 22:17:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a36c"]) [ 207.470353][T22824] loop5: detected capacity change from 0 to 84 [ 207.500652][T22824] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) [ 207.574182][T22824] loop5: detected capacity change from 0 to 84 [ 207.593499][T22824] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) [ 207.697335][ T1853] device hsr_slave_0 left promiscuous mode [ 207.711114][ T1853] device hsr_slave_1 left promiscuous mode [ 207.731244][ T1853] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 207.738659][ T1853] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 207.780902][ T1853] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 207.788325][ T1853] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 207.815048][ T1853] device bridge_slave_1 left promiscuous mode [ 207.821420][ T1853] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.831354][ T1853] device bridge_slave_0 left promiscuous mode [ 207.837559][ T1853] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.864051][ T1853] device veth1_macvtap left promiscuous mode [ 207.870088][ T1853] device veth0_macvtap left promiscuous mode [ 207.876114][ T1853] device veth1_vlan left promiscuous mode [ 207.881877][ T1853] device veth0_vlan left promiscuous mode [ 208.018642][ T1853] team0 (unregistering): Port device team_slave_1 removed [ 208.029153][ T1853] team0 (unregistering): Port device team_slave_0 removed [ 208.041575][ T1853] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 208.053479][ T1853] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 208.085752][ T1853] bond0 (unregistering): Released all slaves [ 208.555369][ T1853] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 208.594338][ T1853] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 208.665214][ T1853] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 208.734751][ T1853] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 209.168612][T22829] chnl_net:caif_netlink_parms(): no params data found [ 209.205903][T22829] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.212983][T22829] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.221871][T22829] device bridge_slave_0 entered promiscuous mode [ 209.229214][T22829] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.236322][T22829] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.244221][T22829] device bridge_slave_1 entered promiscuous mode [ 209.261670][T22829] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 209.272125][T22829] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 209.290633][T22829] team0: Port device team_slave_0 added [ 209.297002][T22829] team0: Port device team_slave_1 added [ 209.312670][T22829] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 209.319617][T22829] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 209.346822][T22829] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 209.358895][T22829] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 209.366042][T22829] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 209.391945][T22829] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 209.415212][T22829] device hsr_slave_0 entered promiscuous mode [ 209.421759][T22829] device hsr_slave_1 entered promiscuous mode [ 209.428163][T22829] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 209.435750][T22829] Cannot create hsr debugfs directory [ 209.500699][T22829] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.507819][T22829] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.515080][T22829] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.522114][T22829] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.577644][T22829] 8021q: adding VLAN 0 to HW filter on device bond0 [ 209.587408][ T1912] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.595314][ T1912] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.610010][T22829] 8021q: adding VLAN 0 to HW filter on device team0 [ 209.617131][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 209.624721][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 209.642089][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 209.650485][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.659172][ T1919] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.666321][ T1919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.674100][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 209.682552][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.690784][ T1919] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.697805][ T1919] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.705599][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 209.714174][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 209.722875][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.731088][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.739490][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.747787][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.756356][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 209.764709][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 209.772762][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 209.781022][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 209.790040][T22829] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 209.799075][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 209.811064][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 209.818508][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 209.828479][T22829] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 209.923319][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 209.933218][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 209.990870][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 209.999108][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 210.010042][T22829] device veth0_vlan entered promiscuous mode [ 210.030996][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 210.042066][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 210.052112][T22829] device veth1_vlan entered promiscuous mode [ 210.083796][T22829] device veth0_macvtap entered promiscuous mode [ 210.092444][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 210.100562][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 210.108771][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 210.118496][ T2343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 210.127782][T22829] device veth1_macvtap entered promiscuous mode [ 210.137546][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 210.145482][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 210.176847][T22829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 210.187301][T22829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 210.197111][T22829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 210.207533][T22829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 210.217344][T22829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 210.227896][T22829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 210.237702][T22829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 210.248182][T22829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 210.258038][T22829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 210.268446][T22829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 210.280365][T22829] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 210.288434][ T2009] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 210.297105][ T2009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 210.306386][T22829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 210.316842][T22829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 210.326847][T22829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 210.337288][T22829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 210.347095][T22829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 210.357523][T22829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 210.367317][T22829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 210.377882][T22829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 210.387779][T22829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 210.398200][T22829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 210.410125][T22829] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 210.418175][ T2009] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 210.426945][ T2009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 22:17:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a374"]) 22:17:53 executing program 0: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/schedstat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x7ff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:53 executing program 3: finit_module(0xffffffffffffffff, &(0x7f0000000000)='rfdno', 0x1) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r2) sendmsg$unix(r0, &(0x7f00000004c0)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000140)="09abb56776b15a4e0b461fc330cceec70909eec0988726d418d4876d9c618bbb0a4e6f1f4e837ff2905c7fbce2fda9240ca7d94afff69c4ef79fb9861b64114d0548340c9e434336b6735a87d952337aebd24b5cecccfd0c366c1bb65f0947cc441e59cdf5fbec873d75d338bf110438040ab2596ae3722901fb8d6a37a92fae80d1d8c68f30c9b727f70e76e32e4f7c66e1c33def824146304f5e32139e3e3b793f77249cdedd932ddde69c76f24d5206ea08da7eb3b6f8aec08616b76d31dfb4ecabb29c4b315bbbf95b1d20231e1523bfa336676a", 0xd6}, {&(0x7f0000000240)="45d3ced1f0839381b15cc858da8cb218fdfefc12b9136f520483fd584d3b233cb15ef415d58c24da2893354d4e41e07b96d1909b0fe9b440ad5c19eab64e75b7e60fb970fed5638c22c581cabbc4ffe0072b7e6215eda82be6526b848f7b04d2b05511438e699c045e3add428d1bb383d572", 0x72}, {&(0x7f00000003c0)="9b08acc6ce55ab089102504d72be97635b28f53392555208772a579527ba851c0e2e56fd56e288f0f59d3236df082e6268b2f92e3b1cac7c8345fa48fcffae9f53c92fb3c39e75aff671d11c7cdc939455f17e8608d347cc1c0efbaf91bf49d84a97", 0x62}, {&(0x7f00000002c0)="3ba7e8164c6ce222d3f4a02bc120eedbe5ddd451e488851011f28b1c63ca373a37f77851c55cd4183c73", 0x2a}], 0x4, &(0x7f0000000480)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, r2}}}], 0x20, 0xc00c000}, 0x1) socket$inet6(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="a27109e4c377118b097489b8de18738c0fab692593e5b329a37faf96869827ddbd0f00000000e4169121f83cc97952e5cdd6313cbe59046b7a78f400290a47", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',\x00']) 22:17:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa9c0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 22:17:53 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x100) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000511d25a80648c63940d0124fc6009100640014102000200001737153e370a0001800a000000d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuset.memory_pressure\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0xd3, 0x0, 0xaf, 0x5, 0x0, 0x101, 0xd001c, 0xd, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x83, 0x8, 0xfff, 0x2, 0x0, 0x2, 0xffff}, r3, 0x7, 0xffffffffffffffff, 0x8) close(r2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x43408) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000d08483c09e84db96008100000000000000ff23756cca6f2eed33543238d98f9e1c57a2b0de8219c32050d1b8a0a71796c0dbd2dcffd9f049579238e7db25aa36b48ce34017c5"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 22:17:53 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/schedstat\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c4139909265e15587fca777d663de0c61dc72195bde12b1ddb5ad22de8a6d736f10361fafb20f915cb437a5843812b29138e02a81cbe9a1e7efad9b20ccb1ab1785661b87f59205afecc47022b53ce8f48179517123c269364427d53ff5617eb0f68e521d6a84264077a987c9c4a57613cd27464ebb962f9c9967da2deb310cc0b8e8e0d902a3c05e1c3d985699eb06fe0c07e1e5f74aa63e30ea5924c012cfd53c15727d28ff3db5d82dbe0c2175f59b146873"]) poll(0x0, 0x0, 0x1ff) [ 210.492290][T22864] loop5: detected capacity change from 0 to 84 [ 210.494399][T22865] EXT4-fs: 21 callbacks suppressed [ 210.494411][T22865] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 210.536575][T22864] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) [ 210.554252][T22871] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value 22:17:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a37a"]) [ 210.579669][T22870] netlink: 208832 bytes leftover after parsing attributes in process `syz-executor.2'. 22:17:53 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000), 0x4000, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [{@dont_hash}, {@smackfsdef={'smackfsdef', 0x3d, '].'}}]}}) [ 210.622564][T22864] loop5: detected capacity change from 0 to 84 [ 210.640215][T22977] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 210.661337][T22864] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) 22:17:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 210.672977][T22981] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 210.696910][T22979] 9pnet: Insufficient options for proto=fd 22:17:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xaa00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) [ 210.723685][ T1853] device hsr_slave_0 left promiscuous mode [ 210.729997][T22988] 9pnet: Insufficient options for proto=fd [ 210.741666][ T1853] device hsr_slave_1 left promiscuous mode [ 210.752299][T22990] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value 22:17:53 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 210.774795][T22993] loop5: detected capacity change from 0 to 85 [ 210.794556][ T1853] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 210.802014][ T1853] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 210.809812][T22997] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value 22:17:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 210.835287][T22993] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) [ 210.854243][ T1853] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 210.861722][ T1853] batman_adv: batadv0: Removing interface: batadv_slave_1 22:17:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x80302, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000280)='\x00', 0x7fffffff, 0x9, &(0x7f0000000800)=[{&(0x7f00000002c0)="25aa56cdd4bd269edeb0e82c20d9dfc9dd8beb32920d27db0ecdbf07c879b267b8fa96b968e620394019258c52ff43321302a2a669cb8a32f6f7d2119126ec97ac5f08ceaebab34f442c81bd84be47e7ff7e7ff87b34e9d361e0df27d7d3e57b1f52f6be1aa4d79526be9ae069faceeee251cc43", 0x74, 0x2}, {&(0x7f0000000900)="14d75fdfc1ccd6aee46506e8cb82bc2163f7496c2b57773ed80fc4375bba61264eac9096d83f5d073bd4f8a0ed104a3af29033dd77f6e3d9a58c2852bed0bb04e50d3a45f3f30e381d3bd5871c4ed8a4b574b9271153be845fe1ad5b494cbe19f4", 0x61, 0x59c4}, {&(0x7f0000000380)="7f5e867a99e1a4a4", 0x8, 0x94}, {&(0x7f00000003c0)="d42335bc8b8a9bdaa7874b78a0d936bb30711040f0bf5f438f4d83cf0f2f479cc38808159a0e1f944bf21c9f6f3d577c284a905b88ac57fc79a9c1075c2d1bf52cb428d6148f9f5bb68012b1d476d5fd5d95cbff4ca68179b7104b3dd92a69b2045095bc4f4f", 0x66, 0x286}, {&(0x7f0000000440)="b70cdc27cbfe9ccecb36c2b41ba6d41e2daa309109915649edeea03caab970fa74932887642aa7d4950ad40a13974424accea151b2e5c96f2b4c592879eb46efc0dfcf8c07212e749f5ada7d5d80459c635e2a90455f27e67b365e77299c19a23c951d9c537e2665d98841f5d9851da3920717df335e461d0f09938566b92ca7a87380bd2f68dca24ccc3abb9e1625b4e0aaff2db5b0a9e47817053154794fa7e659f29a110e270db546c7430ba3960bbba0b467f528f09d27cd22d9e4ef0aa86b500a73f5a45c9eb6c718efe3a50db7bde16d911e9d677f24fdfdcf4b65ddc67a", 0xe1, 0x5}, {&(0x7f0000000540)="b17fd0ddc499c508f0dbeb5a9a588282cf15b36d8f0b28a3150fbff601d0903baac298b194a8451ce5852715f991adcaae66830144cde7b2262d36765be4ea8404bcc808925c2e95a4cb60fd458bc886847e37f4e3f36121af9801335edac1d83dea5421a22b53feea57993872285a6e8dc4e72d7da0b2599e0505935ccf911ede4d48f0", 0x84, 0x1ff800}, {&(0x7f0000000600)="6b925b45c5b3206d1d2112ff92131d31a8fdef306b584b344bf99e319b6207fd0260e7ada4b56d040805aced67315c5c1808a22bdc90333b1c7ea1c057a0fadaaac9d6aabf8c78ceed83f979c42c2c83aafe4d1cce6a7bc84905738bd4518becaa2d203c8dceec246c3e387a4f36c3f20232f000dfbea3cbb2e9af08866d3d21520bfdf870b6fb54f679001cdc19f99b11cf52e5c39dd6a7ec2b1d2559052164db2dc76207eeec246d6775e0b0c2508d27736f6ddf2f5fc314674e044b06fb40a004166d9c7e675a8c2a70cbaca3", 0xce, 0xd8ff}, {&(0x7f0000000700)="724554508386043e341cc768041d0c0b0bc77e64360ff725a4507902d351bfdf03ce970e24b3197f0d7e8af2aa0e10a8592accc8f5feda63766666595df84519ebc364b278dd8c5df45618a9579f3bf42bc82a39bc907b9c5d3a650b24fb0967662f3d33c6", 0x65, 0x4}, {&(0x7f0000000780)="79aad577b29b3e13d6c75fb4320acb8345aa1b61f49ad8ac22734a93b392d28288962270bd8530bb3d2d2d397768dbdba4f4a005173e663000e0a76b1a372154590e4ab10bdc4a1a94954ad698d34104134c070f96", 0x55, 0xfffffffffffffff9}], 0x0, &(0x7f0000000a00)={[{@shortname_lower}, {@shortname_mixed}, {@uni_xlate}, {@shortname_lower}], [{@dont_measure}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/ptmx\x00'}}, {@subj_type}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200), 0x8400, 0x0) unlinkat(r0, &(0x7f00000009c0)='./file0\x00', 0x200) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1, {0x9}}, './file0\x00'}) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000240)=ANY=[@ANYBLOB="868556c950ca13c44f32f27e568f9b0bdb00555da3215232fe3a62"]) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x851) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) [ 210.879765][ T1853] device bridge_slave_1 left promiscuous mode [ 210.886748][ T1853] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.906246][T23003] loop2: detected capacity change from 0 to 264192 [ 210.906426][T23001] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 210.923661][T22993] loop5: detected capacity change from 0 to 85 [ 210.935016][T22993] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) [ 210.972275][ T1853] device bridge_slave_0 left promiscuous mode [ 210.976608][T23004] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 210.978507][ T1853] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.009419][T23003] EXT4-fs (sda1): Unrecognized mount option "†…VÉPÊÄO2ò~V› Û" or missing value [ 211.048348][ T1853] device veth1_macvtap left promiscuous mode [ 211.054464][ T1853] device veth0_macvtap left promiscuous mode [ 211.060462][ T1853] device veth1_vlan left promiscuous mode [ 211.066220][ T1853] device veth0_vlan left promiscuous mode [ 211.073088][T23003] loop2: detected capacity change from 0 to 264192 [ 211.089960][T23005] EXT4-fs (sda1): Unrecognized mount option "†…VÉPÊÄO2ò~V› Û" or missing value [ 211.232182][ T1853] bond1 (unregistering): Released all slaves [ 211.327886][ T1853] team0 (unregistering): Port device team_slave_1 removed [ 211.348993][ T1853] team0 (unregistering): Port device team_slave_0 removed [ 211.359284][ T1853] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 211.389591][ T1853] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 211.458955][ T1853] bond0 (unregistering): Released all slaves 22:17:55 executing program 0: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/schedstat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x7ff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xaa40, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 22:17:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:55 executing program 2: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000000)={{0x2, 0xee01, 0x0, 0xee01}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x200) clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) semtimedop(0x0, &(0x7f00000004c0)=[{0x3, 0x0, 0x800}], 0x1, &(0x7f0000000540)={r0, r1+10000000}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000140)=ANY=[@ANYBLOB="e474f42cecca541b4782e4fd2bcebce21b0eef2092c23b308d20250d9148a8fca5b204a5988c5cf9b00e4514b287942ac853cb34ea146f4014ac4293cd7ce2398a090ff2953e87b4950ffbc196447bf18486c80ae2a6ea0bee3bdfd38631d269e21bca243dc2402d02a32451fd5c11bf10ed68e89fe4b2038cee1846aa2c8a39e94b84f2e5609f3719267b0edb21c4341bd89b8a417785eeee7664d4bc4835"]) chdir(&(0x7f0000000080)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000003c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="023000000000000000000000000000007424731f77c6d87898442e25e1bc1508881b6827e27e492d66ebaf0ab784480fd423825617ba777ad2d7802081fb241d6aac473ac578aa0ba7c3cbed37837d342f889b5f2f1c59f6339acf18b495f6010000000b5244c183a0d8715169b688a237a191062eaa82b9ec1807776e7031ca97362ebf53b24d8e44d12fce66b816fd6e24ce1228d9a849f3f3cde5f1a66af1222bd4656ee7dbc286ac99bd765c5f8d0a417ab7b46ac2c712d446"]) umount2(&(0x7f0000000300)='./file0\x00', 0x4) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x100, 0x70bd2b, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20004084}, 0x40800) [ 212.264637][T23016] loop5: detected capacity change from 0 to 85 [ 212.283737][T23016] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) [ 212.342082][T23016] loop5: detected capacity change from 0 to 85 [ 212.349179][T23016] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) [ 212.830305][T23123] chnl_net:caif_netlink_parms(): no params data found [ 212.868162][T23123] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.875355][T23123] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.884066][T23123] device bridge_slave_0 entered promiscuous mode [ 212.891474][T23123] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.898547][T23123] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.906407][T23123] device bridge_slave_1 entered promiscuous mode [ 212.929122][T23123] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 212.939541][T23123] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 212.957977][T23123] team0: Port device team_slave_0 added [ 212.964450][T23123] team0: Port device team_slave_1 added [ 212.979026][T23123] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 212.986029][T23123] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 213.011912][T23123] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 213.023903][T23123] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 213.030900][T23123] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 213.056961][T23123] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 213.085095][T23123] device hsr_slave_0 entered promiscuous mode [ 213.091850][T23123] device hsr_slave_1 entered promiscuous mode [ 213.098219][T23123] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 213.107108][T23123] Cannot create hsr debugfs directory [ 213.114666][ T1830] device hsr_slave_0 left promiscuous mode [ 213.123089][ T1830] device hsr_slave_1 left promiscuous mode [ 213.129266][ T1830] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 213.136661][ T1830] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 213.145986][ T1830] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 213.153409][ T1830] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 213.162982][ T1830] device bridge_slave_1 left promiscuous mode [ 213.169089][ T1830] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.176707][ T1830] device bridge_slave_0 left promiscuous mode [ 213.182865][ T1830] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.194490][ T1830] device veth1_macvtap left promiscuous mode [ 213.200468][ T1830] device veth0_macvtap left promiscuous mode [ 213.206491][ T1830] device veth1_vlan left promiscuous mode [ 213.212279][ T1830] device veth0_vlan left promiscuous mode [ 213.314765][ T1830] team0 (unregistering): Port device team_slave_1 removed [ 213.325348][ T1830] team0 (unregistering): Port device team_slave_0 removed [ 213.335149][ T1830] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 213.346367][ T1830] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 213.376560][ T1830] bond0 (unregistering): Released all slaves [ 213.464924][T23123] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.471978][T23123] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.479282][T23123] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.486316][T23123] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.515015][T23123] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.525623][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.533884][ T1912] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.541748][ T1912] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.562075][T23123] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.572210][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.580490][ T1919] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.587561][ T1919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.606658][T23123] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 213.617049][T23123] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 213.631012][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.639420][ T1912] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.646526][ T1912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.655266][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.664034][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 213.673826][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.682549][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.692872][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 213.700484][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 213.712684][T23123] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 213.719936][ T2342] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 213.728526][ T2342] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 213.852946][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 213.871323][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 213.969536][T23123] device veth0_vlan entered promiscuous mode [ 213.977607][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 213.987136][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 213.997748][T23123] device veth1_vlan entered promiscuous mode [ 214.005525][ T2009] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 214.013319][ T2009] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 214.022555][ T2009] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 214.035656][T23123] device veth0_macvtap entered promiscuous mode [ 214.044517][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 214.055883][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 214.065159][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 214.073485][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 214.085171][T23123] device veth1_macvtap entered promiscuous mode [ 214.095692][T23123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 214.106162][T23123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 214.115979][T23123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 214.126389][T23123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 214.136194][T23123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 214.146632][T23123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 214.156448][T23123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 214.167136][T23123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 214.178930][T23123] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 214.188080][ T2342] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 214.197090][ T2342] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 214.205477][ T2342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 214.216058][T23123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 214.226518][T23123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 214.236432][T23123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 214.246858][T23123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 214.256714][T23123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 214.267136][T23123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 214.277093][T23123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 214.287515][T23123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 214.301286][T23123] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 214.310534][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 214.319108][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 22:17:57 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/schedstat\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:57 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) r1 = socket$inet6(0xa, 0x0, 0x0) r2 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x116) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r2, 0x5f00f000) bind$unix(r2, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e24}, 0x6e) r3 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x1, 0x2, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000200)={r6}, &(0x7f0000000240)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000000)={r6, 0x0, 0xc8d8}, &(0x7f0000000080)=0x8) r7 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x116) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r7, 0x5f00f000) connect$inet6(r7, &(0x7f00000000c0)={0xa, 0x4e23, 0xff, @dev={0xfe, 0x80, '\x00', 0x1a}, 0xfff}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r3}}) 22:17:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) bind$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e20}, 0x6e) 22:17:57 executing program 0: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/schedstat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x7ff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:17:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xaa80, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) [ 214.415336][T23160] loop5: detected capacity change from 0 to 85 22:17:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 214.457376][T23160] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) [ 214.469038][T23190] 9pnet: Insufficient options for proto=fd 22:17:57 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) r1 = socket$inet6(0xa, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x8, 0x2, 0x0, 0x6, 0xf800, 0x1}, 0x20) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 22:17:57 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) (fail_nth: 1) 22:17:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 214.523531][T23160] loop5: detected capacity change from 0 to 85 [ 214.561046][T23160] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) 22:17:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:17:58 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) (fail_nth: 1) 22:17:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a336"]) 22:17:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xaac0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) [ 215.126673][T23395] loop5: detected capacity change from 0 to 85 [ 215.141663][T23395] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) [ 215.212248][T23395] loop5: detected capacity change from 0 to 85 [ 215.218765][T23395] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) [ 215.740766][T23398] FAULT_INJECTION: forcing a failure. [ 215.740766][T23398] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 215.753897][T23398] CPU: 1 PID: 23398 Comm: syz-executor.1 Tainted: G W 5.16.0-rc4-syzkaller #0 [ 215.764051][T23398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.774103][T23398] Call Trace: [ 215.777373][T23398] [ 215.780290][T23398] dump_stack_lvl+0xd6/0x122 [ 215.784949][T23398] dump_stack+0x11/0x1b [ 215.789103][T23398] should_fail+0x23c/0x250 [ 215.793570][T23398] should_fail_usercopy+0x16/0x20 [ 215.798987][T23398] _copy_to_user+0x1c/0x90 [ 215.803409][T23398] simple_read_from_buffer+0xab/0x120 [ 215.808938][T23398] proc_fail_nth_read+0x10d/0x150 [ 215.813978][T23398] ? proc_fault_inject_write+0x230/0x230 [ 215.819639][T23398] vfs_read+0x1e6/0x750 [ 215.823808][T23398] ? __this_cpu_preempt_check+0x18/0x20 [ 215.829363][T23398] ? xfd_validate_state+0x4e/0xf0 [ 215.834391][T23398] ksys_read+0xd9/0x190 [ 215.838553][T23398] __x64_sys_read+0x3e/0x50 [ 215.843057][T23398] do_syscall_64+0x44/0xd0 [ 215.847544][T23398] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 215.853450][T23398] RIP: 0033:0x7fcea76596ac [ 215.857943][T23398] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 215.877545][T23398] RSP: 002b:00007fcea6e1d170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 215.885959][T23398] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fcea76596ac [ 215.894021][T23398] RDX: 000000000000000f RSI: 00007fcea6e1d1e0 RDI: 0000000000000003 [ 215.902003][T23398] RBP: 00007fcea6e1d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 215.910003][T23398] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 215.917987][T23398] R13: 00007ffdc5b2599f R14: 00007fcea6e1d300 R15: 0000000000022000 [ 215.926055][T23398] [ 216.547507][ T2888] ================================================================== [ 216.555602][ T2888] BUG: KCSAN: data-race in do_epoll_ctl / do_epoll_wait [ 216.562536][ T2888] [ 216.564853][ T2888] write to 0xffff8881037bfe98 of 8 bytes by task 1802 on cpu 1: [ 216.572555][ T2888] do_epoll_ctl+0x1331/0x1880 [ 216.577228][ T2888] __x64_sys_epoll_ctl+0xc2/0xf0 [ 216.582159][ T2888] do_syscall_64+0x44/0xd0 [ 216.586569][ T2888] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 216.592458][ T2888] [ 216.594767][ T2888] read to 0xffff8881037bfe98 of 8 bytes by task 2888 on cpu 0: [ 216.602298][ T2888] do_epoll_wait+0x279/0xf40 [ 216.606879][ T2888] __se_sys_epoll_pwait+0x12b/0x240 [ 216.612068][ T2888] __x64_sys_epoll_pwait+0x74/0x80 [ 216.617171][ T2888] do_syscall_64+0x44/0xd0 [ 216.621584][ T2888] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 216.627486][ T2888] [ 216.629799][ T2888] value changed: 0xffff8881037bfe90 -> 0xffff88813e781918 [ 216.636893][ T2888] [ 216.639207][ T2888] Reported by Kernel Concurrency Sanitizer on: [ 216.645347][ T2888] CPU: 0 PID: 2888 Comm: syz-fuzzer Tainted: G W 5.16.0-rc4-syzkaller #0 [ 216.655058][ T2888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.665110][ T2888] ================================================================== [ 216.913863][T23406] chnl_net:caif_netlink_parms(): no params data found [ 216.975890][T23406] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.983014][T23406] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.992956][T23406] device bridge_slave_0 entered promiscuous mode [ 217.012885][T23406] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.019974][T23406] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.031861][T23406] device bridge_slave_1 entered promiscuous mode [ 217.059817][T23406] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 217.071750][T23406] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 217.092104][T23406] team0: Port device team_slave_0 added [ 217.098693][T23406] team0: Port device team_slave_1 added [ 217.115617][T23406] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 217.122668][T23406] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 217.148770][T23406] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 217.162182][T23406] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 217.169119][T23406] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 217.195224][T23406] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 217.222439][T23406] device hsr_slave_0 entered promiscuous mode [ 217.229154][T23406] device hsr_slave_1 entered promiscuous mode [ 217.235833][T23406] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 217.243414][T23406] Cannot create hsr debugfs directory [ 217.282349][T23406] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.289404][T23406] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.296784][T23406] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.303810][T23406] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.337698][T23406] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.348181][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.358265][ T2339] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.366292][ T2339] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.376914][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 217.388460][T23406] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.400145][ T2342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.408557][ T2342] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.415594][ T2342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.435734][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.444499][ T2339] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.451532][ T2339] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.460546][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.469334][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.482435][T23406] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 217.492910][T23406] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 217.506273][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 217.514311][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.522958][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.538007][T23406] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 217.546621][ T2342] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 217.554312][ T2342] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 217.568502][ T2342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 217.616091][ T2342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 217.677941][T23406] device veth0_vlan entered promiscuous mode [ 217.686253][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 217.695356][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 217.704464][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 217.714689][T23406] device veth1_vlan entered promiscuous mode [ 217.723858][ T2342] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 217.739872][ T2342] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 217.750274][ T2342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 217.759721][T23406] device veth0_macvtap entered promiscuous mode [ 217.770338][T23406] device veth1_macvtap entered promiscuous mode [ 217.782845][T23406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 217.793324][T23406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.803223][T23406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 217.813711][T23406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.823517][T23406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 217.833942][T23406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.843846][T23406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 217.854279][T23406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.864189][T23406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 217.874633][T23406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.887304][T23406] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 217.895015][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 217.904867][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 217.913828][T23406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 217.924272][T23406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.934104][T23406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 217.944597][T23406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.954426][T23406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 217.964840][T23406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.974689][T23406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 217.985554][T23406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.995436][T23406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 218.005994][T23406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.018810][T23406] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 218.027578][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 22:18:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='w']) unlink(&(0x7f0000000140)='./file0\x00') 22:18:01 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c4139909265e15587fca777d663de0c61dc72195bde12b1ddb5ad22de8a6d736f10361fafb20f915cb437a5843812b29138e02a81cbe9a1e7efad9b20ccb1ab1785661b87f59205afecc47022b53ce8f48179517123c269364427d53ff5617eb0f68e521d6a84264077a987c9c4a57613cd27464ebb962f9c9967da2deb310cc0b8e8e0d902a3c05e1c3d985699eb06fe0c07e1e5f74aa63e30ea5924c012cfd53c15727d28ff3db5d82dbe0c2175f59b146873"]) poll(0x0, 0x0, 0x1ff) 22:18:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:18:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xab00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 22:18:01 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r1, 0x4008f50a, &(0x7f0000000080)={0x7, 0x80}) r2 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 22:18:01 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 218.063913][T23434] EXT4-fs: 14 callbacks suppressed [ 218.063928][T23434] EXT4-fs (sda1): Unrecognized mount option "d" or missing value [ 218.079398][T23435] EXT4-fs (sda1): Unrecognized mount option "d" or missing value [ 218.109123][T23441] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 218.109827][T23443] loop5: detected capacity change from 0 to 85 [ 218.130148][T23443] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) 22:18:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 218.159396][T23449] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 218.174784][ T24] audit: type=1400 audit(1639001881.122:293): avc: denied { ioctl } for pid=23440 comm="syz-executor.3" path="/dev/loop-control" dev="devtmpfs" ino=99 ioctlcmd=0xf50a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 218.205645][T23451] EXT4-fs (sda1): Unrecognized mount option "w" or missing value [ 218.223949][T23443] loop5: detected capacity change from 0 to 85 [ 218.241131][T23443] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) 22:18:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x801401, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:18:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xab27, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) [ 218.255600][T23523] EXT4-fs (sda1): Unrecognized mount option "w" or missing value [ 218.275089][T23524] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value 22:18:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:18:01 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) unshare(0x10000) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) unshare(0x40020000) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c4139909265e15587fca777d663de0c61dc72195bde12b1ddb5ad22de8a6d736f10361fafb20f915cb437a5843812b29138e02a81cbe9a1e7efad9b20ccb1ab1785661b87f59205afecc47022b53ce8f48179517123c269364427d53ff5617eb0f68e521d6a84264077a987c9c4a57613cd27464ebb962f9c9967da2deb310cc0b8e8e0d902a3c05e1c3d985699eb06fe0c07e1e5f74aa63e30ea5924c012cfd53c15727d28ff3db5d82dbe0c2175f59b146873"]) poll(0x0, 0x0, 0x1ff) [ 218.302275][T23558] loop5: detected capacity change from 0 to 85 [ 218.308504][T23561] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 218.319147][T23558] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) [ 218.329243][T23560] EXT4-fs (sda1): Unrecognized mount option "d" or missing value 22:18:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:18:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:18:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x31, 0x0, 0x10ca420, &(0x7f00000001c0)=ANY=[@ANYRESDEC]) r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c, 0x800) lseek(r0, 0xf3, 0x3) [ 218.363178][T23565] EXT4-fs (sda1): Unrecognized mount option "d" or missing value [ 218.393378][T23558] loop5: detected capacity change from 0 to 85 [ 218.403282][T23558] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) 22:18:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:18:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) mkdir(&(0x7f0000000140)='./file0\x00', 0x184) 22:18:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:18:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xab40, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 22:18:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000140)=ANY=[@ANYBLOB="5f32e227b9b53d6d12d4a9762cd30b11e862aca4cb7631805fe3859b1f515b990cb455901515ef1c242f16bea46d3197307cf42b7e2eae2ba4efb5cdc1ca9d1d3fd49eccba5cb6211942f51b343acb529c5a4304b2c93acc52f5f3e6cec5fd6c40fa934dae3363d59a83cd47a49435cda97768f2eeebd15a0b860e2de6880e2b9f10872cab27f10397da5693687521bbfc7cf673ed8e2e0554c572d59694757646760d1f48af52e795b62f9af16cf0f0dd"]) r0 = open(&(0x7f0000000080)='./file0/file0\x00', 0x20002, 0x3) symlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000340)='./file0\x00') sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000002c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x2c, 0x3f7, 0x300, 0x70bd29, 0x25dfdbfe, {0x7, 0xd, './file0', './file0/file1'}, [""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4040804}, 0x20000000) 22:18:01 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) unshare(0x80) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c4139909265e15587fca777d663de0c61dc72195bde12b1ddb5ad22de8a6d736f10361fafb20f915cb437a5843812b29138e02a81cbe9a1e7efad9b20ccb1ab1785661b87f59205afecc47022b53ce8f48179517123c269364427d53ff5617eb0f68e521d6a84264077a987c9c4a57613cd27464ebb962f9c9967da2deb310cc0b8e8e0d902a3c05e1c3d985699eb06fe0c07e1e5f74aa63e30ea5924c012cfd53c15727d28ff3db5d82dbe0c2175f59b146873"]) poll(0x0, 0x0, 0x1ff) 22:18:01 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c4139909265e15587fca777d663de0c61dc72195bde12b1ddb5ad22de8a6d736f10361fafb20f915cb437a5843812b29138e02a81cbe9a1e7efad9b20ccb1ab1785661b87f59205afecc47022b53ce8f48179517123c269364427d53ff5617eb0f68e521d6a84264077a987c9c4a57613cd27464ebb962f9c9967da2deb310cc0b8e8e0d902a3c05e1c3d985699eb06fe0c07e1e5f74aa63e30ea5924c012cfd53c15727d28ff3db5d82dbe0c2175f59b146873"]) poll(0x0, 0x2, 0x1ff) 22:18:01 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x116) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r2, 0x5f00f000) listen(r2, 0xfffffffb) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:18:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:18:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600), 0x880040, 0x0) recvmmsg$unix(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000640)=""/178, 0xb2}, {&(0x7f0000000700)=""/21, 0x15}, {&(0x7f0000000740)=""/221, 0xdd}], 0x3, &(0x7f0000000880)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa0}}, {{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000940)=""/33, 0x21}, {&(0x7f0000000980)=""/25, 0x19}, {&(0x7f00000009c0)=""/199, 0xc7}], 0x3, &(0x7f0000000b00)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x40}}, {{&(0x7f0000000b40), 0x6e, &(0x7f0000003ec0)=[{&(0x7f0000000bc0)=""/192, 0xc0}, {&(0x7f0000000c80)=""/4096, 0x1000}, {&(0x7f0000001c80)=""/113, 0x71}, {&(0x7f0000001d00)=""/4096, 0x1000}, {&(0x7f0000002d00)=""/6, 0x6}, {&(0x7f0000002d40)=""/25, 0x19}, {&(0x7f0000002d80)=""/4096, 0x1000}, {&(0x7f0000003d80)=""/124, 0x7c}, {&(0x7f0000003e00)=""/141, 0x8d}], 0x9, &(0x7f0000003f80)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000003fc0), 0x6e, &(0x7f0000005040)=[{&(0x7f0000004040)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000005080), 0x6e, &(0x7f0000006200)=[{&(0x7f0000005100)}, {&(0x7f0000005140)=""/106, 0x6a}, {&(0x7f00000051c0)=""/55, 0x37}, {&(0x7f0000005200)=""/4096, 0x1000}], 0x4, &(0x7f0000006240)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd0}}, {{&(0x7f0000006340), 0x6e, &(0x7f0000007500)=[{&(0x7f00000063c0)=""/165, 0xa5}, {&(0x7f0000006480)=""/112, 0x70}, {&(0x7f0000006500)=""/4096, 0x1000}], 0x3, &(0x7f0000007540)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}}], 0x6, 0x2000, &(0x7f0000007740)={0x0, 0x3938700}) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) mount(&(0x7f0000000140)=@nullb, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='f2fs\x00', 0x1, &(0x7f0000000200)='#\x00') [ 218.976050][T23699] loop5: detected capacity change from 0 to 85 [ 219.002459][ T24] audit: type=1400 audit(1639001881.952:294): avc: denied { write } for pid=23703 comm="syz-executor.2" name="net" dev="proc" ino=40050 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 219.008987][T23699] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) [ 219.024398][ T24] audit: type=1400 audit(1639001881.952:295): avc: denied { add_name } for pid=23703 comm="syz-executor.2" name="pfkey" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 219.024427][ T24] audit: type=1400 audit(1639001881.952:296): avc: denied { create } for pid=23703 comm="syz-executor.2" name="pfkey" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 22:18:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:18:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0xc1000193) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) [ 219.024444][ T24] audit: type=1400 audit(1639001881.952:297): avc: denied { associate } for pid=23703 comm="syz-executor.2" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 22:18:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a30c"]) 22:18:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=@nullb, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='vfat\x00', 0x2004000, &(0x7f0000000240)='ext3\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x400, 0x4) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) r0 = fsmount(0xffffffffffffffff, 0x1, 0xe) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x20, 0x1) 22:18:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:18:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xab80, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 22:18:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x100, 0x0) openat(r0, &(0x7f0000000180)='./file0\x00', 0x100c1, 0x98) r1 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000140)=ANY=[@ANYBLOB="2ee0ddabfa64"]) dup(r1) [ 219.165709][T23699] loop5: detected capacity change from 0 to 85 [ 219.185011][T23699] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) 22:18:02 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) unshare(0x42040180) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x830000, &(0x7f0000000040)="403863f5ae168a381163777ead423d2809c932e9914a96cf36f2a357996ff524cf8ffb813084b01baf2c0860525ec0f945f854568a5d0ef410605a6c61e4dc01cdf20204b465a5d45f6151987fb22521b8441f57c232293811e10b4f78ab5b3b69be67fc3e221f3561870e23126e819fbc6f77432344782e8caad14209ca5c0ac7afc3e1c52aebe43b3a38142ad2a28d", &(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)="849b6c955222d6") syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0xa1c41, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce1dfc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c2a47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c4139909265e15587fca777d663de0c61dc72195bde12b1ddb5ad22de8a6d736f10361fafb20f915cb437a5843812b29138e02a81cbe9a1e7efad9b20ccb1ab1785661b87f59205afecc47022b53ce8f48179517123c269364427d53ff5617eb0f68e521d6a84264077a987c9c4a57613cd27464ebb962f9c9967da2deb310cc0b8e8e0d902a3c05e1c3d8f5699eb06fe0c07e1e5f74aa63e30ea5924c012cfd53c15727d28ff3db5d82dbe0c2175f59b146873"]) poll(0x0, 0x0, 0x1ff) unshare(0xa80) 22:18:02 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x4, 0x1ff) [ 219.258468][T23835] loop5: detected capacity change from 0 to 85 [ 219.282352][T23835] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) [ 219.344490][T23835] loop5: detected capacity change from 0 to 85 [ 219.370789][T23835] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) 22:18:02 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) fcntl$setstatus(r0, 0x4, 0x2c00) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:18:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:18:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x4) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000080)) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2ba422, &(0x7f0000000880)=ANY=[@ANYBLOB="ecc386ed81bb85f5f9d061000000000000000000", @ANYRES16, @ANYRES16=r0]) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, 0xffffffffffffffff, 0x5f00f000) chdir(&(0x7f0000000080)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000140)=@in6={0xa, 0x4e20, 0x800, @private2}, 0x80, &(0x7f0000000780)=[{&(0x7f00000001c0)="88dcc6c9fa702057b5f6e0e5928cdbc197bab75380355a35458c42669b13f7c4c0768a48b794a5781caa4e1ff326db409f4e98cfd1c32a1f4d998ccdad90d5c73e91d01d5c1badb6a4226673ec745f7ca2221f2bd8e08710762817624dbccdd42a33b0dc3f7be2cf56197149a245bb82e2627981b3448c39ef1cedced0b8ef873622d320de476f6c71ee0d1e4d81462b99", 0x91}, {&(0x7f0000000980)="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", 0x1e2}, {&(0x7f0000000380)="22713e4725325f4c1c244b8d1d53e55836b4629b49ef3ab1b70066b8b38a4088174c240266ae2f295ebe9af637d784ab3bcb49b90031bf9a1cf83a992f5f565d2fad0000003301a501e2c6ef89ea9e3720dcaeb129aaa2f3f200000000000000", 0x60}, {&(0x7f0000000400)="c92f46ba1d7c7432cce147756e477dba34cd23553dc71305840526c7e5f166920db289ca3d6602cf47f6f93f8f35494c5feb0fa55086ba87efb5f163f24aefe678f4e873c87453acc7f5466ff3e71652fe9b99cce95713b91f", 0x59}, {&(0x7f00000006c0)="1dd397aa0b31016c3301ce2c3a26e9449c4c2ebf45a1765df578a97fa60771afad6c6c1498080032888da0c44b6dcd780ba0cfc525f574c71170460f68e4ea0f3f51bb8bb5fa3bd3e3eab98f25789d21b68da90031480704ca23e6ca19036fa481e752987192915076920eb0b03cffb8fa5e5c54eb006111fc8ecadfd6b01bf5c690cd7dc2ea8c48860d9ec33c0be8a5d4ade764bc826b260d8edcf87ffd16b339", 0xa1}, {&(0x7f0000000540)="57acb8c7eb01d6d03492a22e05cc6d8e394ef8536f6624d65508950c0dbc80aa396a430284d0cfab901a9e987b3d90c72cd53152054c51610229290290b1a32f97587f8800432d3b02d030f2d796040ab988a6ff113d573b536f08987331f39ea52064aa378c15bc4a18eb485e71be97b46f2b901b1f6aaad39be09ac86139661b7083ccacedd4b6a4c5790be3d3f16d0e3c3b058efef0b158400d9f6d4dc2bd06e57a6090", 0xa5}, {&(0x7f0000000600)="c14c6aaf342f8d257e71761379ffdc7c29ade1cbdef3bbd16c2b65019186de26625e1f31d3ee1e4828ac12b4ba75", 0x2e}, {&(0x7f0000000640)="1c549b9a87e96826f179a49f0cae3509ad83093701c45c6c7aa50b708d565097645256f7d2e84f862ec1b34c3fee2815a449a4d18dfa3edb0c0f5310da3c878735f95b133d0d20d05725abdeafee3c22790afbbb3de5df68d4607ad9097c0a76", 0x60}, {&(0x7f00000008c0)="c93ad7acbf676e61b15caa2f4dde82b7d7bfe038851187b38aa64524360f01f2591b910fb6e1b86ab151a1042fe64fad3837de2e4f7012d7ed46f2adfa5d3a044cb86cb3af85aab9f331b6e2055b1166a89324939fa069ebb779c5eb7c0a00f025651a88247828962bf1f6f1f03aa03eb80287e1163710b3ac6fa7ffeb6c45134a05490019e4393790b6d5101caf14d4b913cc4b27bc9f99668cebd6222a5400", 0xa0}], 0x9}, 0x24004895) 22:18:02 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}, 0x8, 0x0, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) unshare(0x60000480) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 22:18:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xabc0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 22:18:02 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x5, 0x1ff) 22:18:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:18:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = creat(&(0x7f0000000180)='./file0\x00', 0x30) r1 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x116) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r1, 0x5f00f000) linkat(r0, &(0x7f00000001c0)='./bus\x00', r1, &(0x7f0000000200)='./bus\x00', 0x1000) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setfsuid(r3) syz_mount_image$iso9660(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0xff, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="c26e", 0x2, 0xffffffff}], 0x2000000, &(0x7f00000003c0)={[{@map_off}, {@uid={'uid', 0x3d, r3}}, {@map_off}, {@block}, {@dmode={'dmode', 0x3d, 0x3}}, {@map_off}, {@sbsector={'sbsector', 0x3d, 0x8001}}, {@session={'session', 0x3d, 0x38}}], [{@fowner_gt={'fowner>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '!/\x0f:}@'}}, {@context={'context', 0x3d, 'root'}}, {@obj_role={'obj_role', 0x3d, 'ext4\x00'}}, {@subj_type={'subj_type', 0x3d, '+('}}]}) truncate(&(0x7f0000000140)='./file0\x00', 0x0) 22:18:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 219.819738][T23952] loop5: detected capacity change from 0 to 85 [ 219.854942][T23952] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) 22:18:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB='d']) 22:18:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:18:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 219.923554][T23952] loop5: detected capacity change from 0 to 85 [ 219.940902][T23952] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (42 blocks) 22:18:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xac00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 22:18:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:18:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x58, 0x0, 0x108a420, &(0x7f0000000100)=ANY=[@ANYRES16]) syz_io_uring_setup(0x764f, &(0x7f0000000140)={0x0, 0x9349, 0x20, 0x0, 0x1f8}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f00000001c0), &(0x7f0000000200)=0x0) syz_io_uring_submit(0x0, r0, &(0x7f0000000240)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x1, 0x0, 0x0, 0x0, 0xaf4a550bc0bfb4b0}, 0x0) 22:18:03 executing program 0: unshare(0x0) unshare(0x20000000) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x2, 0x0, &(0x7f0000000180), 0x1803020, &(0x7f0000000780)=ANY=[]) poll(0x0, 0x0, 0x1ff) 22:18:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 220.751209][T24093] loop5: detected capacity change from 0 to 86 [ 220.758235][T24093] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (43 blocks) [ 220.823340][T24093] loop5: detected capacity change from 0 to 86 [ 220.851938][T24093] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (43 blocks) [ 221.254594][ T8] device hsr_slave_0 left promiscuous mode [ 221.264411][ T8] device hsr_slave_1 left promiscuous mode [ 221.284342][ T8] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 221.291811][ T8] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 221.331429][ T8] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 221.339003][ T8] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 221.371654][ T8] device bridge_slave_1 left promiscuous mode [ 221.377892][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.422220][ T8] device bridge_slave_0 left promiscuous mode [ 221.428418][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.455443][ T8] device veth1_macvtap left promiscuous mode [ 221.461487][ T8] device veth0_macvtap left promiscuous mode [ 221.467525][ T8] device veth1_vlan left promiscuous mode [ 221.473367][ T8] device veth0_vlan left promiscuous mode [ 221.732598][ T8] team0 (unregistering): Port device team_slave_1 removed [ 221.757995][ T8] team0 (unregistering): Port device team_slave_0 removed [ 221.783481][ T8] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 221.823675][ T8] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 221.912749][ T8] bond0 (unregistering): Released all slaves 22:18:05 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x8, 0x1ff) 22:18:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:18:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xac40, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 22:18:05 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000080)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002800)='/proc/bus/input/handlers\x00', 0x0, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000002840), &(0x7f0000002880)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x8, 0x2, &(0x7f0000002940)=[{&(0x7f00000028c0)="bd8ae2f73c69bba149f8363de69f0b4c260c804c90bbae", 0x17, 0xbdb}, {&(0x7f0000002900)="0220da493b0f541bbf7e", 0xa, 0x3f}], 0x0, &(0x7f0000002980)={[{@shortname_win95}], [{@audit}, {@smackfsdef={'smackfsdef', 0x3d, '--\xc8}'}}, {@uid_lt={'uid<', 0xee00}}, {@subj_type={'subj_type', 0x3d, '\\(\xbd,'}}]}) r4 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000002a00), 0x8000, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r5, 0x5457, &(0x7f0000000080)) r6 = syz_open_dev$evdev(&(0x7f0000002a40), 0x7f, 0x101000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002a80)={0x0, 0x0, 0x0}, &(0x7f0000002ac0)=0xc) sendmmsg$unix(r0, &(0x7f0000002b80)=[{{&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000140)="48ad45391b05472706bb0d15962e7b424fec85085b67f0879f1c8dffaf03cfeec081d4a164c5e7930e09d0edc5c9cd3bdc99c48015e513a2bc0582ee909f3411212570cd450e08da6992f89d6307c0297b12f1bef65e12dbe1f669aedfebf224544de65b8940f52f9fecc56fe9bfe225c6d840f13dd12176b714219ff5227c7aaaef2d78669e29528724c1887efd310bffacfd7996b07c4e526f08701d2a104ac4d5cba83bd828bca5895b9ac326085490b6a1c146934d6f3d11c6afcf34ff", 0xbf}], 0x1, &(0x7f00000003c0)=[@rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [r0, 0xffffffffffffffff, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}], 0x98, 0x40}}, {{&(0x7f0000000480)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e, &(0x7f0000000b80)=[{&(0x7f0000000500)="57c32d9b48f07ceca3b51b20312f0d63489ff29892fbe1fc09e02c4ecbc6ed4d65a41833af67192246293ca32c5dfbbce0a1f98952970f013b9f6539dd30c7471ef17398f7537d2ccac9cc84249f0be854031e5bbe1122bf89adb507c68271da0b7765488b95becbe7049540f73750a0718c8565008b3f0ec62e6e67c4952917af27006ac49ff8f07330af56f91537231bbc3e4bd235d45e8b37453fddef598a7a98af65235e48ee4ba639bfe0f9ce474cc11ca003b9666664334175f0f5d170", 0xc0}, {&(0x7f00000005c0)="ceb8a3b4226be1bd0728c39b9c96f88d2fd649860613a9e61d061e58b490b6cc1ff4fa4a3ae9f5f593d0b703a880235cb98746d622e8b3e87491d41a65ac73e3e3ab552c6452a8858de5faa37455245ae89363b6b918e7ee84431d8fcfbfe123c899742dbdcb96a1b5304a59a7b2342169d535c918e57d2de8f0415f412ebdbea961de34996a", 0x86}, {&(0x7f0000000680)="aa5932359388eb674d1f328db9f57f8c8a1eb357b2cf8626a5bd73c14afbe614d3bf159b2d233e0e5514872581c311d4d0b1f9cf41487d2193bd492ebb62f205e58b7fa3ce78d9c12f14019865305510f44a40f0b35855846512786af30cbeb17be0c8e08c5939631213efd347350a8ba7a7221c6cd43c2ab9afb6ee63488dd93e149c5dd2da177283236c6070f504ec2fca3d5728eb8aa712db7e02fceb5c4fd25093b84cd6686b8734873bc712a3996ecc80b2736fdb7d24", 0xb9}, {&(0x7f0000000740)="be085b30e5bd99a220141142d3abbb8112568c2af214c4cbfcf2f87d8d012d5f8b2f37f4fc6c3785292a734921b09fa95571ab64514e1730281ea9c3767458a323afae7a98b52499b486a9c6f08638875c752d41ecbc1a89f9c1233457c90bd543d516b1bc9781fcf6a468182286ba7da2764ab1dac00c7b404556ee756e36ce4fbd663d32cc6ed9703bd1d0b9a2be85cd219cd035add39e954110d015ad41cb6232b47aaf003294f3d1b3139688d10118a91385", 0xb4}, {&(0x7f0000000800)="d357f2a2c4f8d0ded7d8dd7601c3f84794a9f2393cb5f9bd7c1cd1b0516f672b4b84d345dc127b14df90204cfd0266ed581467375ddde73a093a422a3a3f2cdb0e50fc3b8bc9d022d3e201d183933c13cd748f10df378b7242e7ff7e4c26b62de07aa7e2c9e587cd2663d05eb4ed8db05ac48922cec714084008724c3e135521c73bf54967446beb889e4b047c1c55f6985385d831094c9640570c23404fb31ad10d976a541b1dea8b2fe203123c903070ae53a9b7970e8223bd31", 0xbb}, {&(0x7f00000008c0)="4b6741dd196c028d50448513432b7afb3368beaf61af2c243f871c4b7ca5577f910d9c972fe533aeed3b29f480da462a68e3672780a85eef473afbc1e1be3e986357e56479f859d109491bfdfebde7444989e8f79601f7d980f65f9ae9b247b2bcc789dc2614cdfaff2778df0fd796ddef0bfac45d9574f114147a0fe63040484256a0b069eb9d6f55512d15f9f3a61b070d67688a604d9fb9a46a09ed8d782ab65980a1b0b9ca8eed79d68a75d9bc60c21400bb921a65ed51e73d1c67bc8d7e2be5d9464f3135aa4517052b64c2", 0xce}, {&(0x7f00000009c0)="0d6e9ea460d19bcba7b29a41e573489d0769082e02fc3de7005448b33c09fde8563be51eda3dffd79efce2bc0cf527005b2c63a6d137b8c46d0e52f42656c606d1906b50638eb22cf999f7bea87cc8136491dd582425a07ce3aacbfaf63e0ca32bc22341f5d5b9e774989e22c2c70245f2dc284ab4ff27fa1d7ed0d7937bd61a5f4d89cc921be08b87ec9147b097a851c5c92e4e857766104e451d0126e413209638c4aef6cd6f", 0xa7}, {&(0x7f0000000a80)="997ce00d43b08ea03bd42eaa2232df76acc460e0407ad64a72647c822540566ad7297f2793d6db655a0a4e581e7d907c4780ee5071724a0272dbed6fc44c6a96a73bc648248b0e98d4006f2de10230785e6865bef36c83f9417ead0e1ce44f5248559f014c69b55e6ad92f2aa1be9f89b36bc578b05c6a7cf8180e3a88b02ae854c7ff63bf2bc9d0e3c8e8bfc4cdfe02cc4171fa83d75b20b68575984bc10576819f3239abe7cd0c86b5b8a8f99db598e5fc3ac5d2beabb816b58a2e7237bc3bb7ef3a45f1277538598d9511f2a472a47aa134fe5733b5a130d1014c0eaa1edab0293162c63d5b3d67f6ce1f6b24119a30bcc2abcb", 0xf5}], 0x8, &(0x7f0000000f40)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r0]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [r0, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}], 0x108, 0x4c000}}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001080)="f10c50b93a6e7ddc88c8cf63ecaec6856dfa687b8288e152e597b9ca2c454e66f7282e52727335eb0f42c0bc093bd42b42b1511055dff400845523cee201e233bf9d67b1f1252b8073876879be20a103438114a3bfb4ba264bc186159652f1687cc5c53f752dc81f851080e0b48ca129d2eb37536a6b1b0377255b0fbe42855123aae70c3d62b3a66f5ebbb497516f169c80e0f12622d625856511ea3b672834e38431375d4effb38c8662cd3fdd679d08d6de9ae0286f351fd92c35380075c537958988a4190a09569392df057af10147bc71dcdd47720def5516bd41764cdd4771f99481884e25199938", 0xeb}, {&(0x7f0000001180)="6483d5d929dc890807667387e9e4845141636ede69e99815625eee780420b89e67f31b832484f905ea41d8b2d478e28e7a5330f2aab0cc50747a9fb4cfea8987f94dc289d744589685e3525079593baf6e884a99a1563fafb821d77ff9e80a4146ceca196a4820b0c4969501694386f4f2fd6d548ef2aff964d5ff22969c2a0a0b5de68af1ba3ac71635d8", 0x8b}, {&(0x7f0000001240)="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", 0xfe}, {&(0x7f0000001340)="7870038615dc642d70b22577984bdd3a3ccf0fa44140395c242b4dd11a10a683db316c36be93fff546e3f02cf71ee52b72a7b578a25c96b9db5250c3229ffe5e1d0a65b6956c0461df3380e8dfaa097a2ac2c1bf20803423e6e8b3ba52d46558912435e9b31ca36d08e1e158b47e4963b529fedf68abbef4674cdd911945931e6ca37fd2fb0db06bf8c4a3d4857936ce1a17c53f154d01dbb43af57d2cf8374b7beb690ca647bd1c954dd26a422dd89e25091d590599e819ef14f73e03b19bbad8ef6e10460f482b9a2f747538c6edcbec2eec2c9dcba0b79327ee284c1a5c5fb254", 0xe2}, {&(0x7f0000001440)="2c7fd23bbab08093c4460eee7a48ba009fccaaa1df65fe33dd48e46c9faa51a3879c61ef0becfe3ca4764adbc6328c5e5a35fab3530575f0f2878ca9c41aa945987fe8154603ccca031be8caaafb85a107b3afb9dc79f2953ba5da1d70150907940b8f1eb0527259bfca086a7af1f0a74fa7cb78150c10bcde12ae471db2f0a39eb060ed62dff67ed4cd63042a7b17f7833706eaac718680bf4fedd5acb7b6b56dcbeaf969e868fa257134085c72ab602f24c467d1236d2a7202cebcee01f30ace17e6174831ba2442040a5dbbb87972b09c", 0xd2}, {&(0x7f0000001540)="479c1c5473eb008591d7f1d82a0f711c1c5396bbf40a5626b8436263095841e952206c2879688856659f4d5010a58c3727b1269720829128712391d4b6c44d126afe53b8f84de48b0e05c5d21cd3b38acd585777695a0a0aec261746d3a6bccb0be52d7c2c21612e3921a30ce6f67654b63b4dfe637882442c5d900371dbaa1dd5a75a398ba2150186155846be513c", 0x8f}], 0x6, &(0x7f0000001980)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee01}}}], 0xc8, 0x8000010}}, {{&(0x7f0000001a80)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000002180)=[{&(0x7f0000001b00)="310539996f527608c11677b88786ba69980b8046b8dbaa0b6c28f9136aa80f2b9522cb5afad8fb90abb4a4b6be66312e85e73a49085d859347d2096e9a6fd868281a3109b81a15b3ec7c4b10f8aa48ef274a989769ee386d77db9046c976e1cd5e5ebbca923b9d1bc16f8833c939c0612c2d343a210d2b2a09aef3c86b83054b00932a855b693d83f5402ec3131bbcb39bdf55b22e356ceaeb02fbbcd4499ffbf80da4743af9fa7beb38777a6a03eaa8f37ae2dc786b4c1147cbcf5463cb9bb9c8d3e06a03063922449335ae483d068fa15f82d8e33b98569b9832334a884c", 0xdf}, {&(0x7f0000001c00)="07e3944c022e6d86aca8e5ef844fbcc0db93b35fb8a8a4b7e078bd39ee", 0x1d}, {&(0x7f0000001c40)="4c1222684786294246b1b7eeb276ab7212130d1dc31265d92bbf4feb6e0008f42fa5d92a3352073b37794f6fa5845adb497af64f7d9e", 0x36}, {&(0x7f0000001c80)="2bdf478fc52d118991522e56a1d6ce70364b1bc2ce16d6a475cc5d086e36bcf64f8f53745857df4e9af02b380268635906ec939a320c75d482faf099e63700042bac6941cac4475b16d603f175b104806c9d62a82581474741f666d5d0b05d3981938dcda4894e7336716d5d84798d4aec318de64661444a522566f5d8f4df912321d167296a4ac507648f325c77e795bfadc3ebf77c883194df1cc68d417041075d934e2eeffd5e7c268491590e1b5bcbdba4df09412ea8419c7402f912fbcf0fa53d0ad1632bd07b180f91a22dc064cc4623439eb3852c4d25bac31c60fb39a6252d1ff91edc6c1a78b182705e1b3fc7", 0xf1}, {&(0x7f0000001d80)="f8028bc64011afadf616ed1c466c62a9859dfa893a25bdf0de2fae46c45573de3f1fb4e95ccc5e9dcfeaa426145210faf4d44f6f14c74365ca85ae757ed54abc0d63d72507759b37a42b6276c3aefbbe3055d7d0ce5bf580459bdbb6c392dd98c7b2ff9163735c", 0x67}, {&(0x7f0000001e00)="bb721bdb76cbd13fb350ff5c0b19c14dfc6e312bdc7cf4ef21e6dd25a9dad4600ad31463125b45a51c0fdc8ec282b6477d135a5de23294579f85e61490b93c0b6aaf0043b20feb8b", 0x48}, {&(0x7f0000001e80)="fe1c9fbbce6f3354231946e90d44af8cb2936f7c5c09d830157a9fd716e5a2e23a96f0ee318a763a1290e6fe4b460748e66520d86efc14c797e1dc0b7293f02f545fdd07b095aa81e42cbcc059a0b5505611071e08904e8a50f053d2150a6e5b8d13dd1a7dc2960235f1b16545798e3d9ade659596102604fe442d29766cc60cc413e4c7113055dd020487a6", 0x8c}, {&(0x7f0000001f40)="7c318b55caa3b06dc469444bc501927dfe32a8ed3fe062dbc5325480180c9e52c61dd89479dc8c06960a22a2c5d83c90e392cafd6e07b9f2be369e45e1a7e3281d5c647a507e444bfd849f34d3d43dbbd6085dac4238b911bfa7fd4568bb7a9f09cd28", 0x63}, {&(0x7f0000001fc0)="4ca9bfc49fadf6dbb2b55cea06066b408bd74d62ebd89032d2e803f3d4ed4f1907f1c7e1f1bed037817a21f90f17e809a6f60abefcc1011b6138c7492f6fe4cec2ad970b7ab95149114d6cd719c298bf03bcc18b83d95894a328cf4c1aec1e78f19d0714325bacbdb71ddbd4e76b1539645c292f2ff99400be4b0acf900cf0164dd23b3f40c3159115f4a74c2b819355fadc6c2741e3e0afa2baecc7873044c34ad77b0b21fda682d301dc2db3fcb4e5e3781221d13d4d", 0xb7}, {&(0x7f0000002080)="8eaedf9f032cfda84828dcd91e1395d977830eb7c42822515c0ae962c27ac2985d413099e8122dcd44cf31921a3116f8f060c22f00fff3c2214841ac98abfa4531714002d7a4ae7dc0bb662e9b3f8b49faff4e6d44956e0f3c9c5c665ff66d1629b8823e4e26b3a6b3c42ebc174383d2440f0d963b4b88391ca35de6aef11e5e9fcbd4e477f3ddba591c1a42661d2a3dc789cbe6b661e11d0a7a3d0f11f0cef862fc9155cd036f03ff749a6e64ffa13027ecebd6ba8dac45c0215a1b68f06d44cf6f4363c71f129571a4ce07107aa2a085a1bf", 0xd3}], 0xa, &(0x7f00000022c0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r0]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x98, 0x8000}}, {{&(0x7f0000002380)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000002640)=[{&(0x7f0000002400)="3eec8515964a1b838621844a51952ed8ab791c24e6c500685dacf2664cfb1406170e3c03da364c75a566593d3cb74ce1f767e9ed94ae36f487570fd1bbc6367b0225b823e86812159fd72959bc734b625b60a60a658fb33a27f7791f4efafee7ca345d8877c00e728f999c6fcb13d2c4d72f4bf029e8e26a53b1192e23a116807db98f22a31e4361df8e2252ff5b9164db2c364af1455c", 0x97}, {&(0x7f00000024c0)="d0f66a520644486c", 0x8}, {&(0x7f0000002500)="3d113fcc56ccb3064adc932f2df9b08b3fc2a6a521b3b292f3a033b4aec77ba97399eda4ccdcbb9885060c15da2e65d15058060d964a985f92635b6ba1713d107cd73169162144ebf86f12a14098ee6518313bad50f54101def98ad7068096454e98e4d2798195b030e7b1006f9dbc8941f988a995fa23ce994028d65cf5910847d6f3d07c9f9ac7f929cfb59295a7f3083894e8f56cbedd5d1580356549ded33464f65835820d20383aa0822a4fc42cd8211d7a7be352cada2f5bfd4f3ca59188e88a62c816db6057a9c9610367cc22cd7a25218a07ace74e246c2375d5c0f84a0bc944db80769fe0be18fe980bd1cb1aa0ba71ea", 0xf5}, {&(0x7f0000002600)="be3587c7bdd7ba954251415facf1575ff31a6919f886eb800a3ef4e80cab74e5", 0x20}], 0x4, 0x0, 0x0, 0x48004}}, {{&(0x7f0000002680)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000027c0)=[{&(0x7f0000002700)="e43911bafb48cfd946a805569a733a7630d858818b4ef3ba9b110c30e4836cc7a4d8472a3d5a2cd3e94188703ac0b45df9d6614f4113f56a9e0e80835a5c9fba6a142a7dec94a3746e69b4e12068e1945c522f9094d62adf65277ef30a375d5dcbd4ccaace492c9238569edae69e434f6b51e7f59d139f279c96cf788c083fe60e485ca73effc535e7f9b3dbd51973236b92f14537542e63d6755dc1d89e0641036f43208c7ac744", 0xa8}], 0x1, &(0x7f0000002b00)=[@rights={{0x2c, 0x1, 0x1, [r0, 0xffffffffffffffff, r1, r2, r0, r3, r4]}}, @rights={{0x1c, 0x1, 0x1, [r5, r0, r6]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff, r7}}}], 0x70, 0x800}}], 0x6, 0x0) close(r0) socket$inet6(0xa, 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r8}}) 22:18:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a3ff"]) 22:18:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:18:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 222.216312][T24107] loop5: detected capacity change from 0 to 86 [ 222.251911][T24107] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (43 blocks) 22:18:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:18:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 222.354048][T24107] loop5: detected capacity change from 0 to 86 [ 222.377293][T24107] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (43 blocks) [ 223.410534][T24136] chnl_net:caif_netlink_parms(): no params data found [ 223.517253][T24136] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.524429][T24136] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.551464][T24136] device bridge_slave_0 entered promiscuous mode [ 223.558782][T24136] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.565879][T24136] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.601483][T24136] device bridge_slave_1 entered promiscuous mode [ 223.653390][T24136] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 223.673195][T24136] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 223.737174][T24136] team0: Port device team_slave_0 added [ 223.753689][T24136] team0: Port device team_slave_1 added [ 223.782792][T24136] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 223.789733][T24136] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 223.815750][T24136] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 223.872047][T24136] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 223.878996][T24136] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 223.905143][T24136] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 223.930579][T24136] device hsr_slave_0 entered promiscuous mode [ 223.942334][T24136] device hsr_slave_1 entered promiscuous mode [ 223.962953][T24136] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 223.970512][T24136] Cannot create hsr debugfs directory [ 224.033795][T24136] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.040925][T24136] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.048164][T24136] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.055365][T24136] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.090646][T24136] 8021q: adding VLAN 0 to HW filter on device bond0 [ 224.102739][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.111598][ T1912] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.119554][ T1912] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.144372][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 224.164775][T24136] 8021q: adding VLAN 0 to HW filter on device team0 [ 224.196005][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 224.211115][ T2339] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.218145][ T2339] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.262757][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.271237][ T2341] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.278259][ T2341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.302016][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 224.310564][ T2341] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 224.335501][T24136] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 224.345907][T24136] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 224.361192][ T2340] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 224.369286][ T2340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.379705][ T2340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.406250][T24136] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 224.421276][ T2340] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 224.428648][ T2340] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 224.451154][ T2340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 224.551005][ T2340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 224.559499][ T2340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 224.659908][T24136] device veth0_vlan entered promiscuous mode [ 224.666993][ T2342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 224.676942][ T2342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 224.688703][T24136] device veth1_vlan entered promiscuous mode [ 224.712917][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 224.720684][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 224.741450][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 224.756306][T24136] device veth0_macvtap entered promiscuous mode [ 224.765457][ T2342] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 224.773966][ T2342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 224.783593][ T2342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 224.793043][T24136] device veth1_macvtap entered promiscuous mode [ 224.823622][T24136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 224.834077][T24136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.844031][T24136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 224.854460][T24136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.864308][T24136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 224.874846][T24136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.884696][T24136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 224.895118][T24136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.904940][T24136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 224.915374][T24136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 225.001523][T24136] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 225.009110][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 225.022550][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 225.042221][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 225.060863][ T2339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 225.070811][T24136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 225.081343][T24136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 225.091194][T24136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 225.101745][T24136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 225.111555][T24136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 225.121968][T24136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 225.131916][T24136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 225.142355][T24136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 225.152253][T24136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 225.162767][T24136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 225.227410][T24136] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 225.235539][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 225.251374][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 22:18:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xac80, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 22:18:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:18:08 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect(r0, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x2a, @private2, 0xc5, 0x4}, 0x80) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r2 = gettid() perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x7f, 0x3, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8d5, 0x2, @perf_bp={&(0x7f0000000000), 0xd}, 0x80, 0x0, 0xfbffffff, 0x6, 0x0, 0xcb, 0x5, 0x0, 0x0, 0x0, 0x8}, r2, 0x1, 0xffffffffffffffff, 0x0) 22:18:08 executing program 0: unshare(0x0) unshare(0x4020a00) unshare(0x10000) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x100, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x5, 0x4, 0x0, 0x0, 0x0, 0x1, 0x10040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0xad04, 0xfffffffffffffffe, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x2000000) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000065c40)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "63b5005cc3dcd1"}) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) write$binfmt_script(r3, &(0x7f0000000440)=ANY=[], 0x71f) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000050100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000054300)={0x9, [{r5}, {0x0, r6}, {r4, r6}, {r4, r6}, {}, {r4, r6}, {r4, r6}, {r5, r6}, {r5, r6}, {r5, r6}, {r5, r6}, {}, {r4}, {r4, r6}, {r4, r6}, {r4}, {r4, r6}, {r5, r6}, {0x0, r6}, {r5}, {r4, r6}, {r5}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {0x0, r6}, {}, {r5, r6}, {}, {0x0, r6}, {r4}, {r5}, {}, {r4, r6}, {}, {r4, r6}, {}, {}, {}, {}, {r5}, {0x0, r6}, {r5}, {r5, r6}, {0x0, r6}, {}, {r5}, {r5, r6}, {r4, r6}, {}, {r4, r6}, {0x0, r6}, {r4, r6}, {}, {r5, r6}, {0x0, r6}, {r5, r6}, {}, {r5}, {r4}, {r5, r6}, {r5, r6}, {r4, r6}, {r4, r6}, {}, {r4}, {r5, r6}, {r5, r6}, {r4, r6}, {r5}, {0x0, r6}, {0x0, r6}, {r4, r6}, {r5, r6}, {}, {r5}, {r5, r6}, {r4, r6}, {r4}, {r4}, {r5, r6}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {r5, r6}, {}, {r4, r6}, {r4, r6}, {r4, r6}, {}, {r5}, {r5}, {r5, r6}, {}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5, r6}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {r4, r6}, {}, {r4}, {r5, r6}, {r5, r6}, {r5, r6}, {0x0, r6}, {r5}, {r5, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r5}, {r5, r6}, {r4, r6}, {r4}, {r5, r6}, {r5, r6}, {r5}, {r4}, {r5, r6}, {0x0, r6}, {r5, r6}, {r4}, {r4, r6}, {r5, r6}, {r4}, {r4}, {r4, r6}, {r5, r6}, {r4, r6}, {r5, r6}, {}, {r5, r6}, {r4, r6}, {0x0, r6}, {r4, r6}, {r5, r6}, {r4}, {r5, r6}, {r4, r6}, {}, {r4, r6}, {0x0, r6}, {r4, r6}, {r4}, {}, {r5, r6}, {0x0, r6}, {r4}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {0x0, r6}, {}, {r5}, {0x0, r6}, {r5, r6}, {r5}, {r5, r6}, {r4, r6}, {r4, r6}, {r4, r6}, {}, {r4}, {r4, r6}, {}, {r5}, {r5, r6}, {0x0, r6}, {}, {r4, r6}, {r5, r6}, {0x0, r6}, {r5}, {r4, r6}, {}, {0x0, r6}, {r4, r6}, {r5, r6}, {}, {r4}, {r5, r6}, {r5}, {r4, r6}, {r5}, {}, {r4, r6}, {0x0, r6}, {}, {r4}, {0x0, r6}, {r4}, {r4, r6}, {}, {r4}, {r4, r6}, {}, {r4, r6}, {}, {r4}, {r4, r6}, {r4, r6}, {r4}, {r5}, {r5}, {r4, r6}, {r4}, {0x0, r6}, {r4}, {0x0, r6}, {r4, r6}, {r5, r6}, {0x0, r6}, {r5, r6}, {}, {0x0, r6}, {}, {r4, r6}, {r5, r6}, {r5, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {r5}, {r5, r6}, {}, {}, {r4, r6}, {}, {r4, r6}, {r4, r6}, {r4, r6}, {r5, r6}, {0x0, r6}, {r5, r6}], 0x9, "4c4b9663723639"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000066c40)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000066e40)={0xcf, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {r5}, {0x0, r7}], 0x5, "d5f30649f0085d"}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 225.296994][T24164] EXT4-fs: 58 callbacks suppressed [ 225.297006][T24164] EXT4-fs (sda1): Unrecognized mount option "ÿÿ" or missing value [ 225.323148][T24165] EXT4-fs (sda1): Unrecognized mount option "ÿÿ" or missing value 22:18:08 executing program 1: unshare(0x40400) unshare(0x48000400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) move_mount(r0, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./bus/file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x10, 0x1ff) 22:18:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='fuseblk\x00', 0x11401, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='bdev\x00', 0x2000000, &(0x7f0000000300)='^\\!\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x56140, 0x100) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000080)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000080)) syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x380a424, &(0x7f0000000340)=ANY=[@ANYRESOCT=r2, @ANYRESOCT=r1, @ANYRES16=r0, @ANYRESHEX=r3, @ANYRESDEC=r0, @ANYRES64=r2, @ANYRESOCT, @ANYRESHEX=r3, @ANYRES16=r3, @ANYRES64=0x0]) [ 225.347417][T24169] loop5: detected capacity change from 0 to 86 [ 225.350653][T24171] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 225.369624][T24169] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (43 blocks) 22:18:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 225.395912][T24178] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 225.421422][T24182] bdev: Unknown parameter '^\!' [ 225.448487][T24182] EXT4-fs (sda1): Unrecognized mount option "0000000000000000000000500000000000000000000004" or missing value [ 225.464886][T24169] loop5: detected capacity change from 0 to 86 [ 225.476623][T24169] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (43 blocks) 22:18:08 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x0, 0x2, 0xfb, 0x2, 0x0, 0x3, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x2020, 0x20, 0x6, 0x6, 0x7, 0x10000, 0x0, 0x0, 0x6, 0x0, 0xfffffffffffffff7}, 0x0, 0xf, 0xffffffffffffffff, 0x8) 22:18:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xacc0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000280)="f85ce314640b8142002d", 0xa, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)) [ 225.513307][T24184] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 225.530385][T24182] bdev: Unknown parameter '^\!' [ 225.530646][T24291] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value 22:18:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) [ 225.565865][T24294] loop5: detected capacity change from 0 to 86 [ 225.574817][T24292] EXT4-fs (sda1): Unrecognized mount option "0000000000000000000000500000000000000000000004" or missing value [ 225.593119][T24294] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (43 blocks) 22:18:08 executing program 2: sendmsg$802154_dgram(0xffffffffffffffff, &(0x7f0000001300)={&(0x7f0000000280)={0x24, @long={0x3, 0x1, {0xaaaaaaaaaaaa0202}}}, 0x14, &(0x7f00000012c0)={&(0x7f00000002c0)="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", 0x1000}, 0x1, 0x0, 0x0, 0x20000094}, 0x8000) mkdir(&(0x7f0000000000)='./file0\x00', 0x94) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[]) r0 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x116) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x5f00f000) connect$802154_dgram(r0, &(0x7f0000001340), 0x14) open(&(0x7f00000001c0)='./file0\x00', 0x109000, 0x8b) open(&(0x7f0000000240)='./file0\x00', 0x801, 0x18) lsetxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080), &(0x7f0000000200)=@v1={0x1000000, [{0x85, 0xf8f}]}, 0xc, 0x1) chdir(&(0x7f0000000140)='./file0\x00') 22:18:08 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4000400) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000080)) fallocate(r0, 0x8, 0x8, 0x9) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 225.614496][T24362] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 225.638082][T24397] EXT4-fs (sda1): Unrecognized mount option "data_eJ" or missing value [ 225.654809][T24294] loop5: detected capacity change from 0 to 86 22:18:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108a420, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f654a0d0000676ea58689a300"]) 22:18:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x53, 0x0, 0x0, 0x108a420, &(0x7f0000000140)=ANY=[@ANYBLOB="f55a87c2058d748aee83835837a9c71b79e8987fa5f72ef6a087bc5470882c4df6aef07511cb98348b424125f12f8aaa0b1c699e112fef4b3af8e18a2a2264cc91dd676f98b5ff83004d7f51404be03f71c0669641d5f9aae31beab6f50897ef7f33fd1a1fd544"]) [ 225.666738][T24294] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (43 blocks) 22:18:09 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) sendmmsg(r0, &(0x7f0000009780)=[{{&(0x7f0000000080)=@phonet={0x23, 0x80, 0x4}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)="e6677fe665ee73503f7a85f52b0ffa448aa27984c19bd67b57908a9986938719aa2f874e8843fa4cc10039412a93fb41a698eff72fe52d846c0cc6714653e846d7f4e8fbc0", 0x45}, {&(0x7f00000001c0)="d27128159c291ebed29785700b89b5c02b24149f3934a6f1b574fb217eeef49abdd6521b3a2db029c3b8e2d5c79cd2d71d8ff4dda71d7076d91682744b24ca73c182133448d8843ba90ad2695b08ad47fa8a844ff5", 0x55}, {&(0x7f00000003c0)="1b9213e1077e7e17bc2bed47ca7f6c87d9953c3f171d038e313aabf0134ab54f6805165bee3fa836df3d5a57089efb8d0831e0fc5e208d681af56cce3624504be0309571cc19eaae12e4da50bce289c61ce8b0e2e52de52e04e94b00c1e8d2770206132753f56e0a4479ea608613fd6afa0be72232be06b0c92f796052d1645f8865c79a48da6f6dc5014d862bacdb6c3cd6a9374a81fe3ca0ea65c6e999c7c6f33822b11cb80486a1fcb2b804992173ea64ca7b5bca18d310a28beef9d5fbfdf0cd2bc25a0f1c84358a6ae2ecbfc2b81dddb9cf01ef573c34735dde6f1b15e284a91849693626e3db7e97adca54da6f22bd1e807c1261b544cd", 0xfa}, {&(0x7f00000004c0)="939ae48d8101bba71d0a59b61fbf55822fee1f34b24f6bb46834aaa79d4b0ea016e56b3265ce87d75387abb347c8bbb18e4afe9fbe3a899733c857c968c3f1b21f14728fb93382de7fbfc742042888752d780856ff77baf82f685af8bafb3b4fef0c7152cfb574b422f99d4e10b6479934f37802a40e7f74914e9f45f67faaa990a61c3a1453a3adfbf51676bf55233acf9888a34370ab8fe2c9e70fd19de3bacf4fecae6f9032b9cbd3550819ca0f1ea9ecd61a2350e5fcc3e3a8e69469ce8b48df08db694b306ace1a584e9598b6fef41a85a06a52ed5e318a7314bf24f17573d86de8a52b4112fb3c183c6eb488726b5dbb7b73a0", 0xf6}], 0x4}}, {{&(0x7f0000000240)=@ethernet={0x6, @multicast}, 0x80, &(0x7f0000001900)=[{&(0x7f00000005c0)="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